Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Securing the Home Office (Cyber Game, Serious Game)

  • Play as a special agent and race against the clock to secure a home office and keep confidential data out of the hands of hackers

Duration: 5 to 10 min

Smartphones (General Knowledge, End User)

  • Learn about the information security risks related to smartphone usage
  • Discover best practices for protecting information stored on smartphones

Duration: 6 to 10 min

Social Engineering (Cyber Game, Cyber Challenge)

  • Understand and protect yourself against cyberattacks that originate from deceptive social interactions

Duration: 3 min

Social Engineering (Cyber Game, Serious Game)

  • Take on two different roles, as you join the Red Team to design a mock cyberattack scenario and switch over to the Blue Team to select the appropriate defenses against cyber threats

Duration: 5 to 10 min

Social Engineering (General Knowledge, End User)

  • Learn about social engineering and how it can fuel a variety of cyber threats
  • Recognize common social engineering tactics used by cyber criminals

Duration: 6 to 10 min

Social Networks (Cyber Game, Serious Game)

  • Play as a new junior Social Media Associate and complete your training by staying abreast of current affairs in your field and meeting with key managers

Duration: 5 to 10 min

Social Networks (General Knowledge, End User)

  • Understand information confidentiality and information ownership issues related to social network usage
  • Learn about the potential threats posed by fraudsters and cybercriminals

Duration: 6 to 10 min

Strong Password (Cyber Game, Serious Game)

  • Play as a special agent and race against the clock to secure sensitive information by relying on strong password expertise

Duration: 5 to 10 min