Blog
TechGuard Security | S.H.I.E.L.D Cybersecurity Awareness Training Catalog
5146
page-template-default,page,page-id-5146,ajax_fade,page_not_loaded,smooth_scroll,,qode-child-theme-ver-1.0.0,qode-theme-ver-3.7,wpb-js-composer js-comp-ver-5.4.2,vc_responsive
 

S.H.I.E.L.D Cybersecurity Awareness Training Catalog

Multi-Topic Foundational Courses

Security Awareness Fundamentals Theme

30 mins| Employees will master the fundamentals of information security including key threats and how to counter them. Key Topics: Introduction, password management, identity theft, malware, social engineering, phishing, physical security, travel safety, mobile data, privacy and acceptable use.

Human Firewall Theme: Security Awareness and Literacy

85-90 mins | One course that covers every topic required by major standards and regulations. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.

Strongest Link Theme - Security Awareness and Literacy

50-60 mins | Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them.Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.

A Day in the Life Theme - Security Awareness

65-75 mins | In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them and review safe computing habits that can be applied at home and in the workplace. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.

 


 

Single Topic Courses

Phishing

12 mins | Because today’s computers and networks are heavily defended from a direct assault, hackers are now much more likely target end-users when trying to break in. This course teaches best practices for recognizing and preventing both phishing and spear-phishing attacks.

Defeating Social Engineers

10-17 mins | End users have what a hacker wants – a computer that’s behind the network firewall, a network username and password, and possibly access to trade secrets, confidential information, and bank accounts. This course will teach end users how to identify and avoid giving away sensitive information to these hackers.

Protecting Mobile Data and Devices

8 mins | Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed to many of the same risks as a desktop computer.

Appropriate Use of Social Media

14 mins |  Social media can be an excellent tool to connect and interact with customers, show thought leadership, and build a brand, but it also poses unique security, HR, and public relations challenges. This course covers social media best practices.

Working Remotely

12 mins | Mobile computing devices like laptops, smartphones, and tablets can be found everywhere – at home, in the office, and everywhere in between. These devices, combined with high speed wireless connections, make working remotely easier than ever. However, working outside of a company’s secured facilities expose an organization’s physical and information assets to additional threats.

Password Management

15 mins | Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This course shows the tactics hackers use to compromise accounts and the password security best practices that can help prevent that from happening.

Physical Security

10 mins | Your personal safety at work is of paramount importance. This course is designed to teach employees how to protect an organization from criminals, espionage, workplace violence, natural disasters, and other threats.

Email Security & Instant Messaging Security

11 mins | Email and instant messaging (IM) are essential communication tools that most people use just about every day. They’re incredibly useful applications because they allow you to quickly and efficiently exchange messages and files with just about anyone else in the world. However, it’s a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you.

Cloud Security

9 mins | Cloud-based services offer incredible convenience and can help people be more productive, especially while on the go. But they also create new security challenges, because the security of any information stored on the cloud is only as good as the security of the service provider who holds it. This course uses high-quality video and real-world simulations to teach best practices for cloud security.

Internet of Things & Home Security

10 mins | Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of Things” (IoT), which holds the promise of adding a whole new level of convenience and connectedness to everyday life. Having that many new, connected computing devices, most of which record activity, presents new challenges for security and privacy.

Incident Reporting

7 mins | Reporting incidents of suspicious activity and the loss of assets or sensitive information is extremely important. In this module, employees will learn about common physical and information security incidents that should be reported and how to report them.

 


 

Standards & Compliance

HIPAA/HITECH Privacy for Business Associates

60 mins | The final Omnibus rules for the Health Insurance Portability and Accountability Act (HIPAA), as amended by the HITECH Act places greater responsibility on all Business Associates to safeguard Protected Health Information. Business Associates and their subcontractors will, for the first time, have some absolute obligations for how they can use and disclose protected health information that they handle on behalf of the covered entity. This privacy course is specifically tailored to help employees of business associates understand what information is private, why it is private and what they can do to protect it.

HIPAA/HITECH Privacy for Covered Entities

60 mins | The final Omnibus rule greatly enhances a patient’s privacy protections, provides individuals new rights to their health information, and significantly strengthens the government’s ability to enforce the law. Training employees to safeguard Protected Health Information (PHI) is a requirement of all “covered entities” based on the Health Insurance Portability and Accountability Act of 1996, as amended by the HITECH Act. This privacy course is specifically tailored to help healthcare employees understand what information is private, why it is private and what they can do to protect it.

HIPAA/HITECH Information Security

45 mins | Protecting your personal and company data is as crucial as protecting your bank account. Hackers, identity thieves, and malicious programs roam the Internet searching for easy targets. Learn the fundamentals of information security including key principles, concepts, vulnerabilities, threats, and how to counter them. By mastering the information presented in this course you will be able to effectively defend your personal and workplace data from malicious threats.

