Multi-Topic Foundational Courses
Security Awareness Fundamentals Theme
30 min | Employees will master the fundamentals of information security including key threats and how to counter them. Key Topics: password management, identity theft, malware, social engineering, phishing, physical security, travel safety, mobile data, privacy and acceptable use.
Human Firewall Theme: Security Awareness and Literacy
85-90 min | One course that covers every topic required by major standards and regulations. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.
Strongest Link Theme - Security Awareness and Literacy
50-60 min | Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.
A Day in the Life Theme - Security Awareness
65-75 min | In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them, and review safe computing habits that can be applied at home and in the workplace. Key Topics: password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies, incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.
Single Topic Courses
Defeating Social Engineers
Protecting Mobile Data and Devices
Appropriate Use of Social Media
15 min | Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This course shows the tactics hackers use to compromise accounts and the password security best practices that can help prevent that from happening.
10 min | Your personal safety at work is of paramount importance. This course is designed to teach employees how to protect an organization from criminals, espionage, workplace violence, natural disasters, and other threats.
Email Security & Instant Messaging Security
11 min | Email and instant messaging (IM) are essential communication tools that most people use just about every day. They’re incredibly useful applications because they allow you to quickly and efficiently exchange messages and files with just about anyone else in the world. However, it’s a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you.
9 min | Cloud-based services offer incredible convenience and can help people be more productive, especially while on the go. But they also create new security challenges, because the security of any information stored on the cloud is only as good as the security of the service provider who holds it. This course uses high-quality video and real-world simulations to teach best practices for cloud security.
Internet of Things & Home Security
10 min | Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of Things” (IoT), which holds the promise of adding a whole new level of convenience and connectedness to everyday life. Having that many new, connected computing devices, most of which record activity, presents new challenges for security and privacy.
7 min | Reporting incidents of suspicious activity and the loss of assets or sensitive information is extremely important. In this module, employees will learn about common physical and information security incidents that should be reported and how to report them.
Standards & Compliance
HIPAA/HITECH Privacy for Business Associates
HIPAA/HITECH Privacy for Covered Entities
HIPAA/HITECH Information Security
HIPAA/HITECH Medicare Fraud, Waste, and Abuse
US Organizations and the GDPR
GDPR Introduction and Overview
GDPR Key Principles of the GDPR
GDPR Transfers of Data Outside of the EU
GDPR Differences of EU vs US Privacy
GDPR Processing Personal Data
GDPR Data Protection Requirements
PCI Essentials for Cardholder Data Handlers and Supervisors
PCI Requirements Overview for IT Professionals
Privacy and Data Protection
Data & Records Retention
Micro Learning Mini Modules
In-person Social Engineering
Social Engineering – How It Works
Online and Targeted Social Engineering
Social Engineering – Countermeasures and Incident Response
Appropriate Use of Social Media
Secure Use of Social Media
Social Media Best Practices
Outwitting Internet Phishers
Outwitting Spear Phishers
An Introduction to Insider Threats
Protecting Kids from Cyberbulling
Protecting Mobile Devices and Data
Additional Best Practices for Mobile Devices
Ransomware – How to Defend Yourself
Protecting Against Malicious Insiders
Preventing Malware – Mobile Devices
The Malware Threat
Security Awareness for Managers
Information Security for Executives
Privileged User Security
Baseline Information Security Training for IT Professionals
Introduction to the OWASP Top 10