
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses
This module teaches middle school students how to use computers and the internet safely. 3:26 minutes

Computer Security with Paige the Panda
This module for kids talks about how to use computers safely.
3:12 minutes

EAL Browser Event
This module teaches users how to browse the web safely.
2:34 minutes

Sensitive Data Exposure
Our Sensitive Data Exposure module outlines the common risks of mishandled personal information. 3:47 minutes

Public Networks and Computers
This training module will teach learners how to limit security risks while using public networks and computers. 4:14 minutes

Spoofed Email Address
Learn the warning signs for spoofed emails. 0:37 minutes

Better Together (Two Factor Authentication)
This micro-learning module explains two-factor authentication in a delicious way!
0:35 minutes

Secure Password Storage (Video)
This short video introduces methods employees can use to store passwords securely. Topics include physical security and password storage applications. 1:05 minutes

Creating Strong Passwords (Video)
This short video details the process of choosing secure, robust passphrases in under one minute.
0:46 minutes

Securing Privileged Access
This module will discuss the issue of securing privileged access, including the fundamentals of access security and the dangers that can be caused by a misused account. 5:50 minutes

Introduction to Account Takeover Attacks (ATO)
Learn about account takeover attacks: what they are, what they aim for, and how to keep yourself safe from them.
5:32 minutes

Password Security for Educators
Our interactive Password Security module stresses the importance of following internal policies regarding access to sensitive student information. 10:01 minutes

Password Security for Financial Institutions
Our interactive Password Security module stresses the importance of following internal policies regarding access to sensitive financial information. 9:32 minutes

Password Security for Healthcare Managers
It will show healthcare managers how to pick strong passwords and keep them safe, how to securely set passwords for employees and how to help employees with password security related challenges. 10:32 minutes

Password Security for Healthcare Executives
This module will teach healthcare executives how to create strong passwords and keep them safe, and how they can support secure password management policies and habits within their companies. 10:46 minutes

Password Security for Healthcare Professionals and Providers
This module stresses the importance of following internal policies regarding creating complex, effective passwords to protect access to protected health information. 9:25 minutes

Password Security for Managers
This module will show managers how to pick strong passwords and keep them safe, how to securely set passwords for employees and how to help employees with password security related issues. 11:50 minutes

Password Security for Executives
This module will teach executives how to create strong passwords and keep them safe, and show how they can personally support secure password management policies and habits within their companies. 10:39 minutes

Phishing Assessment (LinkedIn) W/ Hints
This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

Phishing Assessment (Capital One) W/ Hints
This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

Suspicious Hosts Assessment (Google)
This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. 0:30 minutes

Phishing Assessment (LinkedIn)
This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications. 0:30 minutes

Phishing Assessment (Capital One)
This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications. 0:30 minutes

Breach Notification
This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures.
8:14 minutes

Recognizing Phishing Emails (Video)
This short video covers some of the common signs of phishing emails and how to recognize malicious links. 2:27 minutes

What Is Phishing? (Video)
This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information. 1:46 minutes

Request your free demo today.
Please complete and submit the form below.
