Course Category: courseduration::4

  • SIM card hijacking

    About this video training: SIM card hijacking can be used to bypass Two Factor Authentication (2FA). It’s a hacking method that reassigns your phone number to a different SIM card. Most cellular service providers can implement additional security measures to prevent your SIM cards from being highjacked. Please complete this training as soon as possible. […]

  • Blame Game

    About this video training: Data breaches can be dangerous and damaging to brand reputations. Human behavior is the most common cause of a breach, and it could be caused by an employee of any level. Follow your organizations policies regarding the use of personal media devices at work. Please complete this training as soon as […]

  • Password Spraying

    About this video training: Password spraying is a technique used by hackers to guess users’ passwords by attempting to log into their accounts with commonly used passwords, such as,”password1″. A secure method for password creation is to use a combination of letters, numbers and special characters. It’s also important to remember to not use the […]

  • Cracked E-mail Extortion

    About this video training: Recently, e-mails have been going around where a “hacker” claims to have “cracked your devices”, and also to have been watching you through your computer’s webcam. Most of these claims turn out to be bluffs on the part of the “hacker” in an attempt to scare you into doing what they […]

  • Don't Hate on the Update

    About this video training: Hackers can bypass a company’s Mobile Device Management System. This course covers what every employee can do to protect their organization from cybercriminals. Please complete this training as soon as possible. We hope you enjoy it!

    Preview this course - (1 preview lessons)

  • You Never Call... (Business Email Compromise)

    Preview this course - (1 preview lessons)

  • Password Re-Use

    Preview this course - (1 preview lessons)

  • Keyloggers

    About this training: While trying to give his all to a high-profile legal case, Dan chooses to cut a few corners regarding the firm’s IT Security procedures. The result places his entire career at stake when hackers find a way to gain his exact login credentials. This training focuses on increasing awareness around keystroke loggers […]

  • PDF Attachments

    About this training: When it comes to spear phishing attacks, there are a number of clues that a user can look for to make sure they don’t fall victim to a hacker. These clues were overlooked, and now, the Prime Minister must take the stage to discuss the resulting security breach…as well as her own […]

  • Clean Desk Policy

    About this training: In this video, one of the world’s largest oil producers has roughly 35,000 of its computers shut down in a matter of hours due to a malware attack. After turning off the remaining systems, they scrambled for days trying to figure out what to do. Even after paying a large sum of […]

    Preview this course - (1 preview lessons)