Search Results
IT Security: Password Security Awareness (Individual)
This course explores the importance of having strong passwords, how and why hackers access accounts and systems, the consequences of these security breaches as well as both good and bad password...
IT Security: Credential Stuffing (Individual)
This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...
IT Security: E-mail Security Awareness (Individual)
This course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect...
IT Security: Mobile Phone Security Awareness (Individual)
This course explores the threats to security on smartphones. Smartphones are fully functional computers as well as communication devices. As such, they are subject to the same types of IT security...
IT Security: Safe Web Browsing (Individual)
This course explores the threats to your security and privacy, and threats to your organization. Learn how to mitigate these threats with software settings and updates, as well as best practices...
Managing a Remote Workforce (Individual)
In times of crisis, employees are sometimes required to work from home. The transition from the traditional workplace to a remote environment is not easy. This course explores the challenges of...
IT Security: Phishing Awareness (Individual)
Cyberthieves use victims’ personal information to steal their money and identities. They attack victims’ computers and other devices with malware attacks. Learn what phishing is, the various ways...
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...