
Cybersecurity Scenarios

Recommended for:
- Asset Management
- Board of Directors
- Commercial
- Compliance - External Audit
- Compliance - Internal Audit
- Human Resources
- Operations & IT
- Retail
- Wholesale Banking
Series Description
The Cybersecurity Scenarios series provides an opportunity to apply your knowledge of cybersecurity concepts to real world scenarios and case studies.
Included Courses
- Wanted: Fake QR Code Outlaws (3m)
- USB Baiting: Don't Take the Bait (2m)
- The In-Personator: A Social Engineering Threat (1m)
- Typosquatting (2m)
- The Fake App Trap (2m)
- The Business Email Compromise (2m)
- Tales from CPU City - Crypojacking (2m)
- Tales from CPU City - Tailgating (3m)
- SMiShed! (2m)
- Protecting Against Spear Phishers (1m)
- Protecting Against Malicious Insiders (8m)
- Phishing Defense Best Practices (1m)
- Phishin' Impossible: The Phishing Game (2m)
- Password Strong (2m)
- Living Mobile Secure (2m)
- Invoice Fraud (BECs and VECs) (5m)
- How to Defeat Social Engineers (1m)
- Home Cybersecurity (2m)
- Home Invasion: The Internet of Terrors? (2m)
- Fake News (2m)
- Evil Twin (2m)
- Dial V for Vishing (2m)
- Deepfakes (2m)
Request more info
An investment in your employees is an investment in the health of your financial institution.
Let us create a unique online training program for you. Fill out the form to be contacted by a Sales Representative.