1. | Business Email Compromise | Business email compromise (BEC) is the act of a hacker getting into your company email account. BEC scams are typically carried out through phishing attack, such a spear phishing. This course will cover best practices to identify and avoid phishing scams that can lead to Business Email Compromise. | 04:22 |
2. | How to Identify a Phishing Email | Phishing emails continue to be one of the easiest ways for hackers to compromise businesses and steal information. This course will cover the most common red flags in phishing emails and how to identify them. | 04:36 |
3. | Password Management Best Practices | Password management involves the various ways you authenticate yourself to login to different technology resources. This course will cover the benefits of password management and some general password best practices. | 03:16 |
4. | Secure Destruction of Physical & Digital Media | Physical and digital media come in many forms. There are some special ways that media need to be disposed of to truly remove or destroy the data, keeping it away from bad actors. This course will cover the various types of media and the ways in which they are best destroyed. | 04:39 |
5. | So You Clicked on a Phishing Link | With how sophisticated phishing attacks have become, it's important to know what to do if you think you've been phished. This course will cover the steps you should take if you think you clicked on a malicious link or attachment. | 04:00 |
6. | Social Engineering: The Importance of Being Rude | Social engineering is a great way for hackers to take advantage of your routine and tendency to be polite. When it comes to cybersecurity protections, being too nice can be the very thing that gets you in trouble. This course will cover some common onsite social engineering tactics and how to avoid falling victim to them. | 03:28 |
7. | What is Malware? | Malware, short for "malicious software", is any software designed to compromise the security of your computer or device. This course will cover how malware works, how it can affect you, and how to avoid a malware infection. | 03:13 |
8. | What is Smishing? | Smishing is a form of social engineering that targets cell phones using malicious SMS text messages. This course will cover best practices for identifying smishing attacks and generally handling unsolicited text messages. | 05:27 |
9. | What is Vishing? | Vishing is a form of social engineering that targets individuals over the phone, also called "voice" phishing. This course will cover best practices for identifying vishing attacks in real time and how to handle unsolicited phone calls. | 03:47 |
10. | What is Ransomware? | Ransomware is a rapidly growing cybersecurity threat that all employees need to be aware of. This course will cover how ransomware could affect your organization and best practices to avoid falling victim to a ransomware attack. | 03:22 |
11. | Social Media Cybersecurity Threats | Social media has become a part of our everyday lives, and hackers are using them for phishing attacks. This course will cover the types of social media phishing to be on the lookout for and tips to avoid exposing your personal information through these sites. | 04:48 |
12. | The Importance of Backups | Backing up your files is the best way to make sure you don't lose your personal or company information through a device failure or cybersecurity attack. This course will cover the benefits of keeping backups and best practices for doing so. | 03:54 |
13. | Video Call Best Practices | Video calls have become an important form of communication for clients, vendors, coworkers, and even personal use. This course will cover best practices when hosting or joining video calls. | 05:47 |
14. | Vishing: How to Verify Users Over the Phone | Vishing, or voice phishing, is a common way that attackers will attempt to get confidential information out of an employee. This course will cover common tactics that they use, how to recognize them, and best practices for what information is not safe to share over the phone. | 03:32 |
15. | What to do with a Smishing Text Message | Smishing, or SMS phishing, is a newer attack method targeting both company and personal cell phones. This course will cover how to identify smishing text messages and best practices for what to do when you receive one. | 04:29 |
16. | How to Create a Secure Password | Passwords are an important level of security for your accounts, both at work and at home. This course will cover best practices for creating and maintaining passwords, as well as additional security measures you can add to further secure your accounts. | 05:14 |
17. | Keeping a Clean Workspace | Keeping a clean workspace is an easy way to keep personal and company information secure, whether you're in office, working from home, or working from a public place. This course will cover what an attacker would look for and best practices for keeping a clean and secure workspace. | 04:30 |
18. | WiFi Security & Best Practices | These days, public WiFi is freely available almost anywhere you go. Bad actors can spoof internet connections to steal information from your devices. This course will cover things to look out for and best practices when it comes to using public WiFi. | 05:21 |
19. | Less Common Social Engineering Tactics | Social engineers are always trying to fool people into giving them sensitive company information, and they have some creative ways to get past your defenses. This course will cover some less common social engineering attacks to look out for and how to handle them. | 04:15 |
20. | IoT Device Security | Internet-connected devices are all around us, from smart TVs to smart speakers to streaming devices, forming what's called the Internet of Things. How can you make sure these IoT devices are secure and safe from unauthorized access? This course will give you some practical tips for at home and in the workplace to make IoT machines as protected as possible from potential attacks. | 05:22 |
21. | Lifecycle of an Update | You're constantly getting notifications to update your various devices and applications, whether it's for security patches, bug fixes, or better usability. This course will cover the importance of updates and why they should be treated as time sensitive. | 05:43 |
22. | Secure Browsing | The World Wide Web is a wealth of valuable information but also a playground for bad actors looking to compromise your devices and data. One wrong click on a spoofed website or malicious advertisement could open you up to exposure of sensitive data. This course will provide tips and tricks on secure browsing and how to avoid security pitfalls on the public internet. | 05:34 |
23. | Social Engineering: Faster Isn't Always Better | In this digital age, speed and efficiency are key factors expected of the modern worker. However, what if hurrying through your daily tasks is opening yourself up to potential cyber threats? This course will inform the user on how to slow down and pay attention to the warning signs of social engineering in a variety of use cases. | 05:53 |
24. | Public Info Gathering: What is Out There and Why Is It Important | The average user may not think twice about sharing information on social media and other publicly facing websites. But what happens when malicious actors can locate this information and turn it against you and your organization? This course will instruct the user on the threat of public information gathering and how to guard oneself against data disclosure. | 06:45 |
25. | Practical Guide to Device Decommissioning | Our devices are constantly being replaced and upgraded. But what should you do with your old devices? This course will cover some easy (and sometimes profitable) ways you can properly and securely dispose of your decommissioned devices. | 05:10 |
26. | RFID Crash Course | Radio Frequency Identification (RFID) technology is all around us but many users may not understand how it works, let alone how bad actors can leverage it against your organization. This course will cover the basics of RFID functionality as well as practical guidance for the user to prevent unauthorized access to RFID badge systems. | 07:06 |
27. | QR Code Quirks and Quagmires | QR codes have become a part of our everyday life, at home and at work. While QR codes can be very convenient, there are some security risks associated with them. This course will cover the ways a malicious attacker could use QR codes to trick you and how to verify their legitimacy out in the wild. | 05:14 |
28. | The Temptations and Dangers of Shadow IT | Shadow IT is any hardware, software, or device you use with company resources that has not been approved or vetted by your IT department. There's a good chance you're doing this without even realizing. This course will cover the risks of Shadow IT and how to avoid it whenever possible. | 05:03 |