Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Ransomware (General Knowledge, End User)

  • Learn about ransomware and how it can negatively impact an organization
  • Recognize how ransomware attacks are launched

Duration: 6 to 10 min

Responsible Use of the Internet at Work (General Knowledge, End User)

  • Learn how organizations can be impacted by inappropriate internet usage
  • Understand what constitutes potentially harmful internet practices on corporate devices or accounts

Duration: 6 to 10 min

Securing the Home Office (Cyber Game, Serious Game)

  • Play as a special agent and race against the clock to secure a home office and keep confidential data out of the hands of hackers

Duration: 5 to 10 min

Smartphones (General Knowledge, End User)

  • Learn about the information security risks related to smartphone usage
  • Discover best practices for protecting information stored on smartphones

Duration: 6 to 10 min

Social Engineering (Cyber Game, Cyber Challenge)

  • Understand and protect yourself against cyberattacks that originate from deceptive social interactions

Duration: 3 min

Social Engineering (Cyber Game, Serious Game)

  • Take on two different roles, as you join the Red Team to design a mock cyberattack scenario and switch over to the Blue Team to select the appropriate defenses against cyber threats

Duration: 5 to 10 min

Social Engineering (General Knowledge, End User)

  • Learn about social engineering and how it can fuel a variety of cyber threats
  • Recognize common social engineering tactics used by cyber criminals

Duration: 6 to 10 min

Social Networks (Cyber Game, Serious Game)

  • Play as a new junior Social Media Associate and complete your training by staying abreast of current affairs in your field and meeting with key managers

Duration: 5 to 10 min

Social Networks (General Knowledge, End User)

  • Understand information confidentiality and information ownership issues related to social network usage
  • Learn about the potential threats posed by fraudsters and cybercriminals

Duration: 6 to 10 min

Strong Password (Cyber Game, Serious Game)

  • Play as a special agent and race against the clock to secure sensitive information by relying on strong password expertise

Duration: 5 to 10 min

The Bring Your Own Device (BYOD) Trend (General Knowledge, End User)

  • Understand the security issues related to the use of personal devices for business purposes
  • Learn the strategies adopted by organizations to reduce BYOD-related risks

Duration: 6 to 10 min

The Clean Desk Principle (General Knowledge, End User)

  • Recognize the importance of keeping unattended work areas clear of sensitive information
  • Discover how to ensure the security of various documents and portable devices

Duration: 6 to 10 min

The Clean Desk Principle (General Knowledge, End User)

  • Recognize the importance of keeping unattended work areas clear of sensitive information
  • Discover how to ensure the security of various documents and portable devices

Duration: 6 to 10 min

Traveling Securely (Cyber Game, Cyber Challenge)

  • Recognize and evaluate information security risks when traveling

Duration: 3 min

Traveling Securely (General Knowledge, End User)

  • Preserve the security of information while traveling and working remotely
  • Learn about the potential threats to information and technology used by traveling employees

Duration: 6 to 10 min

Unintentional Insider Threat (General Knowledge, End User)

  • Understand how users can unintentionally put the information security at risk
  • Learn common user actions and behaviors that can lead to a security incident

Duration: 6 to 10 min

Working Remotely: Mobile Users (General Knowledge, End User)

  • Learn about mobile users and working remotely
  • Understand the risks related to user mobility

Duration: 6 to 10 min