Learning objectives |
EMAIL SECURITY Staff will learn to recognize malicious email before it becomes a threat, how to properly handle email, and best practices around how and when to use email to send specific types of information.
INFORMATION PRIVACY: CLASSIFYING DATA This module equips employees to recognize the importance of understanding what constitutes private data.
INFORMATION PRIVACY: PROTECTING DATA This module equips employees to recognize the importance of how to behave in a proactive manner to protect their information in their everyday work.
MALWARE AWARENESS In this module, learners will understand the goals of malware, identify the many types of malware, including ransomware, and recognize how to prevent malware infection both at work and at home.
MOBILE DEVICE SECURITY In this module, staff will learn about mobile devices, the ways data can be leaked or lost, and the challenges that arise when the line between what is corporate and personal is blurred.
PASSWORD SECURITY Staff will be able to identify safeguards to protect passwords as well as techniques used by attackers to obtain passwords. During interactive exercises users will learn how best to create and remember strong.
PCI COMPLIANCE Our PCI Compliance course teaches employees to recognize appropriate protection mechanisms for card holder data.
PHYSICAL SECURITY Employees will learn the risks associated with transporting sensitive data and the importance of maintaining personal security when traveling, including best practices to safegaurding their hardware.
SOCIAL ENGINEERING In this module, employees will identify the many forms of social engineering and its potential impacts, identify techniques used by social engineers and understand how to establish validity of requests in order to perform daily business functions in light of the threat of social engineers.
TRAVEL SECURITY With the amount of data we can carry around in minuscule devices, travel security is more important than ever. This module introduces staff to the risks associated with transporting sensitive data, offers guidance around how to travel safely with sensitive information and when to leave it at home.
|