Available courses

The Advanced Spear Phishing module covers topics on: identifying three types of advanced spear phishing techniques, identifying indicators of an advanced spear phishing email, and understanding what to do if you are the target.

The Business Email Compromise (BEC) Scams module covers topics on: identifying BEC scams, differentiating between the three main types of BEC scams, and reporting a suspected attack.

The Cloud Computing module covers topics on: the difference between desktop and cloud computing, advantages and disadvantages of cloud computing, and best practices for using the cloud safely.

The Cybersecurity Awareness module covers topics on: how to avoid online threats, understanding risk factors for each type of threat, and minimizing risk of an attack.

The Data Protection module covers topics on: your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.

The General Phishing modules covers topics on: the differences between spam, phishing, and spear phishing; what you can do to minimize the risk of a phishing attack; and how to identify indicators of a phishing email.

The Insider Threats module covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity.

The Internet of Things module covers topics on: the definition of Internet of Things, identifying the advantages and disadvantages of these devices, and describe best practices for using these devices safely.

The Malicious Links module covers topics on: why links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.

The Mobile Devices module covers topics on: how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.

The Passwords module covers topics on: the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.

The Physical Security module covers topics on: the danger of theft of a device, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.

The Ransomware module covers topics on: what ransomware is and how it is delivered, ransomware's effect, minimizing the threat of ransomware, and reporting ransomware attacks.

The Security Outside the Office module covers topics on: attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen.

The Social Engineering module covers topics on: difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.

The Social Networking module covers topics on: how information posted online can be used against you, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.

The Spear Phishing module covers topics on: why spear phishing poses a threat to our organization, the three types of spear phishing emails, and the indicators of a spear phishing email.

The Surfing the Web module covers topics on: safe web surfing, secure websites, and how to identify and avoid malicious sites and links.