Introduction to CCPA
This module is an introduction to the California Consumer Privacy Act, or CCPA.
9:50 minutes
*Courses may vary.
Search Courses
This module is an introduction to the California Consumer Privacy Act, or CCPA.
9:50 minutes
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.
7:43 minutes
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.
7:49 minutes
This brief video extrapolates on how many people are authorized to access one person’s health records.
1:54 minutes
This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees.
14:06 minutes
This module defines protected health information (PHI), outlines best practices for handling PHI and the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.
14:21 minutes
This brief video shows the possible consequences of a PHI breach at your organization.
1:45 minutes
This module briefly covers the main points of HIPAA compliance.
1:23 minutes
Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.
14:16 minutes
What can you do to prevent election fraud? More than you may think! In one short video, you’ll explore the dos and don’ts of ensuring a safe and secure election process.
3:55 minutes
This module details HIPAA’s definition of a breach, breach disclosure requirements (including an overview of the concept of safe harbor) and recommended breach detection and notification methods.
8:54 minutes
This social engineering module teaches a three-step method to add clarity to a confusing conversation, verify suspicious requests and identity theft prevention prescribed by the Red Flags Rule.
7:21 minutes
This module explains the social engineering methods hackers use, review HIPAA requirements regarding external requests for PHI, and teach managers to work with staff to prevent PHI breaches and leaks.
8:49 minutes
Healthcare professionals are targeted by hackers via social engineering. This module will explain social engineering techniques in detail, and review HIPAA requirements regarding external requests for PHI.
9:33 minutes
This module will explain the various social engineering methods hackers use, and teach managers how to work with staff to prevent data breaches and leaks.
7:53 minutes
This module explains how to recognize advanced persistent threats (APT), APT risks and common attack methods.
7:22 minutes
Our Help Desk module explains how hackers can exploit the trust between a helpdesk and its users through social engineering attacks.
5:00 minutes
Please complete and submit the form below.