![]() Each video includes a web-optimized and high-definition version. When you combine the concept of Microlearning with our own award-winning video production capabilities, you get the perfect marriage of easily digestible instructional content that can be viewed on a desktop, television, or mobile device to fit today’s on-the-go-lifestyles. These new, smaller learning units are topic-focused videos and do not contain assessments. Microlearning is bite-sized instruction designed to reinforce knowledge training, increase knowledge retention, and improve overall performance. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach physical security best practices. ![]() This course is designed to teach employees how to protect an organization from criminals, espionage, workplace violence, natural disasters, and other threats. ![]() Your personal safety at work is of paramount importance. By mastering the information presented in this course you will be able to help defend your personal and workplace data from ransomware threats. Ransomware is a type of malicious software used by hackers to encrypt files and other functions from a user until the victim pays a “ransom.” This form of cyberattack has become one of the most used and most costly threats to businesses and individuals alike. This course teaches employees the email and IM best practices to protect both their organization’s sensitive information and their own personal information and identity from attack. However, it’s a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you. They’re incredibly useful applications because they allow you to quickly and efficiently exchange messages and files with just about anyone else in the world. S-161-ES: Email & Instant Messaging SecurityĮmail and instant messaging (IM) are essential communication tools that most people use just about every day. Working to Become Security Aware, Phishing, How to Stop Phishing Attacks, Consequences of Clicking-Thru a Phishing email, Best Practices For Thwarting Internet Phishers, Spear Phishing, Thwart Spear Phishing Attacks, Business Email Compromise (BEC), Defend Yourself Against BEC, Malware, Best Practices for Avoiding Malware. This module teaches learners the importance of being “security-aware” and making safe, security-conscious decisions on a day-to-day basis to help thwart these menacing cyber-attacks. This module covers two of the most dangerous cyber-threats to any organization: malware and phishing. S-141-PH-01-EN: Security Awareness Essentials Introduction, Threat Profiler (Malware, Phishing, IoT, Social Engineering, GDPR, Social Media and more). Analytics provide a detailed profile of each user’s results. CyQ tracks and measures the user’s response to each question by category. ![]() It consists of a 10-question test bank that covers major security awareness topics, including malware, phishing, and IoT. CyQ can be used as a diagnostic tool that, when completed, will provide an individualized, accurate threat assessment, so that the organization can focus on the topics that need further instruction or reinforcement. VIPRE SAT (Security Awareness Training) Essentials is a turnkey learning program that allows resource-conscious organizations to deliver highly effective training.Ĭourses include: S-190-CQ-01-EN: CyQ™ AssessmentĬyQ™ is a diagnostic tool organizations and training managers can use to evaluate what employees know-and more importantly-don’t know about security awareness best practices and how to remain cybersafe.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |