Search
IT Security: It Begins With You (Individual)
This course is designed for all employees who use computers and other devices to access their organizations’ systems. Learn about the main ways that cybercriminals use people to compromise systems,...
Synthetic Identity Fraud (Individual)
This course explores how fraudsters create synthetic identities and use them to get credit cards and other forms of credit. Learn how synthetic identities are created, how fraudsters use them to...
Unconscious Bias (Individual)
Unconscious bias (or implicit bias) refers to unsupported social judgements or prejudice in favor or against a person or group of people. Since these happen without reasonable justification, they...
IT Security: Corporate Account Takeover (Individual)
This course is designed for all employees who use computers and other electronic devices in the course of their work. Employees learn to recognize Corporate Account Takeover (CATO) attacks and take...
