Blog
 

Listing Category

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. 0:30 minutes

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. 8:14 minutes

This short video covers some of the common signs of phishing emails and how to recognize malicious links. 2:27 minutes

This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information. 1:46 minutes

This module teaches learners how to avoid falling victim to phishing. 2:11 minutes

This interactive training explains how financial sector employees and customers are targeted by phishing attacks and teaches users how to recognize phishing attacks. 10:23 minutes

This module discusses phishing in detail and teaches healthcare managers how to detect phishing attempts. 13:39 minutes

This module explains the risks phishing poses to healthcare executives and organizations, and suggests ways executives can work with their security teams and staff to...

Page 1 of 3