Courses

  • HIPAA Compliance Interactive

    About this training: The Health Insurance Portability and Accountability Act (HIPAA) provides for the protection of individually identifiable health information that is transmitted or maintained in any form or medium. The privacy rules affect the day-to-day business operations of healthcare providers, health plans, healthcare clearing houses, and other similar organizations. This easy-to-follow interactive training will […]

  • Zip Attachments

    About this training: ZIP files are the most widely used format of file archives. Simply put, a ZIP file contains one or more other files or folders, compressed into a single file, typically for the purposes of sharing. While this is a handy tool, it also presents an opportunity for criminals who want to disguise […]

  • Phone Phishing Interactive

    About this training: The prevalence of phishing and email fraud has made people wary of giving out personal information online. Mistakenly, we trust phone numbers and SMS messages because we don’t think fraudsters will bother with the effort and cost needed to set them up. Unfortunately, it’s much easier than you may think to use […]

  • Social Media Interactive

    About this training: With so many users, Facebook, LinkedIn, Twitter, and other social media sites are a major target for scammers. Scams on or related to social media include phishing, cross-site scripting, clickjacking, survey scams and identity theft. Many also tap into our interest in the news, holiday activities, and other topical events to get […]

  • PII Interactive

    About this training: Virtually every organization acquires, uses and stores personally identifiable information (PII). Most have it for their employees and, depending on their area of business, may also have it for a wider group including customers, patients, residents and students. Organizations are expected to manage this private data appropriately and take every precaution to […]

  • Passwords Interactive

    About this training: Did you know that for less than $20,000 you could build your very own password cracker that, under ideal conditions, could try out more than 100,000,000,000 passwords EVERY SECOND? That means you could churn through every possible 8-letter password in just 2 seconds, and every 9-letter password in under a minute! Needless […]

    Preview this course - (1 preview lessons)

  • PCI Compliance Interactive

    About this training: The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle credit cards from the major card issuers including Visa, MasterCard, American Express, Discover, and JCB. The standard is designed to optimize the security of debit, credit and cash card transactions and to protect […]

  • Credential Harvesting

    About this training: Login credentials, such as your email, username, and password, are a valuable commodity for criminals. Because many people reuse passwords across online services, criminals know that a single username and password could be their ticket to corporate networks and email, bank accounts, social media, and more. This training will introduce you to […]

  • Ten Ways To Spot A Phish

    About this training: Wondering how you can spot a phishing email? This training is short and to the point. In it, we outline the top ten “tells” to look for when you think an email might be phishy. Please complete this training as soon as possible. We hope you enjoy!

  • Phishing Interactive

    About this training: Phishing is the word used when a cybercriminal sends you some sort of electronic message to trick you into doing something insecure. The “fishing” metaphor refers to the idea of getting you on the hook and then reeling you in. The crooks behind this sort of crime, who are known colloquially as […]

    Preview this course - (1 preview lessons)