Providing Award-Winning Cybersecurity Solutions For More Than 20 Years
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses
Creating Strong Passwords (Video)
This short video details the process of choosing secure, robust passphrases in under one minute. 0:46 minutes
Securing Privileged Access
This module will discuss the issue of securing privileged access, including the fundamentals of access security and the dangers that can be caused by a misused account. 5:50 minutes
Introduction to Account Takeover Attacks (ATO)
Learn about account takeover attacks: what they are, what they aim for, and how to keep yourself safe from them. 5:32 minutes
Password Security for Managers
This module will show managers how to pick strong passwords and keep them safe, how to securely set passwords for employees and how to help employees with password security related issues. 11:50 minutes
Password Security for Executives
This module will teach executives how to create strong passwords and keep them safe, and show how they can personally support secure password management policies and habits within their companies. 10:39 minutes
Phishing Assessment (LinkedIn) W/ Hints
This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes
Phishing Assessment (Capital One) W/ Hints
This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes
Suspicious Hosts Assessment (Google)
This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. 0:30 minutes
Phishing Assessment (LinkedIn)
This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes
Phishing Assessment (Capital One)
This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes
Breach Notification
This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. 8:14 minutes
Recognizing Phishing Emails (Video)
This short video covers some of the common signs of phishing emails and how to recognize malicious links. 2:27 minutes
What Is Phishing? (Video)
This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information. 1:46 minutes
EAL Phishing
This module teaches learners how to avoid falling victim to phishing. 2:11 minutes
Phishing for Executives
This module explains the risks phishing poses to executives and organizations, and suggests ways executives can work with their security teams and staff to keep information secure. 10:04 minutes
Phishing for Managers
This module discusses phishing in detail and teaches managers how to detect phishing attempts. It also outlines how managers can work with their teams to protect their company from phishing attacks. 11:02
Marine Lowlifes: Spearphish
Target sighted! Follow the hunt of that vicious but sometimes misaimed predator, the Spearphish. 1:30 minutes
Marine Lowlifes: Whaling Shark
The wonders of nature are displayed up close as the Whaling Shark chases its prey, the powerful and important Whale. 1:23 minutes
Marine Lowlifes: Common Phish
Dive into the Sea of Emails for a closer look at one of the oldest scams still swimming today: the Common Phish. 1:25 minutes
Marine Lowlifes: Clone Phish
Sink into the depths to observe the Clone Phish, which disguises itself as a previously trustworthy message to lure in prey. 1:18 minutes
Conclusion
This module will review critical lessons from your security awareness training to increase team retention of core program content. 2:05 minutes
Introduction
The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives. 5:13 minutes
WORKed Episode 11: X-Men
Welcome to the danger room. Danger conference room, really. Teach your employees about the importance of mobile security with this WORKed training module. 2:44 minutes
WORKed Episode 10: Travel Stories
Jack gets a little risky on the road. Teach your employees the keys to working remotely with this WORKed training module. 2:46 minutes
WORKed Episode 9: Tailgating
This week, the gang teases Ed and it’s totally justified. Show your employees why physical security is so important with this WORKed training module. 1:17 minutes
WORKed Episode 8: Eagle Eye
Keep your head on a swivel and your screen down. Teach your employees to watch out for shoulder surfing in this WORKed training module. 1:55 minutes