fbpx

1-866-889-5806

|

|

SECURITY AWARENESS TRAINING

Empower users to protect your organization from cyber threats

GET YOUR FREE SECURITY AWARENESS SCORECARD

Gain immediate insight on how you rank against your peers

Reduce the Human Risk and Increase
Security Awareness

To help instill a security culture and behavior change, your cyber security awareness program needs to reach a high rate of participation and engagement amongst users.  The learning materials must meet varying levels of human motivation, diverse styles of learning and degree of knowledge. Therefore content needs to be highly interactive, human-centric and fun

The Cyber Security Awareness courses have the highest industry rates in:

  • Best practices adoption
  • Knowledge retention
  • User participation

Thousands of organizations globally are leveraging this collection of courses to build a customized training program with:

  • Scalable and modular topics
  • Choice of 40 languages
  • Microlearnings
  • Communication and reinforcement tools
cyber security awareness training courses

Industry's Most Complete Multilingual Library of Cyber Security Awareness Training

The library of content evolves at the same speed as emerging and fast-changing cyber security threats, regulatory obligations and social engineering-based attacks. All courses are built based on industry best practices and created by security awareness professionals, e-training specialists and behavioral change experts. The team carries a proven track record spanning over two decades and continuously pushes the limits so that courses are optimized for the latest cyber security challenges.

End User

The course is your go-to resource for a comprehensive understanding of cyber security awareness training. Its core curriculum teaches your staff the fundamentals of security awareness best practices.

