Providing Award-Winning Cybersecurity Solutions For More Than 20 Years
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses
Conclusion
This module will review critical lessons from your security awareness training to increase team retention of core program content.
2:05 minutes
Introduction
The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.
5:13 minutes
Social Engineering Brief
This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests. 3:38 minutes
Social Engineering
Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests. 12:54 minutes
Securing Mobile Devices
Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions. 2:23 minutes
Securing Home Networks and Devices
This interactive module shows learners how to implement many of the same network protections at home that IT staff use at the office. 3:07 minutes
Secure Connection (Data In Transit)
This module highlights the importance of using secure connections when sending sensitive data over the Internet. 0:35 minutes
Safe Web Browsing Brief
This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections. 4:21 minutes
Safe Web Browsing
Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. 10:58 minutes
Removable Media Brief
This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices. 2:06 minutes
Removable Media
This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media. 10:47 minutes
Privacy and PII Brief
This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII). 4:55 minutes
Physical Security Brief
An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology. 6:07 minutes
Phishing In Brief
This module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate. 2:49 minutes
PCI DSS Brief
This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data. 11:44 minutes
Password Security Brief
This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised. 3:59 minutes
Password Security
Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. 21:16 minutes
One Wrong Move (Phishing)
This one-minute video shows the consequences of a phishing attack. 1:00 minutes
Mobile Wi-Fi Security
Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.
2:07 minutes
Malware Brief
This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.
3:21 minutes
Malware
This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.
17:01 minutes
How Secure Is Public WiFi? (Public WiFi)
In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers.
1:00 minutes
How Much Is Too Much? (Password Security)
In less than one minute, this video reinforces the importance of keeping passwords private.
1:00 minutes
Request your free demo today.
Please complete and submit the form below.
Are you ready?
Take the next steps
Reach out to one of our cybersecurity experts today.