Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Conclusion

This module will review critical lessons from your security awareness training to increase team retention of core program content. 2:05 minutes

Introduction

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives. 5:13 minutes

Underprotected APIs

This module defines underprotected application programming interfaces (APIs), explains why API security is important and discusses common attack methods and mitigation strategies. 2:54 minutes

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

2:40 minutes

Social Engineering Brief

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests. 3:38 minutes

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person’s identity and verify suspicious requests. 12:54 minutes

Securing Mobile Devices

Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions. 2:23 minutes

Securing Home Networks and Devices

This interactive module shows learners how to implement many of the same network protections at home that IT staff use at the office. 3:07 minutes

Secure Connection (Data In Transit)

This module highlights the importance of using secure connections when sending sensitive data over the Internet. 0:35 minutes

Safe Web Browsing Brief

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections. 4:21 minutes

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. 10:58 minutes

Removable Media and PHI

This module details best practices healthcare professionals can follow to safeguard protected health information and avoid infection from removable media. 8:26 minutes

Removable Media Brief

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices. 2:06 minutes

Removable Media

This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media. 10:47 minutes

Ransomware

Ransomware is malware that holds technology for ransom. This module will show learners how ransomware works, what do if an infection occurs, and how to avoid future infections. 4:38 minutes

Privacy and PII Brief

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII). 4:55 minutes

Privacy & EU GDPR

In this module, we review the main goals and objectives of the new European Union General Data Protection Regulation (EU GDPR). 15:22 minutes

Physical Security Brief

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology. 6:07 minutes

Phishing In Brief

This module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate. 2:49 minutes

PCI DSS Brief

This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data. 11:44 minutes

Password Security Brief

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised. 3:59 minutes

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. 21:16 minutes

One Wrong Move (Phishing)

This one-minute video shows the consequences of a phishing attack. 1:00 minutes

Mobile Wi-Fi Security

Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections. 2:07 minutes

Malware Brief

This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files. 3:21 minutes

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions. 17:01 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started