1-866-889-5806

|

|

CYBER SECURITY
AWARENESS TRAINING

Empower users to protect your organization from cyber threats

FREE CYBER SECURITY ASSESSMENT

Gain immediate insight on how you rank against your peers

Reduce the Human Risk and Increase Security Knowledge

To help instill a security culture and behavior change, your security awareness program needs to reach a high rate of participation and engagement amongst users.  The learning materials must meet varying levels of human motivation, diverse styles of learning and degree of knowledge. Therefore content needs to be highly interactive, human-centric and fun

The Cyber Security Awareness courses have the highest industry rates in:

  • Best practices adoption
  • Knowledge retention
  • User participation

Thousands of organizations globally are leveraging this collection of courses to build a customized training program with:

  • Scalable and modular topics
  • Choice of 40 languages
  • Microlearnings
  • Communication and reinforcement tools

Industry's Most Complete Multilingual Library of Cyber Security Awareness Training

The library of content evolves at the same speed as emerging and fast-changing cyber security threats, regulatory obligations and social engineering-based attacks. All courses are built based on industry best practices and created by security awareness professionals, e-training specialists and behavioral change experts. The team carries a proven track record spanning over two decades and continuously pushes the limits so that courses are optimized for the latest cyber security challenges.

End User

The course is your go-to resource for a comprehensive understanding of cyber security awareness training. Its core curriculum teaches your staff the fundamentals of security awareness best practices.

Topics

  • Introduction to Information Security – 6 min. +
    • Learn about Information Security
    • Understand users’ responsibilities in protecting the organization’s information
    • Apply best practices that ensure data protection
  • Passwords – 5 min. +
    • Understand the importance of passwords
    • Learn how to create strong passwords that are memorable
    • Apply best practices to safely manage passwords
  • Emails – 6 min. +
    • Recognize common email threats and email misuse
    • Learn about the safety measures for incoming and outgoing emails
    • Apply best practices to safely use email
  • Malware – 6 min. +
    • Learn about the many types of malware
    • Recognize the human behavior and technical factors involved in preventing malware infection
    • Apply best practices to reduce threats posed by malware
  • Identity Theft – 6 min. +
    • Understand how identity theft affects victims and organizations
    • Learn about the methods frequently used to commit identity theft
    • Apply best practices to reduce the risk of falling prey to identity theft
  • Information Lifecycle – 6 min. +
    • Understand the value of information to an organization
    • Learn how to properly manage information throughout its lifecycle
    • Apply best practices for secure information management, including secure data destruction
  • Information Classification – 5 min. +
    • Understand why organizations classify their information
    • Practice classifying information according to levels of sensitivity
    • Apply best practices for handling information according to classification levels
  • Intellectual Property – 5 min. +
    • Learn about intellectual property
    • Understand behaviors and situations that may violate intellectual property rights
    • Apply best practices to protect the intellectual property of the organization and of others
  • Privacy – 6 min. +
    • Learn about privacy and the related rights and obligations
    • Learn to identify personal information
    • Apply best practices to protect personal information and the privacy of individuals
  • Protecting Payment Card Data – 5 min. +
    • Understand the organization’s obligation to protect payment card data
    • Learn about the threats to payment card data
    • Apply best practices to ensure the security of cardholder information and reduce the risk of payment card fraud
  • The Clean Desk Principle – 5 min. +
    • Understand the importance of keeping unattended work areas clear of sensitive information
    • Learn how to properly ensure the security of documents and portable devices
    • Apply best practices to reduce the risk of information leakage
  • Physical Security – 5 min. +
    • Understand the need for organizations to ensure the security of facilities and equipment
    • Learn about common work areas and how they must be protected
    • Apply best practices to reduce the risks of intrusion and theft
  • Access Control – 7 min. +
    • Learn why organizations must control access to their networks and systems
    • Understand the processes involved in granting and monitoring access
    • Apply best practices to reduce the risk of unauthorized access to information
  • Social Engineering – 7 min. +
    • Learn about social engineering
    • Recognize common social engineering methods
    • Apply best practices to thwart social engineering attacks
  • The Bring Your Own Device (BYOD) Trend – 6 min. +
    • Understand the security issues related to the use of personal devices for business purposes
    • Learn the strategies adopted by organizations to reduce BYOD-related risks
    • Apply best practices when using personally owned devices in the workplace
  • Smartphones – 5 min. +
    • Learn about the security risks inherent in smartphone functionality
    • Learn how to protect information stored on smartphones
    • Apply best practices that promote the security and integrity of smartphones and information
  • Mobiles Devices – 5 min. +
    • Understand the vulnerabilities inherent with mobile devices
    • Learn about preserving the security and the integrity of mobile devices
    • Apply best practices to reduce the risk of device loss, theft, and malware infection
  • Confidentiality on the web – 4 min. +
    • Understand the risks of inadvertently disclosing sensitive information on the web
    • Understand and recognize potential online threats
    • Apply best practices to minimize the risks posed by cybercriminals on the web
  • Mobile Users – 6 min. +
    • Learn about mobile users
    • Understand the risks related to user mobility
    • Apply best practices to protect mobile devices and the information they contain
  • Traveling Securely – 5 min. +
    • Preserve the security of information while traveling and working remotely
    • Learn about the potential threats to information and technology used by traveling employees
    • Apply best practices to keep information and mobile devices secure while traveling
  • Responsible Use of Internet at Work – 3 min. +
    • Learn how the misuse of the internet could harm the organization
    • Understand what constitutes acceptable use of the internet in the workplace
    • Apply best practices to ensure responsible internet use in the workplace
  • Social Networks – 5 min. +
    • Understand information confidentiality and the information ownership issues inherent in the use of social networks
    • Learn about the potential threats posed by fraudsters and cybercriminals
    • Apply best practices when posting information on social networks
  • Cloud Computing – 4 min. +
    • Understand cloud computing and its implications
    • Recognize the risks associated with cloud-based services
    • Apply best practices for information security and respect the organization’s policies for cloud use
  • Phishing – 10 min. +
    • Learn about phishing and recognize how it threatens information security
    • Recognize and identify the features of a phishing message and website
    • Apply best practices to minimize the risks of falling for a phishing attack
  • Protecting your Home Computer – 5 min. +
    • Learn the common methods used by cybercriminals to gain access to your information
    • Recognize home environment vulnerabilities and risks associated with Internet activities
    • Apply best practices to protect your information and secure your computers, devices, and home network

