Glossary
Ransomware (General Knowledge, End User)
- Learn about ransomware and how it can negatively impact an organization
- Recognize how ransomware attacks are launched
Duration: 6 to 10 min
Responsible Use of the Internet at Work (General Knowledge, End User)
- Learn how organizations can be impacted by inappropriate internet usage
- Understand what constitutes potentially harmful internet practices on corporate devices or accounts
Duration: 6 to 10 min
Securing the Home Office (Cyber Game, Serious Game)
- Play as a special agent and race against the clock to secure a home office and keep confidential data out of the hands of hackers
Duration: 5 to 10 min
Smartphones (General Knowledge, End User)
- Learn about the information security risks related to smartphone usage
- Discover best practices for protecting information stored on smartphones
Duration: 6 to 10 min
Social Engineering (Cyber Game, Cyber Challenge)
- Understand and protect yourself against cyberattacks that originate from deceptive social interactions
Duration: 3 min
Social Engineering (Cyber Game, Serious Game)
- Take on two different roles, as you join the Red Team to design a mock cyberattack scenario and switch over to the Blue Team to select the appropriate defenses against cyber threats
Duration: 5 to 10 min
Social Engineering (General Knowledge, End User)
- Learn about social engineering and how it can fuel a variety of cyber threats
- Recognize common social engineering tactics used by cyber criminals
Duration: 6 to 10 min
Social Networks (Cyber Game, Serious Game)
- Play as a new junior Social Media Associate and complete your training by staying abreast of current affairs in your field and meeting with key managers
Duration: 5 to 10 min
Social Networks (General Knowledge, End User)
- Understand information confidentiality and information ownership issues related to social network usage
- Learn about the potential threats posed by fraudsters and cybercriminals
Duration: 6 to 10 min
Strong Password (Cyber Game, Serious Game)
- Play as a special agent and race against the clock to secure sensitive information by relying on strong password expertise
Duration: 5 to 10 min
The Bring Your Own Device (BYOD) Trend (General Knowledge, End User)
- Understand the security issues related to the use of personal devices for business purposes
- Learn the strategies adopted by organizations to reduce BYOD-related risks
Duration: 6 to 10 min
The Clean Desk Principle (General Knowledge, End User)
- Recognize the importance of keeping unattended work areas clear of sensitive information
- Discover how to ensure the security of various documents and portable devices
Duration: 6 to 10 min
The Clean Desk Principle (General Knowledge, End User)
- Recognize the importance of keeping unattended work areas clear of sensitive information
- Discover how to ensure the security of various documents and portable devices
Duration: 6 to 10 min
Traveling Securely (Cyber Game, Cyber Challenge)
- Recognize and evaluate information security risks when traveling
Duration: 3 min
Traveling Securely (General Knowledge, End User)
- Preserve the security of information while traveling and working remotely
- Learn about the potential threats to information and technology used by traveling employees
Duration: 6 to 10 min
Unintentional Insider Threat (General Knowledge, End User)
- Understand how users can unintentionally put the information security at risk
- Learn common user actions and behaviors that can lead to a security incident
Duration: 6 to 10 min
Working Remotely: Mobile Users (General Knowledge, End User)
- Learn about mobile users and working remotely
- Understand the risks related to user mobility
Duration: 6 to 10 min
Pagination
- Previous page
- Page 2