HIPAA/HITECH Medicare Fraud, Waste, and Abuse

15 mins | Fraudulent and abusive practices put the health and welfare of millions of Americans at risk, and cost U.S. taxpayers billions of dollars every year. If organizations do not have programs designed to prevent, detect, and correct noncompliance, patients’ Medicare services might be delayed, they might not be able to use the providers of their choice, or their benefits could be denied. In this course, you will learn how you can help fight fraud, waste, and abuse in Medicare programs, including, what the major laws are that prohibit abusive practices, how to recognize unlawful activities, how to prevent, correct, and report fraudulent, wasteful, and abusive actions, and where to get help.

GDPR Introduction and Overview

20 mins | This comprehensive course is delivered in a series of short, concise modules targeted to specific areas of the law and targeted to defined roles contained within the GDPR. Participants will learn the fundamentals of the new regulations and the key concepts behind them. By the end of this course series, learners will be able to recognize situations where the GDPR comes into play and what to do when they do encounter data that falls under GDPR regulations. Target Audience – All Users/General Audience. Please Note: This course covers information for those who reside in an EU member country.

GDPR Key Principles of the GDPR

15 mins | This comprehensive course is delivered in a series of short, concise modules targeted to specific areas of the law and targeted to defined roles contained within the GDPR. Participants will learn the fundamentals of the new regulations and the key concepts behind them. By the end of this course series, learners will be able to recognize situations where the GDPR comes into play and what to do when they do encounter data that falls under GDPR regulations. Target Audience – Data Handlers, IT/Security, DPOs, Staff, Managers, & Execs. Please Note: This course covers information for those who reside in an EU member country.

GDPR Transfers of Data Outside of the EU

15 mins | This course is one of a multi-part series that covers the fundamentals of the EU’s General Data Protection Regulation, or GDPR, as well as its origins and key concepts. The GDPR contains principles for protecting the privacy of EU citizens’ personal data. When it takes effect in 2018, every organization, worldwide, that gathers, stores, or processes this data in any way, must comply with the strong data protections required under the GDPR. In this module, you learn how the GDPR affects our organization when transferring or receiving EU citizens’ private information outside the borders of the UK and EU.

GDPR Differences of EU vs US Privacy

8 mins | This course introduces users to the differences between privacy expectations and requirements between the United States and UK and EU. Recognizing and highlighting differences to ensure compliance is key to navigating GDPR compliance.

GDPR Processing Personal Data

8 mins | This course is one of a multi-part series that covers the fundamentals of the EU’s General Data Protection Regulation, or GDPR, as well as its origins and key concepts. With GDPR’s regulatory components of transparency, consent, notification and rights to access of data, the processing of personal data has taken on new levels of importance. This course was created to address the new regulations of processing personal data.

GDPR Data Protection Requirements

15 mins | This course is one of a multi-part series that covers the fundamentals of the EU’s General Data Protection Regulation, or GDPR, as well as its origins and key concepts. Our data protection requirements course introduces users to the new considerations to be made with the introduction of GDPR.

US Organizations and the GDPR

20 mins | GDPR is a global regulations and impacts companies that do business in the EU. Non-EU companies that process personal data of EU citizens are subject to EU rules even if they are not located in Europe. This course is designed to introduce US based companies to GDPR regulations that impact their business.

PCI Essentials for Cardholder Data Handlers and Supervisors

25 mins | This course teaches employees and supervisors what PCI DSS is, how it affects your organization and the best practices they should follow to protect cardholder data and detect and prevent fraud.

PCI Requirements Overview for IT Professionals

40 mins | This course teaches I.T. professionals what PCI DSS is, how it affects your organization, how to comply with the 12 requirements and the best practices that front-line staff should follow to protect cardholder data and detect and prevent fraud.

Privacy and Data Protection

30 mins | This course will help employees understand what information is private, why it is private, and what they can do to protect it throughout the data lifecycle, which is the life of a piece of information, whether in paper or digital format, from creation to destruction within an organization.

Data & Records Retention

35 mins | Data in electronic and hard copy format within organizations is growing at a rate of about 125% per year and yet only 20% of that data is actually used to conduct business. Managing all of that data can become an administrative nightmare for you and the organization as a whole. This is especially true when litigation is pending and we must sift through all of our records to find certain pieces of data.

 


 

Micro Learning Mini Modules

In-person Social Engineering

4 mins | Social engineering attacks can often occur in person. In-person social engineers will use information obtained both online and offline, along with lies and manipulation, to gain access to your systems and facilities.

Social Engineering – How It Works

4 mins | The more you learn about how social engineering works, the better you can defend yourself and your organization against social engineering attacks.