Essentials

The course introduces key concepts in security awareness and reinforces best practices.

Topics

  • Protecting Sensitive Information
  • Overview of Information Classification
  • Common Threats to Information
  • Creating Strong Passwords
  • Email Security
  • Identifying a Scam Attempt
  • Browsing the Web Securely
  • Web and Cyber Threats
  • Safe Internet Practices
  • Security at the Office
  • Working Remotely and Traveling Safely

Managers

The course explores managers’ roles and responsibilities in ensuring the use of best practices in the organization.

Topics

  • Introduction to Information Security
  • Information Security Roles and Responsibilities
  • Components of an Information Security Governance Framework
  • Information Security and Technology
  • Security Risks Posed by New Technology and Mobility

IT Administrators

The course educates information technology professionals on the importance of security best practices for networks and databases.

Topics

  • Network Security Overview
  • Common Network Attacks
  • Securing Networks
  • Securing Data Repositories

IT Developers

The course is designed to educate information technology professionals on the importance of security in their environment.

Topics

  • Application Security Overview
  • Common Application Attacks
  • Secure Development
  • Cryptography Overview

Microlearning Modules Make a Meaningful Impact

Don’t let their tiny size fool you! Microlearning modules are expressly designed to increase knowledge retention and behavior change among your users.

Each module makes just-in-time training possible, helping you target specific risks and meet productivity objectives. Flexible and engaging, this product adapts to your audience and strengthens user motivation and participation.

A Complete Library

The comprehensive suite features a wide range of topics, each one covering a recent trend in cybercrime.

Highlights

  • Length: 2-3 minutes
  • Highly interactive activities
  • Focus on best practices
  • Look and feel, several options available

Topics

  • Phishing General
  • Phishing – Ransomware
  • Phishing – Vishing
  • Phishing – Smishing
  • Phishing – You Win a Prize
  • Phishing – Six Clues That Should Raise Your Suspicions
  • Phishing – Phishing Website
  • Phishing – Anatomy of a Spear Phishing Attack
  • Phishing – Spear Phishing, CEO Fraud
  • Top Executive Phishing – Whaling
  • Web Phishing Through Search Engines
  • Protecting Sensitive Information – Information Handling
  • Cyber Attack Detection
  • Preventing Security Breaches
  • Wi-Fi Security
  • Identity Theft – Example of an Attack
  • Social Engineering
  • Being Security Aware
  • Social Networks
  • Insider Threat
  • Web Phishing Through Search Engines – Credit Card
  • Spear Phishing – Upcoming Summer Vacation
  • Phishing – Vishing, Windows Technical Support
  • Phishing – Vishing, Income Taxes
  • Phishing – Smishing, Friend’s Wedding Photos
  • Top Executive Phishing – Whaling, VP Email
  • C-Level Email Impersonation – CEO
  • Clone Phishing – Budget Forecast Spreadsheet
  • Mass Market Phishing – Amazon

Communication Tools

Adaptive. Engaging. Sharp.

Imagine the right communication strategy for your security awareness campaign. Imagine the right tools that effectively engage audiences while adapting to your organization and facilitating successful collaborations among employees.

Now imagine all this, just in time.

Your Communication Toolbox

A complete suite of communication tools that features relevant topics in cyber security. Content and visual designs are updated regularly as to reflect ongoing trends in the cyber risk landscape.

Objectives

  • Raise security awareness
  • Mobilize your workforce
  • Promote new and existing campaigns
  • Reinforce learned concepts and skills

Captivate audience attention and increase participation with:

POSTERS

Artwork includes: classic, realistic imagery or comic book narratives. Both styles can be tailored to your training context.

NEWSLETTERS

Provide an overview of key topics and enable users to focus on best practices in information security.

WALLPAPERS

Artwork includes: classic, realistic imagery or comic book narratives. Boosting campaign visibility through thought-provoking messages on computer desktops.

WEB BANNERS

Streaming headlines for best practices. Media is available in two standard sizes or can be customized to suit your format: 300 x 250 and 728 x 90.

VIDEOS

Running 4 minutes in length, each video emphasizes learned concepts and skills through storytelling. Shed light on core learning content with Hollywood-style narratives and characters.

NINJIO VIDEOS

To keep your organization and your people secure from cyber-attacks, we’ve partnered with NINJIO. NINJIO produces Hollywood-style, animated story-based episodes designed to educate users about cyber-security. These episodes are 3-4 minutes in length and they teach a lesson on one specific security threat using a real-life security breach as the story line.

Have a look at this month’s featured theme: Spear Phishing

Learn More About our Solutions