Topics

  • Introduction to Information Security – 6 min. +
    • Learn about Information Security
    • Understand users’ responsibilities in protecting the organization’s information
    • Apply best practices that ensure data protection
  • Passwords – 5 min. +
    • Understand the importance of passwords
    • Learn how to create strong passwords that are memorable
    • Apply best practices to safely manage passwords
  • Emails – 6 min. +
    • Recognize common email threats and email misuse
    • Learn about the safety measures for incoming and outgoing emails
    • Apply best practices to safely use email
  • Malware – 6 min. +
    • Learn about the many types of malware
    • Recognize the human behavior and technical factors involved in preventing malware infection
    • Apply best practices to reduce threats posed by malware
  • Identity Theft – 6 min. +
    • Understand how identity theft affects victims and organizations
    • Learn about the methods frequently used to commit identity theft
    • Apply best practices to reduce the risk of falling prey to identity theft
  • Information Lifecycle – 6 min. +
    • Understand the value of information to an organization
    • Learn how to properly manage information throughout its lifecycle
    • Apply best practices for secure information management, including secure data destruction
  • Information Classification – 5 min. +
    • Understand why organizations classify their information
    • Practice classifying information according to levels of sensitivity
    • Apply best practices for handling information according to classification levels
  • Intellectual Property – 5 min. +
    • Learn about intellectual property
    • Understand behaviors and situations that may violate intellectual property rights
    • Apply best practices to protect the intellectual property of the organization and of others
  • Privacy – 6 min. +
    • Learn about privacy and the related rights and obligations
    • Learn to identify personal information
    • Apply best practices to protect personal information and the privacy of individuals
  • Protecting Payment Card Data – 5 min. +
    • Understand the organization’s obligation to protect payment card data
    • Learn about the threats to payment card data
    • Apply best practices to ensure the security of cardholder information and reduce the risk of payment card fraud
  • The Clean Desk Principle – 5 min. +
    • Understand the importance of keeping unattended work areas clear of sensitive information
    • Learn how to properly ensure the security of documents and portable devices
    • Apply best practices to reduce the risk of information leakage
  • Physical Security – 5 min. +
    • Understand the need for organizations to ensure the security of facilities and equipment
    • Learn about common work areas and how they must be protected
    • Apply best practices to reduce the risks of intrusion and theft
  • Access Control – 7 min. +
    • Learn why organizations must control access to their networks and systems
    • Understand the processes involved in granting and monitoring access
    • Apply best practices to reduce the risk of unauthorized access to information
  • Social Engineering – 7 min. +
    • Learn about social engineering
    • Recognize common social engineering methods
    • Apply best practices to thwart social engineering attacks
  • The Bring Your Own Device (BYOD) Trend – 6 min. +
    • Understand the security issues related to the use of personal devices for business purposes
    • Learn the strategies adopted by organizations to reduce BYOD-related risks
    • Apply best practices when using personally owned devices in the workplace
  • Smartphones – 5 min. +
    • Learn about the security risks inherent in smartphone functionality
    • Learn how to protect information stored on smartphones
    • Apply best practices that promote the security and integrity of smartphones and information
  • Mobile Devices – 5 min. +
    • Understand the vulnerabilities inherent with mobile devices
    • Learn about preserving the security and the integrity of mobile devices
    • Apply best practices to reduce the risk of device loss, theft, and malware infection
  • Confidentiality on the web – 4 min. +
    • Understand the risks of inadvertently disclosing sensitive information on the web
    • Understand and recognize potential online threats
    • Apply best practices to minimize the risks posed by cybercriminals on the web
  • Mobile Users – 6 min. +
    • Learn about mobile users
    • Understand the risks related to user mobility
    • Apply best practices to protect mobile devices and the information they contain
  • Traveling Securely – 5 min. +
    • Preserve the security of information while traveling and working remotely
    • Learn about the potential threats to information and technology used by traveling employees
    • Apply best practices to keep information and mobile devices secure while traveling
  • Responsible Use of Internet at Work – 3 min. +
    • Learn how the misuse of the internet could harm the organization
    • Understand what constitutes acceptable use of the internet in the workplace
    • Apply best practices to ensure responsible internet use in the workplace
  • Social Networks – 5 min. +
    • Understand information confidentiality and the information ownership issues inherent in the use of social networks
    • Learn about the potential threats posed by fraudsters and cybercriminals
    • Apply best practices when posting information on social networks
  • Cloud Computing – 4 min. +
    • Understand cloud computing and its implications
    • Recognize the risks associated with cloud-based services
    • Apply best practices for information security and respect the organization’s policies for cloud use
  • Phishing – 10 min. +
    • Learn about phishing and recognize how it threatens information security
    • Recognize and identify the features of a phishing message and website
    • Apply best practices to minimize the risks of falling for a phishing attack
  • Protecting your Home Computer – 5 min. +
    • Learn the common methods used by cybercriminals to gain access to your information
    • Recognize home environment vulnerabilities and risks associated with Internet activities
    • Apply best practices to protect your information and secure your computers, devices, and home network
  • Data Leakage – 5 min. +
    • Understand what constitutes a data leak and how it affects an organization
    • Learn common internal and external data leaks causes
    • Apply best practices to handle sensitive information and reduce the risk of data leaks
  • Business Email Compromise – 5 min. +
    • Understand what constitutes a business email compromise attack and how it is mounted
    • Learn the common phishing-based scams used in such attacks
    • Apply best practices to avoid being taken in by a business email compromise fraud
  • Unintentional Insider Threat – 5 min. +
    • Understand how users can unintentionally put at risk the security of information
    • Learn common user actions and behaviors that can lead to a security incident
    • Apply best practices to reduce the risk of accidental data leakage and other incidents
  • Incident Reporting – 5 min. +
    • Understand the importance of detecting and handling security incidents promptly
    • Learn how to identify and detect various types of security incidents
    • Apply best practices to report security incidents and reduce their impacts
  • Ransomware – 5 min. +
    • Learn about ransomware and its damaging impacts
    • Understand how ransomware attacks are launched
    • Apply best practices to detect a ransomware attack and avoid infection

Essentials

The course introduces key concepts in cyber security awareness and reinforces best practices.

Topics

  • Protecting Sensitive Information
  • Overview of Information Classification
  • Common Threats to Information
  • Creating Strong Passwords
  • Email Security
  • Identifying a Scam Attempt
  • Browsing the Web Securely
  • Web and Cyber Threats
  • Safe Internet Practices
  • Security at the Office
  • Working Remotely and Traveling Safely

Managers

The course explores managers’ roles and responsibilities in ensuring the use of best practices in the organization.

