Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Conclusion

This module will review critical lessons from your security awareness training to increase team retention of core program content. 2:05 minutes

Introduction

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives. 5:13 minutes

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests. 12:54 minutes

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. 10:58 minutes

Removable Media

This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media. 10:47 minutes

Privacy & EU GDPR

In this module, we review the main goals and objectives of the new European Union General Data Protection Regulation (EU GDPR). 15:22 minutes

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. 21:16 minutes

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions. 17:01 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started