Course Category: courseduration::5

  • Ransomware Pyramid Scheme

    About this training: In this video, there is a parking-lot brawl when one ransomware victim intentionally infects an old acquaintance with ransomware to free his own computer. The criminals have created “Pyramid Scheme Ransomware” and it may start spreading fast. Watch to see what happens next… Please complete this training as soon as possible. We […]

    Preview this course - (1 preview lessons)

  • Internet of Things (IoT)

    About this training: In this episode, a CEO’s celebration takes an ugly turn as he begins to destroy his printer with a champagne bottle. Watch to see what happens next… Please complete this training as soon as possible. We hope you enjoy it!

    Preview this course - (1 preview lessons)

  • GLBA Compliance

    About this training: The Gramm-Leach-Bliley Act (GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers’ private information. Maintaining GLBA compliance is critical for any financial institution, as violations can be very costly. This […]

  • Social Media Interactive

    About this training: With so many users, Facebook, LinkedIn, Twitter, and other social media sites are a major target for scammers. Scams on or related to social media include phishing, cross-site scripting, clickjacking, survey scams and identity theft. Many also tap into our interest in the news, holiday activities, and other topical events to get […]

  • Credential Harvesting

    About this training: Login credentials, such as your email, username, and password, are a valuable commodity for criminals. Because many people reuse passwords across online services, criminals know that a single username and password could be their ticket to corporate networks and email, bank accounts, social media, and more. This training will introduce you to […]

  • Passwords Overview

    About this training: Passwords are an important aspect of computer security – they are the front line of protection for user accounts in a very wide variety of services and systems. With a password, you’re not only securing your vacation pictures at your home from sneaky attackers who can hold them for ransom, but also […]

    Preview this course - (1 preview lessons)