Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Conclusion

This module will review critical lessons from your security awareness training to increase team retention of core program content. 2:05 minutes

Introduction

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives. 5:13 minutes

WORKed Episode 11: X-Men

Welcome to the danger room. Danger conference room, really. Teach your employees about the importance of mobile security with this WORKed training module. 2:44 minutes

WORKed Episode 10: Travel Stories

Jack gets a little risky on the road. Teach your employees the keys to working remotely with this WORKed training module. 2:46 minutes

WORKed Episode 9: Tailgating

This week, the gang teases Ed and it’s totally justified. Show your employees why physical security is so important with this WORKed training module. 1:17 minutes

WORKed Episode 8: Eagle Eye

Keep your head on a swivel and your screen down. Teach your employees to watch out for shoulder surfing in this WORKed training module. 1:55 minutes

WORKed Episode 7: Laptop Down

We’ve got a situation. Well, they do. Show your employees the importance of device security with this WORKed training module. 2:19 minutes

WORKed Episode 6: Demons

A strong team treats office security like they are protecting their castle. From orcs and stuff. Teach your employees how to avoid malware in this WORKed training module. 2:40 minutes

WORKed Episode 5: Mallomars

You can be nice and still question everything that comes your way. Help your employees avoid social engineering attacks with this WORKed training module. 1:43 minutes

WORKed Episode 4: Coffee Guy

Watch to discover Charlie’s password to EVERYTHING. Help your employees select strong passwords with this WORKed training module. 2:00 minutes

WORKed Episode 3: Robot Lawnmower

Is Ed getting scammed? You decide. But the answer is totally yes. Teach your employees the basics of safe web browsing with this WORKed training module. 1:54 minutes

WORKed Episode 2: Evite

I doth see a vision of scammery! Help your employees avoid phishing attacks with this WORKed training module. 2:24 minutes

WORKed: Teaser

Use the WORKed Teaser video to draw attention to your campaign and preview what’s to come. 0:34 minutes

Who Can You Trust? (Social Engineering)

This video highlights the risks of disclosing patient information without first verifying requester identity.

Vishing

This interactive training module covers voice phishing, or vishing, a simple but effective technique cybercriminals and scam artists use to collect confidential information. 6:44 minutes

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

2:40 minutes

Social Media

This module explains common security risks related to the use of social media in business, and ways that learners can protect themselves and their company from social media threats. 6:14 minutes

Social Engineering Brief

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests. 3:38 minutes

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests. 12:54 minutes

SMiShing

SMS Phishing, or SMiShing, is used by cybercriminals to collect valuable information and distribute malware. This module includes effective ways to stop SMiShing attempts. 4:58 minutes

Secure Connection (Data In Transit)

This module highlights the importance of using secure connections when sending sensitive data over the Internet. 0:35 minutes

Safe Web Browsing Brief

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections. 4:21 minutes

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. 10:58 minutes

Removable Media Brief

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices. 2:06 minutes

Removable Media

This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media. 10:47 minutes

Red Flags Rule

The Red Flags Rule requires financial institutions and creditors to develop written programs, or an Identity Theft Prevention Program, to detect and avoid identity theft. 6:05 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started