Introduction to CCPA
This module is an introduction to the California Consumer Privacy Act, or CCPA.
9:50 minutes
*Courses may vary.
Search Courses

This module is an introduction to the California Consumer Privacy Act, or CCPA.
9:50 minutes

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.
7:43 minutes

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.
7:49 minutes


This brief video extrapolates on how many people are authorized to access one person’s health records.
1:54 minutes

This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees.
14:06 minutes

This module defines protected health information (PHI), outlines best practices for handling PHI and the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.
14:21 minutes

This brief video shows the possible consequences of a PHI breach at your organization.
1:45 minutes




This module briefly covers the main points of HIPAA compliance.
1:23 minutes

Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.
14:16 minutes

What can you do to prevent election fraud? More than you may think! In one short video, you’ll explore the dos and don’ts of ensuring a safe and secure election process.
3:55 minutes




This module details HIPAA’s definition of a breach, breach disclosure requirements (including an overview of the concept of safe harbor) and recommended breach detection and notification methods.
8:54 minutes

This social engineering module teaches a three-step method to add clarity to a confusing conversation, verify suspicious requests and identity theft prevention prescribed by the Red Flags Rule.
7:21 minutes


This module explains the social engineering methods hackers use, review HIPAA requirements regarding external requests for PHI, and teach managers to work with staff to prevent PHI breaches and leaks.
8:49 minutes

Healthcare professionals are targeted by hackers via social engineering. This module will explain social engineering techniques in detail, and review HIPAA requirements regarding external requests for PHI.
9:33 minutes


This module will explain the various social engineering methods hackers use, and teach managers how to work with staff to prevent data breaches and leaks.
7:53 minutes

This module explains how to recognize advanced persistent threats (APT), APT risks and common attack methods.
7:22 minutes

Our Help Desk module explains how hackers can exploit the trust between a helpdesk and its users through social engineering attacks.
5:00 minutes

Please complete and submit the form below.