Content
E-Learning Content Catalog
Cyber Security
Email Security
- How to recognize phishing emails
- How to handle suspicious emails
- Best practices for email security
- Consequences of ignoring email security
- Immediate actions to take to help improve email security
Mobile Security
- Significance of password security
- How to evaluate and secure mobile apps to help prevent unauthorized access and protect your data
- Methods to help secure your mobile device when connected to various networks, including public Wi-Fi
- Strategies to help protect your data and recover your device in case of loss or theft
- Importance of regular data backups and how to perform remote wipes to protect your information
Password Security
- Password best practices
- How to create and remember strong passwords
- Importance of password uniqueness across accounts
- Common password attacks and strategies to help prevent unauthorized access
- Role of Artificial Intelligence (AI) in password attacks
Phishing Awareness Refresher 1
- Recognize common signs of phishing across email, phone, and SMS platforms
- Understand the various types of phishing attacks (spear phishing, whaling, etc.)
- Learn best practices for reporting suspected phishing attempts
- Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
- Implement strategies to help protect personal and organizational information from phishing scams
Phishing Awareness Refresher 2
- Recognize common signs of phishing across email, phone, and SMS platforms
- Understand the various types of phishing attacks
- Learn best practices for reporting suspected phishing attempts
- Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
- Implement strategies to help protect personal and organizational information from phishing scams
Phishing Awareness Refresher 3
- Recognize common signs of phishing across email, phone, and SMS platforms
- Understand the various types of phishing attacks
- Learn best practices for reporting suspected phishing attempts
- Review real-world case studies highlighting the impact of phishing attacks on individuals and organizations
- Implement strategies to help protect personal and organizational information from phishing scams
Safe Web Browsing
- Common cyber threats and risks
- Best practices for safe web browsing
- Common practices to handle suspicious websites
- Consequences of ignoring safe web browsing best practices
Social Engineering Awareness
- Social engineering tactics used by bad actors
- Concept of phishing and its most common forms
- Proactive measures to reduce susceptibility to social engineering and phishing threats
Social Media Security
- Best practices for social media security
- Common social media threats and how to report them
- Role of location services, tracking services, security alerts, and notifications in social media security
- Importance of adhering to company social media policies
WiFi Security
- Importance of securing home Wi-Fi networks
- Potential risks of inadequate home Wi-Fi security
- Best practices for securing home Wi-Fi networks
- Common risks associated with public Wi-Fi networks
- Basic strategies for safer use of public Wi-Fi networks