Courses

  • Basic Phishing Tips Interactive

    About this training: Remember, even if an email appears to come from a legitimate source, it could still be a phishing attempt. This brief training will show you an effective way of spotting a phish by taking a moment to look at where links in the email will actually take you. Please complete this training […]

  • Two Factor Authentication Overview

    About this training: Two-factor authentication (or 2FA, for short), is a term used to describe an extra layer of security you can apply to your online accounts. With 2FA enabled, a second piece of “evidence,” in addition to your password, is needed to sign in to your account, making it more difficult for attackers to […]

  • Intro To Phishing

    About this training: Did you know that people are 6 times more likely to open a phishing email than a genuine marketing email? Or that estimates say phishing costs business $3 Billion in losses annually? This short video will remind you of the dangers of phishing as well as some common signs to look out […]

  • Insecure Wi-Fi

    About this training: In this video, we’ll show you the dangers of connecting to public Wi-Fi hotspots. You’ll see a real-life demonstration of how an attacker can steal your information in a shockingly simple way. Please take this training as soon as possible. We hope you enjoy!”

  • PCI Compliance

    About this training: The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle credit cards from the major card issuers including Visa, MasterCard, American Express, Discover, and JCB. The standard is designed to optimize the security of debit, credit and cash card transactions and to protect […]

    Preview this course - (1 preview lessons)

  • Phone Phishing Overview

    About this training: You receive a call. Caller ID says it’s coming from your bank. Safe to answer, right? Think again. With Voice over IP (VoIP) technology, caller ID can easily be falsified, making a call appear to originate from any number you choose. And you can bet that criminals will take advantage of this […]

  • Office Attachments Interactive

    About this training: Over time, documents and Office files have evolved. They’re no longer simple static files with little potential for harm. Products like Microsoft Word and Adobe PDF now include macro and scripting capabilities, making it possible for documents to work in much the same way as executable programs, right down to the ability […]

    Preview this course - (1 preview lessons)

  • HIPAA Compliance

    About this training: The Health Insurance Portability and Accountability Act (HIPAA) provides for the protection of individually identifiable health information that is transmitted or maintained in any form or medium. The privacy rules affect the day-to-day business operations of healthcare providers, health plans, healthcare clearing houses, and other similar organizations. This short video will explain […]

  • GLBA Compliance

    About this training: The Gramm-Leach-Bliley Act (GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers’ private information. Maintaining GLBA compliance is critical for any financial institution, as violations can be very costly. This […]

  • IT Advanced Training

    About this training: As an IT professional, you recognize the importance of securing your network, but may not be sure if you’re doing all the right things. This training is for you. In this video, we’ll cover some core concepts of network security including the principal of least privilege, vulnerability scanning, and patch management. Please […]

    Preview this course - (1 preview lessons)