Skip to content

Content

E-Learning Content Catalog

Cyber Security

Email Security

  • How to recognize phishing emails
  • How to handle suspicious emails
  • Best practices for email security
  • Consequences of ignoring email security
  • Immediate actions to take to help improve email security

Mobile Security

  • Significance of password security
  • How to evaluate and secure mobile apps to help prevent unauthorized access and protect your data
  • Methods to help secure your mobile device when connected to various networks, including public Wi-Fi
  • Strategies to help protect your data and recover your device in case of loss or theft
  • Importance of regular data backups and how to perform remote wipes to protect your information

Password Security

  • Password best practices
  • How to create and remember strong passwords
  • Importance of password uniqueness across accounts
  • Common password attacks and strategies to help prevent unauthorized access
  • Role of Artificial Intelligence (AI) in password attacks

Phishing Awareness Refresher 1

  • Recognize common signs of phishing across email, phone, and SMS platforms
  • Understand the various types of phishing attacks (spear phishing, whaling, etc.)
  • Learn best practices for reporting suspected phishing attempts
  • Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
  • Implement strategies to help protect personal and organizational information from phishing scams

Phishing Awareness Refresher 2

  • Recognize common signs of phishing across email, phone, and SMS platforms
  • Understand the various types of phishing attacks
  • Learn best practices for reporting suspected phishing attempts
  • Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
  • Implement strategies to help protect personal and organizational information from phishing scams

Phishing Awareness Refresher 3

  • Recognize common signs of phishing across email, phone, and SMS platforms
  • Understand the various types of phishing attacks
  • Learn best practices for reporting suspected phishing attempts
  • Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
  • Implement strategies to help protect personal and organizational information from phishing scams

Safe Web Browsing

  • Common cyber threats and risks
  • Best practices for safe web browsing
  • Common practices to handle suspicious websites
  • Consequences of ignoring safe web browsing best practices

Social Engineering Awareness

  • Social engineering tactics used by bad actors
  • Concept of phishing and its most common forms
  • Proactive measures to reduce susceptibility to social engineering and phishing threats

Social Media Security

  • Best practices for social media security
  • Common social media threats and how to report them
  • Role of location services, tracking services, security alerts, and notifications in social media security
  • Importance of adhering to company social media policies

WiFi Security

  • Importance of securing home Wi-Fi networks
  • Potential risks of inadequate home Wi-Fi security
  • Best practices for securing home Wi-Fi networks
  • Common risks associated with public Wi-Fi networks
  • Basic strategies for safer use of public Wi-Fi networks