Course Category: courseduration::5

  • Cybersecurity Culture

    About this video training: Usually, a rise in geopolitical conflict comes hand in hand with cyber threats increase. This course covers what happens when every employee is proactively responsible for cybersecurity within their organization and helps foster a culture of cybersecurity awareness. Please complete this training as soon as possible. We hope you enjoy it!

  • Catphishing

    About this video training: You might be aware of catfishing, a type of online deception in which a person is lured into a romantic relationship by a fictional persona. But did you know about catphishing? Catphishing (spelled with “ph”) is a similar practice by which a bad actor creates a relationship with a corporate victim […]

  • Malicious Apps

    About this video training: Downloading apps from any mobile app store can be more dangerous than you think! This course covers how to recognize a malicious app and keep hackers from installing malware on your devices. Please complete this training as soon as possible. We hope you enjoy it!

  • 2FA Bots

    About this video training: Websites such as banking and investment accounts, crypto wallets, retirement platforms, and even social media are more vulnerable than ever due to the massive increase in crimeware services available on the Dark Web. This training explores how hackers use 2FA bots to intercept two-factor authentication codes. Please complete this training as […]

  • Identity Protection

    About this video training: Personal information theft is more common than you think. This course covers how you can protect your identity and avoid having your data stolen. Please complete this training as soon as possible. We hope you enjoy it!

  • Stored Document Integrity

    About this video training: This course covers important topics around ensuring document integrity and making sure you verify integrity before distributing. Please complete this training as soon as possible. We hope you enjoy it!

  • Watering Hole Attacks

    About this video training: Recently, experts have discovered a critical vulnerability called “Log4j”. This vulnerability could potentially allow attackers to access entire networks, infect systems with malware, run any code, delete or encrypt files, and gain access to data. This training covers one of the techniques hackers could use to exploit it: “watering hole attacks.” […]

  • The offer - Personal Data & PII (Personal Identifiable Information)

    About this video training: Beware! Your PII is a lot more valuable than you can imagine. Properly secure personal data is crucial to prevent fraudulent activities. Please complete this training as soon as possible. We hope you enjoy it!

  • Job post scams - Social engineering

    About this video training: Social engineering is the manipulation of people’s emotions so they give up confidential information. Please complete this training as soon as possible. We hope you enjoy it!

  • Voicemail Fail

    About this video training: If you click on a voice attachment that doesn’t open an audio player, check your company guidelines to report it to the appropriate resources. Inspect e-mails that contain attachments with extra scrutiny. Be mindful of anomalies such as attachment type, spelling or grammatical errors. Please complete this training as soon as […]