Conclusion
This module will review critical lessons from your security awareness training to increase team retention of core program content.
2:05 minutes
*Courses may vary.
Search Courses
This module will review critical lessons from your security awareness training to increase team retention of core program content.
2:05 minutes
The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.
5:13 minutes
This interactive training module covers voice phishing, or vishing, a simple but effective technique cybercriminals and scam artists use to collect confidential information.
6:44 minutes
Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.
2:40 minutes
Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests.
12:54 minutes
This module highlights the importance of using secure connections when sending sensitive data over the Internet.
0:35 minutes
This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.
2:06 minutes
This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.
10:47 minutes
Ransomware is malware that holds technology for ransom. This module will show learners how ransomware works, what do if an infection occurs, and how to avoid future infections.
4:38 minutes
This one-minute video shows the consequences of a phishing attack.
1:00 minutes
Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.
3:20 minutes
Please complete and submit the form below.