
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses

Check Yourself (BEC)
This module emphasizes the need to verify wire transfers.
1:00 minutes

Every Step You Take (Mentoring)
After you’ve learned good security practices, you should share your knowledge with others.
0:35 minutes

Knowledge Is Power (Security Training)

Double Check (Verifying Wire Transfers)
This micro-learning module emphasizes the importance of verifying wire transfers.
0:35 minutes

Identifying Social Engineering (Video)

Social Engineering Defenses (Video)

GDPR for Data Processors
This security awareness training covers privacy and EU General Data Protection Regulation for data processors.
11:08 minutes

GDPR for Managers
This security awareness training covers Privacy and the General Data Protection Regulation for Executives.
14:53 minutes

GDPR - Breach Notification (Video)
This brief video covers the next steps for an organization should a breach occur.
1:43 minutes

GDPR for Executives
This security awareness training covers Privacy and the General Data Protection Regulation for Executives.
14:37 minutes

GDPR - What is GDPR? (Video)
A high level overview of the origin and aims of the General Data Protection Regulations
2:01 minutes

GDPR - Rights of the Data Subjects (Video)
This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed
1:07 minutes

GDPR - Important Definitions (Video)
Brief lesson covers the particulars of how GDPR defines data and its uses.
1:58 minutes

GDPR - Consequences of Non-Compliance (Video)
This video covers the impact non-compliance with GDPR regulations can have on your organization.
1:28 minutes

CJIS Security Policy
This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI.
5:26 minutes

CJIS: Handling CJI
This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.
9:02 minutes

Protecting Federal Tax Information

FCPA
The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent bribes, kickbacks and other unacceptable practices when interacting with foreign officials.
9:34 minutes

Handling SSA Provided Information

Electronic Funds Transfer Act (EFTA)
The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges.
9:03 minutes

Sarbanes-Oxley Act (SOX)

Gramm-Leach-Bliley Act (GLBA)

Privacy and PII Brief (India Localization)

Privacy and PII

Privacy Risks (Video)

Request your free demo today.
Please complete and submit the form below.
