Search Results
IT Security: Credential Stuffing (Individual)
This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...
IT Security: E-mail Security Awareness (Individual)
This course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect...
IT Security: Mobile Phone Security Awareness (Individual)
This course explores the threats to security on smartphones. Smartphones are fully functional computers as well as communication devices. As such, they are subject to the same types of IT security...
IT Security: Safe Web Browsing (Individual)
This course explores the threats to your security and privacy, and threats to your organization. Learn how to mitigate these threats with software settings and updates, as well as best practices...
Managing a Remote Workforce (Individual)
In times of crisis, employees are sometimes required to work from home. The transition from the traditional workplace to a remote environment is not easy. This course explores the challenges of...
IT Security: Phishing Awareness (Individual)
Cyberthieves use victims’ personal information to steal their money and identities. They attack victims’ computers and other devices with malware attacks. Learn what phishing is, the various ways...
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...
IT Security: Work Off-Site (Individual)
This course examines the IT security risks associated with remote work. Learn to keep your computer, devices and home network secure, use public networks safely, and recognize phishing and targeted...