Providing Award-Winning Cybersecurity Solutions For More Than 20 Years
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses
Conclusion
This module will review critical lessons from your security awareness training to increase team retention of core program content. 2:05 minutes
Introduction
The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives. 5:13 minutes
Social Engineering
Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests. 12:54 minutes
Securing Home Networks and Devices
This interactive module shows learners how to implement many of the same network protections at home that IT staff use at the office. 3:07 minutes
Secure Connection (Data In Transit)
This module highlights the importance of using secure connections when sending sensitive data over the Internet. 0:35 minutes
Safe Web Browsing
Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. 10:58 minutes
Removable Media
This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media. 10:47 minutes
Password Security
Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. 21:16 minutes
One Wrong Move (Phishing)
This one-minute video shows the consequences of a phishing attack. 1:00 minutes
Malware Brief
This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files. 3:21 minutes
Malware
This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions. 17:01 minutes
Is It Safe? (Mobile Security)
This short video reinforces the importance of using trusted publishers when installing mobile applications. 1:00 minutes
How Secure Is Public WiFi? (Public WiFi)
In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers. 1:00 minutes
Request your free demo today.
Please complete and submit the form below.
Are you ready?
Take the next steps
Reach out to one of our cybersecurity experts today.