Course Catalog

*Courses may vary.

Search Courses


GDPR for Executives

This security awareness training covers Privacy and the General Data Protection Regulation for Executives. 14:37 minutes

GDPR - What is GDPR? (Video)

A high level overview of the origin and aims of the General Data Protection Regulations 2:01 minutes

GDPR - Rights of the Data Subjects (Video)

This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed 1:07 minutes

GDPR - Important Definitions (Video)

Brief lesson covers the particulars of how GDPR defines data and its uses. 1:58 minutes

GDPR - Consequences of Non-Compliance (Video)

This video covers the impact non-compliance with GDPR regulations can have on your organization. 1:28 minutes

CJIS Security Policy

This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI. 5:26 minutes

CJIS: Handling CJI

This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance. 9:02 minutes

Protecting Federal Tax Information

This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure. 8:06 minutes


The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent bribes, kickbacks and other unacceptable practices when interacting with foreign officials. 9:34 minutes

Handling SSA Provided Information

This module will review federally-required practices for safely using and storing SSAprovided data, including best practices, review of applicable laws, and civil and criminal penalties for PII loss. 10:43 minutes

Electronic Funds Transfer Act (EFTA)

The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges. 9:03 minutes

Sarbanes-Oxley Act (SOX)

This module covers The Sarbanes-Oxley Act of 2002 (SOX), a law enacted to combat major, large-scale corporate and accounting fraud. 4:56 minutes

Gramm-Leach-Bliley Act (GLBA)

This module will define the Gramm-Leach-Bliley Act (GLBA), explain its purpose and detail the consequences of non-compliance. 6:25 minutes

Privacy and PII Brief (India Localization)

This version of our core Privacy and PII training explains privacy and personally identifiable information (PII). This version is localized for India to include protecting Aadaar numbers. 4:57 minutes

Privacy and PII

Our Privacy and PII module defines privacy and Personally Identifiable Information (PII), and reinforces the importance of data security in the workplace. 11:31 minutes

Privacy Risks (Video)

This module covers the consequences of privacy violations for businesses. 1:53 minutes

Introduction to CCPA

This module is an introduction to the California Consumer Privacy Act, or CCPA. 9:50 minutes

FERPA for Post-Secondary Education

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions. 7:43 minutes

The Family Educational Rights and Privacy Act (FERPA)

This module covers the Family Educational Rights and Privacy Act (FERPA), discusses the types of student education record information covered and what must be documented when a FERPA request is made. 7:14 minutes

FERPA for K-12

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions. 7:49 minutes

HIPAA Minimum Necessary Standard (Video)

This brief video extrapolates on how many people are authorized to access one person’s health records. 1:54 minutes

HIPAA/HITECH for Healthcare Executives

This module defines protected health information (PHI), outlines best practices for handling PHI, and explains the role healthcare executives play in ensuring HIPAA compliance by employees. 14:06 minutes

HIPAA/HITECH for Healthcare Managers

This module defines protected health information (PHI), outlines best practices for handling PHI and the responsibilities of healthcare managers in protecting PHI and ensuring HIPAA compliance.

14:21 minutes

Consequences of PHI Release

This brief video shows the possible consequences of a PHI breach at your organization. 1:45 minutes

PHI Policy (Video)

This video shows the importance of formulating and implementing organizational policy regarding PHI. 1:25 minutes

PHI Life Cycle (Video)

This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle 1:59 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.


Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started