Courses

  • Social Media

    About this training: In this video, Monica, the wife of Fortune 500 CEO Pat, walks out on him with baby in tow, as she learns that Pat was seeking to have an affair on the extramarital affairs website, AmberAshlyn. We will learn later that Pat was framed through a social engineering attack on dot.social (a […]

  • Office Macros

    About this training: In this video, we find out exactly how a criminal was able to take over Fortune 500 CEO Pat’s computer and read his email, thus finding out his wife’s email address. She was sent an “anonymous” email telling her to check the Amber Ashlyn dump site for Pat’s email address, thus exposing […]

    Preview this course - (1 preview lessons)

  • Rogue USB Device

    About this training: In this video, an attacker breaches a vehicle by taking control of many functions of the vehicle, including the brakes, putting a family in danger. The attack was initially executed through a rogue USB drive left in the automakers engineering department. This story was inspired by the story in Wired Magazine on […]

    Preview this course - (1 preview lessons)

  • Malvertising

    About this training: In this video, a meeting starts late after a link to Amazon prompted a software update – an update that IT knew nothing about. It turns out that the culprit is “malvertising.” Watch and see how to avoid falling for fake ads and links found from internet searches. Please complete this training […]

    Preview this course - (1 preview lessons)

  • Ransomware Is Everywhere

    About this training: In this video, an entire city shuts down and panic ensues; crucial city systems are being held up by hackers using ransomware. Either the city can try to gain access themselves or pay the perpetrators. The first step is tracking down where the ransomware came from and understanding the breakdown in simple […]

    Preview this course - (1 preview lessons)

  • Macro Malware

    About this training: A routine day at air traffic control turns dangerous when the system begins to glitch. Macro-based malware made it into the organization’s system, rendering their equipment useless. The result could put innocent lives at stake. Watch to see how to avoid falling victim to macro malware. Please complete this training as soon […]

    Preview this course - (1 preview lessons)

  • 2-Factor Account Takeover

    About this training: 2-Factor Authentication using your mobile phone (SMS) is a great security measure, and countless end-users have it in place – but that’s bad news for Nico as he tries to use some stolen credentials. Nico and his hacking buddy think of a scheme to get around 2FA via SMS, opening the potential […]

    Preview this course - (1 preview lessons)

  • Smishing

    About this training: While chatting over lunch, Megan receives a text from her bank, alerting her to suspicious activity. Worried, she quickly begins to follow the instructions, but before she can fully act, her friend intervenes with a warning. The text could be a “Smish.” Watch and learn how important it is to recognize text […]

    Preview this course - (1 preview lessons)

  • Working from Home

    About this training: Dan, the CFO at a large company, wanted to make everything simple. He wanted a process so easy that he could access his company’s network from home without any additional authentication. Going against the recommendations of his IT department, he insisted that his IT department set up a point-to-point VPN connection, but […]

    Preview this course - (1 preview lessons)

  • Identity Theft

    About this training: Life has been hectic for Mike’s family with his daughter spending 3 months in the hospital, but things are starting to look up – until a crucial loan is denied. Mike discovers that he was caught in a phishing scheme and suffered identity theft. Now even his job is in jeopardy as […]

    Preview this course - (1 preview lessons)