Topics

  • Introduction to Information Security
  • Information Security Roles and Responsibilities
  • Components of an Information Security Governance Framework
  • Information Security and Technology
  • Security Risks Posed by New Technology and Mobility

IT Administrators

The course educates information technology professionals on the importance of security best practices for networks and databases.

Topics

  • Network Security Overview
  • Common Network Attacks
  • Securing Networks
  • Securing Data Repositories

IT Developers

The course is designed to educate information technology professionals on the importance of security in their environment.

Topics

  • Application Security Overview
  • Common Application Attacks
  • Secure Development
  • Cryptography Overview

Microlearning & Nanolearning Modules Make a Meaningful Impact

Don’t let their tiny size fool you! Microlearning and Nanolearning modules are expressly designed to increase knowledge retention and behavior change among your users.

Each module makes just-in-time training possible, helping you target specific risks and meet productivity objectives. Flexible and engaging, this product adapts to your audience and strengthens user motivation and participation.

A Complete Library

The comprehensive suite features a wide range of topics, each one covering a recent trend in cybercrime.

Highlights

  • Length: 1-3 minutes
  • Highly interactive activities
  • Focus on best practices
  • Look and feel, several options available
cyber security awareness microlearning

Topics

Microlearnings

  • Vishing – You Win a Prize
  • Web Phishing
  • Mass Market Phishing – Amazon Gift Card
  • Smishing
  • Spear Phishing
  • Whaling
  • C-Level Email Impersonation
  • Business Email Compromise (BEC)

Nanolearnings

  • Being Security Aware
  • Cyber Attack Detection
  • Identity Theft – Example of an Attack
  • Insider Threat
  • Phishing – 6 Clues
  • Phishing – Ransomware
  • Phishing – Vishing
  • Phishing – Spear Phishing (CEO Fraud)
  • Phishing – Phishing Website
  • Phishing – Smishing
  • Phishing – Anatomy of Spear Phishing
  • Preventing Security Breaches
  • Protecting Sensitive Information
  • Social Engineering
  • Social Networks
  • Wi-Fi Security

Communication Tools

Adaptive. Engaging. Sharp.

Imagine the right communication strategy for your security awareness campaign. Imagine the right tools that effectively engage audiences while adapting to your organization and facilitating successful collaborations among employees.

Now imagine all this, just in time.

Your Communication Toolbox

A complete suite of communication tools that features relevant topics in cyber security. Content and visual designs are updated regularly as to reflect ongoing trends in the cyber risk landscape.

Objectives

  • Raise security awareness
  • Mobilize your workforce
  • Promote new and existing campaigns
  • Reinforce learned concepts and skills

Captivate audience attention and increase participation with:

security awareness communications tools

POSTERS

Artwork includes: classic, realistic imagery or comic book narratives. Both styles can be tailored to your training context.

BEST PRACTICE NEWSLETTERS

Provide an overview of key topics and enable users to focus on best practices in information security.

WALLPAPERS

Artwork includes: classic, realistic imagery or comic book narratives. Boosting campaign visibility through thought-provoking messages on computer desktops.

WEB BANNERS

Streaming headlines for best practices. Media is available in two standard sizes or can be customized to suit your format: 300 x 250 and 728 x 90.

VIDEOS

Running 4 minutes in length, each video emphasizes learned concepts and skills through storytelling. Shed light on core learning content with Hollywood-style narratives and characters.

security awareness training 3d video

NINJIO VIDEOS

To keep your organization and your people secure from cyber-attacks, we’ve partnered with NINJIO. NINJIO produces Hollywood-style, animated story-based episodes designed to educate users about cyber-security. These episodes are 3-4 minutes in length and they teach a lesson on one specific security threat using a real-life security breach as the story line.

Have a look at this month’s featured theme: Spear Phishing

Learn More About our Solutions