Courses

  • GLBA Compliance Interactive

    About this training: The Gramm-Leach-Bliley Act (GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers’ private information. Maintaining GLBA compliance is critical for any financial institution, as violations can be very costly. This […]

  • IT Basic Training

    About this training: As an IT person, you’ve got a lot on your plate. IT teams are often stretched and, depending on your role, security may not be the first thing you think about on a daily basis. Even so, if we don’t take care of the basics, we’re putting our organizations, our co-workers, and […]

    Preview this course - (1 preview lessons)

  • Passwords Overview

    About this training: Passwords are an important aspect of computer security – they are the front line of protection for user accounts in a very wide variety of services and systems. With a password, you’re not only securing your vacation pictures at your home from sneaky attackers who can hold them for ransom, but also […]

    Preview this course - (1 preview lessons)

  • GDPR Compliance

    About this training: GDPR is short for General Data Protection Regulation, and it’s the name of a law in the European Union (EU) that sets out to protect the rights of individuals in respect of their data. Whether you’re a family bakery in Estonia that keeps a list of local delivery addresses, or a multinational […]

    Preview this course - (1 preview lessons)

  • Ransomware Interactive

    About this training: Ransomware is one of the most widespread and damaging threats that internet users face today. Ransomware gets its name from its method of taking files on a PC or network storage, encrypting them, and then extorting money to unlock the files. Since the infamous “CryptoLocker” first appeared in 2013, a new era […]

    Preview this course - (1 preview lessons)

  • Social Engineering Overview

    About this training: Social engineering is the act of manipulating people into taking a specific action for an attacker’s benefit. You might think it sounds like the work of a con artist – and you’d be right. Since social engineering preys on the weaknesses inherent in all of us, it can be quite effective. And […]

    Preview this course - (1 preview lessons)

  • Phishing Attacks Overview

    About this training: You’d never fall for a real phishing email, right? Think again. Estimates are that 93% of cybersecurity breaches begin with a phishing email. Today’s phishing attacks are more sophisticated than ever. This video will offer a short overview of phishing and explain what you can do to stay off the criminals’ hooks. […]

  • Physical Security and Data Protection Overview

    About this training: With the constant stream of news about online scams and threats, such as phishing and ransomware, it’s easy to forget about the risks present in our day-to-day physical environment. In reality, it’s often far easier than we realize for a motivated criminal to access sensitive company information by simply walking into an […]

    Preview this course - (1 preview lessons)