Course Catalog

*Courses may vary.

Search Courses


International Travel Security

This security awareness module introduces common information security risks found when traveling abroad. 7:38 minutes

IoT Security

This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT. 5:35 minutes

How Secure Is Public WiFi? (Public WiFi)

In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers. 1:00 minutes

How Much Is Too Much? (Password Security)

In less than one minute, this video reinforces the importance of keeping passwords private. 1:00 minutes


This module explains the encryption process and types of assets that can be encrypted and reinforces the importance of following encryption-related policies to protect sensitive information. 6:14 minutes

Cloud Services

This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services. 6:53 minutes

Business Email Compromise (BEC)

BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. This module suggests defenses against this tactic. 1:14 minutes

Avoiding Cybersecurity Risks for Executives

This security awareness module explains why top-level managers are targeted by malicious hackers, details common attack methods, and offers recommendations for avoiding security risks. 9:45 minutes

Anti-Money Laundering

This interactive module explains money laundering and U.S. laws and regulations intended to combat money laundering activities. 10:02 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.


Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started