Course Category: courseduration::4

  • Office Macros

    About this training: In this video, we find out exactly how a criminal was able to take over Fortune 500 CEO Pat’s computer and read his email, thus finding out his wife’s email address. She was sent an “anonymous” email telling her to check the Amber Ashlyn dump site for Pat’s email address, thus exposing […]

    Preview this course - (1 preview lessons)

  • Malvertising

    About this training: In this video, a meeting starts late after a link to Amazon prompted a software update – an update that IT knew nothing about. It turns out that the culprit is “malvertising.” Watch and see how to avoid falling for fake ads and links found from internet searches. Please complete this training […]

    Preview this course - (1 preview lessons)

  • Ransomware Is Everywhere

    About this training: In this video, an entire city shuts down and panic ensues; crucial city systems are being held up by hackers using ransomware. Either the city can try to gain access themselves or pay the perpetrators. The first step is tracking down where the ransomware came from and understanding the breakdown in simple […]

    Preview this course - (1 preview lessons)

  • Macro Malware

    About this training: A routine day at air traffic control turns dangerous when the system begins to glitch. Macro-based malware made it into the organization’s system, rendering their equipment useless. The result could put innocent lives at stake. Watch to see how to avoid falling victim to macro malware. Please complete this training as soon […]

    Preview this course - (1 preview lessons)

  • 2-Factor Account Takeover

    About this training: 2-Factor Authentication using your mobile phone (SMS) is a great security measure, and countless end-users have it in place – but that’s bad news for Nico as he tries to use some stolen credentials. Nico and his hacking buddy think of a scheme to get around 2FA via SMS, opening the potential […]

    Preview this course - (1 preview lessons)

  • Smishing

    About this training: While chatting over lunch, Megan receives a text from her bank, alerting her to suspicious activity. Worried, she quickly begins to follow the instructions, but before she can fully act, her friend intervenes with a warning. The text could be a “Smish.” Watch and learn how important it is to recognize text […]

    Preview this course - (1 preview lessons)

  • Email Misdelivery

    About this training: In this story-based video, a co-worker sends an email with sensitive data to the wrong client, and our main character, Paul, is incredibly upset. He spent years cultivating his client, and with a single mis-addressed email, all of that could be in jeopardy. When busy multitasking and dealing with sensitive information, it’s […]

    Preview this course - (1 preview lessons)

  • Mobile Device Charging

    About this training: The breach was massive, exposing millions of customers’ personal data and credit history. They deserve full disclosure to protect themselves, but the CEO isn’t sure how the hack even happened. Going step-by-step through the day of the breach with the help of his CSO, they manage to uncover what must have occurred […]

    Preview this course - (1 preview lessons)

  • Mobile Devices

    About this training: In this video, a young man discovers on his first day of work that criminals stole all the company’s paychecks and direct deposited the funds to a fraudulent account. Worse of all, something someone did on their personal device was to blame. Watch to see what happens next… Please complete this training […]

    Preview this course - (1 preview lessons)

  • Two Factor Authentication Overview

    About this training: Two-factor authentication (or 2FA, for short), is a term used to describe an extra layer of security you can apply to your online accounts. With 2FA enabled, a second piece of “evidence,” in addition to your password, is needed to sign in to your account, making it more difficult for attackers to […]