Course Category: courseformat::html

  • Intro to Phish Threat

    About this training: This is an informative training to describe what Phish Threat is and why your organization is using it. Please complete this training as soon as possible. We hope you enjoy!

  • Cybersecurity Detective Game

    About this training: Oh no! A local business, Hacme Bank, has experienced a breach! They need your help to find out how the breach occurred. For this training, you are stepping into the shoes of famous cybercrime investigator, Detective McLane, to help Hacme Bank get to the bottom of this breach. Good luck, Detective! Please […]

    Preview this course - (1 preview lessons)

  • Basic Phishing Tips Interactive

    About this training: Remember, even if an email appears to come from a legitimate source, it could still be a phishing attempt. This brief training will show you an effective way of spotting a phish by taking a moment to look at where links in the email will actually take you. Please complete this training […]

  • Office Attachments Interactive

    About this training: Over time, documents and Office files have evolved. They’re no longer simple static files with little potential for harm. Products like Microsoft Word and Adobe PDF now include macro and scripting capabilities, making it possible for documents to work in much the same way as executable programs, right down to the ability […]

    Preview this course - (1 preview lessons)

  • HIPAA Compliance Interactive

    About this training: The Health Insurance Portability and Accountability Act (HIPAA) provides for the protection of individually identifiable health information that is transmitted or maintained in any form or medium. The privacy rules affect the day-to-day business operations of healthcare providers, health plans, healthcare clearing houses, and other similar organizations. This easy-to-follow interactive training will […]

  • Zip Attachments

    About this training: ZIP files are the most widely used format of file archives. Simply put, a ZIP file contains one or more other files or folders, compressed into a single file, typically for the purposes of sharing. While this is a handy tool, it also presents an opportunity for criminals who want to disguise […]

  • Phone Phishing Interactive

    About this training: The prevalence of phishing and email fraud has made people wary of giving out personal information online. Mistakenly, we trust phone numbers and SMS messages because we don’t think fraudsters will bother with the effort and cost needed to set them up. Unfortunately, it’s much easier than you may think to use […]

  • Social Media Interactive

    About this training: With so many users, Facebook, LinkedIn, Twitter, and other social media sites are a major target for scammers. Scams on or related to social media include phishing, cross-site scripting, clickjacking, survey scams and identity theft. Many also tap into our interest in the news, holiday activities, and other topical events to get […]

  • PII Interactive

    About this training: Virtually every organization acquires, uses and stores personally identifiable information (PII). Most have it for their employees and, depending on their area of business, may also have it for a wider group including customers, patients, residents and students. Organizations are expected to manage this private data appropriately and take every precaution to […]

  • Passwords Interactive

    About this training: Did you know that for less than $20,000 you could build your very own password cracker that, under ideal conditions, could try out more than 100,000,000,000 passwords EVERY SECOND? That means you could churn through every possible 8-letter password in just 2 seconds, and every 9-letter password in under a minute! Needless […]

    Preview this course - (1 preview lessons)