Online and Targeted Social Engineering

4 mins |  Social engineers may use both technical and non-technical methods in a “targeted attack,” aimed at select individuals. Because these attacks are so tailored, they can be very difficult to recognize and therefore, very effective.

Social Engineering – Countermeasures and Incident Response

4 mins | Understanding what to do in the event of a social engineering attack can be just as important as prevention. Utilizing effective countermeasures and incident response procedures will help you to avoid falling prey to social engineers.

Appropriate Use of Social Media

5 mins | Properly used, social media can be a great asset to any organization. However, there are many pitfalls associated with using social media, especially since these sites tend to blur the lines between what’s personal and professional.

Secure Use of Social Media

4 mins | Improper use of social media can also expose you to a wide range of security and privacy issues, malicious software, and scams.

Social Media Best Practices

4 mins | When you post a comment, file, image and video to social media platforms, you never really know who’ll wind up seeing it. Whatever you choose to express can also be quickly copied and spread far and wide with or without your knowledge.

Outwitting Internet Phishers

7 mins | Phishers will typically send fake emails that appear to come from someone you trust, such as a bank, credit card company, or popular website. The email may ask you to “confirm your account details” and direct you to a website that looks just like the real website, but whose sole purpose is stealing your information.

Outwitting Spear Phishers

4 mins | Whereas Internet phishers target a wide audience by sending their fake emails to any address they can find, Spear Phishers target a select group, or a few individuals, with a highly tailored message. This method is much harder to counter because the email messages can seem so authentic.

An Introduction to Insider Threats

7 mins | Across the globe, organizations spend countless hours working to keep sensitive data out of the hands of cybercriminals. This task has become even more difficult to manage due to an increasing number of data compromises that stem from insider threats. This threat from within, or “insider threat” can be successfully addressed using the strategies shared in this module.

Protecting Kids from Cyberbulling

4 mins | Cyberbullies use electronic communications to torment others with an onslaught of teasing, humiliation, and threats to do harm. Research suggests that cyberbullying may be a preferred attack method due to the perceived anonymity of the Internet. Fortunately, by applying the recommendations presented in this module you can help prevent cyberbullying.

Protecting Mobile Devices and Data

4 mins | Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed to many of the same risks as a desktop computer.

Additional Best Practices for Mobile Devices

4 mins | Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed to many of the same risks as a desktop computer.

Ransomware – How to Defend Yourself

4 mins | Ransomware is a type of malicious software used by hackers to encrypt files and other functions from a user until the victim pays a “ransom.” This form of cyberattack has become one of the most used and most costly threats to businesses and individuals alike.

Protecting Against Malicious Insiders

8 mins | The threat is real. It’s taking place somewhere, right now. A malicious insider has decided to mount a cyberattack against your organization from the inside out. This malicious insider will stop at nothing to get the data they need to commit theft, fraud or sabotage. By applying the strategies provided in this module and being willing to take action you can help rid the workplace of these malicious insider threats.

Preventing Malware – Mobile Devices

3 mins | Mobile devices, including smartphones and tablets, have become so common in the workplace that many organizations now consider them essential tools. Unfortunately, mobile devices come with many of the same malware threats as computers and laptops, and even some of their own, including malicious app downloads.

The Malware Threat

5 mins | Malware is any type of software that is intended to damage or disable computer systems. It is often used to steal information, destroy or lock users from data, or disrupt operations.

 


 

Role-Based Courses

Security Awareness for Managers

30 mins | This course is designed to educate managers to lead by example and encourage their teams to conduct everyday business in a responsible and secure way that reduces organizational risk, increases productivity and complies with policies, laws and regulations.

Information Security for Executives

14 mins | With the goal of breaching your network, Cybercriminals have stepped up their efforts to target C-level executives, upper management and those with privileged access to an organization’s systems with a variety of focused attacks. They are out to steal money, personal /credit info of clients and customers as well as intellectual property and other assets from organizations across the globe. And if yours is targeted, there may be more at stake than just loosing data.

Privileged User Security

20 mins |  Hackers and cybercriminals specifically target privileged users. After all, they have access to an organization’s most prized data. This course will teach privileged users the security best practices they’re expected to follow in order to defend against hackers.

Baseline Information Security Training for IT Professionals

60 mins | This course is designed to provide fundamental information security knowledge that every employee in the IT Department must have in any organization. This course is easily customized to fit your particular policies, procedures, best practices & guidelines.

Introduction to the OWASP Top 10

15 mins | The Open Web Application Security Project (OWASP is a global community focused on improving the security of web application software. The OWASP Top Ten list is highly respected and has been adopted by, among other organizations, the Payment Card Industry (PCI) Security Standards Council.