Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Phishing Assessment (LinkedIn) W/ Hints

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

Phishing Assessment (Capital One) W/ Hints

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

Suspicious Hosts Assessment (Google)

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. 0:30 minutes

Phishing Assessment (LinkedIn)

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

Phishing Assessment (Capital One)

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

Breach Notification

This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. 8:14 minutes

Recognizing Phishing Emails (Video)

This short video covers some of the common signs of phishing emails and how to recognize malicious links. 2:27 minutes

What Is Phishing? (Video)

This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information. 1:46 minutes

EAL Phishing

This module teaches learners how to avoid falling victim to phishing. 2:11 minutes

Phishing for Financial Institutions

This interactive training explains how financial sector employees and customers are targeted by phishing attacks and teaches users how to recognize phishing attacks. 10:23 minutes

Phishing for Healthcare Executives

This module explains the risks phishing poses to healthcare executives and organizations, and suggests ways executives can work with their security teams and staff to keep patient information secure. 11:46 minutes

Phishing for Healthcare Managers

This module discusses phishing in detail and teaches healthcare managers how to detect phishing attempts. 13:39 minutes

Phishing for Healthcare Professionals and Providers

Healthcare professionals with access to protected health information are popular hacker targets. This module will show how to identify phishing attacks, and how to report phishing attacks. 11:07 minutes

Phishing for Educators

This interactive training explains how education-sector employees and students are targeted by phishing attacks and how to identify fake requests for student records. 9:14 minutes

Phishing for Executives

This module explains the risks phishing poses to executives and organizations, and suggests ways executives can work with their security teams and staff to keep information secure. 10:04 minutes

Phishing for Managers

This module discusses phishing in detail and teaches managers how to detect phishing attempts. It also outlines how managers can work with their teams to protect their company from phishing attacks. 11:02

Marine Lowlifes: Spearphish

Target sighted! Follow the hunt of that vicious but sometimes misaimed predator, the Spearphish. 1:30 minutes

Marine Lowlifes: Whaling Shark

The wonders of nature are displayed up close as the Whaling Shark chases its prey, the powerful and important Whale. 1:23 minutes

Marine Lowlifes: Common Phish

Dive into the Sea of Emails for a closer look at one of the oldest scams still swimming today: the Common Phish. 1:25 minutes

Marine Lowlifes: Clone Phish

Sink into the depths to observe the Clone Phish, which disguises itself as a previously trustworthy message to lure in prey. 1:18 minutes

WORKed Episode 2: Evite

I doth see a vision of scammery! Help your employees avoid phishing attacks with this WORKed training module. 2:24 minutes

Vishing

This interactive training module covers voice phishing, or vishing, a simple but effective technique cybercriminals and scam artists use to collect confidential information. 6:44 minutes

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

2:40 minutes

SMiShing

SMS Phishing, or SMiShing, is used by cybercriminals to collect valuable information and distribute malware. This module includes effective ways to stop SMiShing attempts. 4:58 minutes

Reporting Phishing Emails

Our Reporting Phishing Emails module reviews the functionality of the PhishNotify button, which allows users to report suspicious emails to system administrators through Outlook, Office 365 and Gmail. 1:10 minutes

Phishing In Brief

This module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate. 2:49 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started