Blog
 

Course Catalog

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices....

This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe...

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions. 17:01 minutes

This short video reinforces the importance of using trusted publishers when installing mobile applications. 1:00 minutes

This security awareness module introduces common information security risks found when traveling abroad. 7:38 minutes

This module defines Intelligent Personal Assistants and how they work, and explains some of the risks associated with using intelligent personal assistants in the workplace....

This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT....

Insider threats include security threats posed by employees, contractors or vendors. This module provides examples of common behaviors that can be indicators of insider threats....

Injection is one of the most common, and harmful, security risks to web applications. This module details different types of injection and suggests effective mitigation...

In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers. 1:00...

In less than one minute, this video reinforces the importance of keeping passwords private. 1:00 minutes

This module explains the encryption process and types of assets that can be encrypted and reinforces the importance of following encryption-related policies to protect sensitive...

Page 24 of 25