Multi-Topic Foundational Courses
S.H.I.E.L.D training foundational courses are aligned with NIST standards. Not only will your organization demonstrate due diligence and compliance with major security standards, but your employees will be empowered to keep your network secure from insider threats. S.H.I.E.L.D foundational courses expose learners to current cybersecurity risks and how to effectively address them. With four options to choose from, we ensure that our curricula are fresh, engaging, and effective.
Security Awareness Essentials
30 min | Employees will master the fundamentals of information security including key threats and how to counter them. Key Topics: password management, identity theft, malware, social engineering, phishing, physical security, travel safety, mobile data, privacy and acceptable use.
70 min | One course that covers every topic required by major standards and regulations. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.
Strongest Link Theme - Security Awareness and Literacy
50-60 min | Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.
A Day in the Life Theme - Security Awareness
65-75 min | In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them, and review safe computing habits that can be applied at home and in the workplace. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.
Single Topic Courses
S.H.I.E.L.D single topic courses provide employers with a high ROI and learners with more in-depth insight to relevant cybersecurity topics. These courses are key and ensure your employees receive comprehensive cybersecurity training that aligns with best practices. To keep the time commitment low for busy employees, each course is packed with real-world relevant information delivered in an average time of 12 minutes. Work with your dedicated Cybersecurity Representative to create an on-going curriculum that deploys courses on a regularly scheduled basis throughout the year. By keeping cybersecurity issues fresh and foremost in employees’ minds you are equipping them with the knowledge and tools necessary to be ready to make the right decision when a threat presents itself.
Defeating Social Engineers Standard & Advanced
Protecting Mobile Data and Devices
Appropriate Use of Social Media
15 min | Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This course shows the tactics hackers use to compromise accounts and the password security best practices that can help prevent that from happening.
10 min | Your personal safety at work is of paramount importance. This course is designed to teach employees how to protect an organization from criminals, espionage, workplace violence, natural disasters, and other threats.
Email Security & Instant Messaging Security
11 min | Email and instant messaging (IM) are essential communication tools that most people use just about every day. They’re incredibly useful applications because they allow you to quickly and efficiently exchange messages and files with just about anyone else in the world. However, it’s a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you.
Security Awareness for the Home
7 min | Threats to our home network can quickly turn into threats to our workplace infrastructure and vice-versa. To combat against threats on all fronts, we must learn to practice safe computing habits both in the home and in the workplace. Participants will learn techniques to develop a regime of security-conscience behavior that will help keep important data safe from cybercriminals.
9 min | Cloud-based services offer incredible convenience and can help people be more productive, especially while on the go. But they also create new security challenges, because the security of any information stored on the cloud is only as good as the security of the service provider who holds it. This course uses high-quality video and real-world simulations to teach best practices for cloud security.
Internet of Things & Home Security
10 min | Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of Things” (IoT), which holds the promise of adding a whole new level of convenience and connectedness to everyday life. Having that many new, connected computing devices, most of which record activity, presents new challenges for security and privacy.
7 min | Reporting incidents of suspicious activity and the loss of assets or sensitive information is extremely important. In this module, employees will learn about common physical and information security incidents that should be reported and how to report them.
Standards, Compliance & Regulations
Protect what matters most to you by sharpening your employees’ knowledge of relevant standards and compliance requirements. Non-compliance leads to fines, vulnerabilities, brand damage, and loss of customers’ trust. S.H.I.E.L.D offers courses focused on ensuring compliance with industry specific standards. Our offerings range from GDPR, PCI, HIPPA/HITECH to data/record retention and Human Resources related topics. *Some of these courses are not part of our standard training package but these course packages allow our S.H.I.E.L.D. platform to serve as your complete enterprise wide learning management system.
HIPAA/HITECH Privacy for Business Associates
HIPAA/HITECH Privacy for Covered Entities
HIPAA/HITECH Security Awareness
HIPAA/HITECH Medicare Fraud, Waste, and Abuse
How to Comply With the GDPR in the US
GDPR Introduction and Overview
GDPR Key Principles of the GDPR
GDPR for Data Handlers
Navigating the GDPR with our US Partners
GDPR Transfers of Data Outside of the EU
PCI-101: PCI Essentials for Account Data Handlers and Supervisors - DSS 3.2
PCI-120: PCI Requirements Overview for IT Professionals - DSS 3.2
P-101: Privacy and Data Protection
DR-101: Data and Records Retention
Ethics & Code of Conduct for All Employees
Global Anti-Bribery & Corruption Training
Preventing Workplace Harassment for All Employees (Video)
Preventing Workplace Harassment & Discrimination for All Employees (Video)
Preventing Workplace Harassment for Employees (Global)
Preventing Workplace Harassment for Employees
Preventing Workplace Harassment (Standard Video)
Advanced Sexual & Workplace Harassment Prevention
Wage & Hour for Supervisors
Wage & Hour for Employees
Workplace Violence Prevention Training for Supervisors
Handling Complaints for Supervisors
Conducting a Lawful Interview
Understanding and Complying with FERPA
Diversity Training in the Workplace
Preventing Workplace Discrimination
Workplace Bullying Training
Micro Learning Mini Modules
S.H.I.E.L.D micro learning modules are short and targeted courses that can be deployed in a manner that works best for your organization. This flexibility allows you to determine whether you would like to offer employees courses that are available in an on-demand library or simply scheduled and delivered as part of your ongoing curriculum. The mini modules are perfect for allowing and encouraging employees to reference cybersecurity topics based on their needs. You may also choose to deliver micro-learnings as a monthly course in place of or in addition to our single topic trainings.
In-person Social Engineering
Social Engineering – How It Works
Online and Targeted Social Engineering
Social Engineering – Countermeasures and Incident Response
Appropriate Use of Social Media
Secure Use of Social Media
Social Media Best Practices
Outwitting Internet Phishers
Outwitting Spear Phishers
An Introduction to Insider Threats
Protecting Kids from Cyberbulling
Protecting Mobile Devices and Data
Additional Best Practices for Mobile Devices
Ransomware – How to Defend Yourself
Protecting Against Malicious Insiders
The Malware Threat
Role-based courses ensure training is relevant to all employees. These courses are specifically geared to those who are in positions that provide high level access to data and information, therefore making them a prime target of cybercriminals. Ensure your Managers, Executives, and/or IT Professionals gain a deeper understanding of their unique role in keeping the organization secure and are well prepared to address cybersecurity concerns.
Security Awareness for Managers
Information Security for Executives
Privileged User Security
Baseline Information Security Training for IT Professionals
Introduction to the OWASP Top 10