This IT Disaster Recovery Planning: An Overview online training course is designed for employees with IT systems responsibilities. Learn about Disaster Recovery Planning (DRP) - the development and implementation of strategies, processes, and procedures designed to prevent and anticipate disruptions to an organization’s critical IT systems and infrastructure, and to restore them as quickly and completely as possible after a disruptive event or disaster.
This IT Security: Corporate Account Takeover online training course is designed for all employees who use computers and other electronic devices in the course of their work. Corporate Account Takeover (CATO) is a type of cybercrime where cybercriminals gain access to employees’ account credentials on corporate systems. In this course, employees will learn to recognize Corporate Account Takeover (CATO) attacks and take action to defend against them.
This IT Security: Credential Stuffing online training course is designed for all employees in all industries. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into another, unrelated service. Learn what credential stuffing is, the potential negative effects of a credential stuffing attack, and best practices for IT Departments and employees to prevent credential stuffing attacks.
This IT Security – It Begins with You online training course is designed for all employees who use computers and other devices to access their organizations’ systems. Learn about the main ways that cybercriminals use people to compromise systems, and what we can all do to avoid becoming victims.
This IT Security: Mobile Phone Security Awareness online training course is designed for employees who use smartphones in the course of their work. In this course, you will learn to identify smartphone security threats, how to configure your smartphone to mitigate the risks and use your smartphone in a secure way.
This IT Security: Ransomware online training course is designed for employees in all industries who work on computers. In this course, you will learn about ransomware, best practices for IT staff and other employees to prevent ransomware attacks, and recovery options in the event that your organization becomes a ransomware victim.
Ce cours de formation en ligne Sécurité des TI - Rançongiciel a été conçu pour les employés qui accès à un courriel d’entreprise. Ce cours explique ce que sont les rançongiciels et décrit les pratiques exemplaires que le personnel des TI et d’autres employés doivent suivre afin de prévenir les attaques par rançongiciel; y sont également exposées les options de rétablissement dans l’éventualité où votre organisation serait victime de ce type d’attaque.
Ce cours de formation en ligne Sensibilisation au piratage psychologique a été conçu pour tous les employés. Les techniques utilisées par les cybercriminels ont évolué au fil des ans. À mesure que les entreprises améliorent la sécurité de leurs systèmes, les cybercriminels se tournent de plus en plus vers le piratage psychologique, en manipulant les gens pour qu’ils réalisent des actions qui compromettent leurs ordinateurs et leurs appareils ou exposent des renseignements personnels ou de nature délicate. Apprenez à reconnaître les façons dont les criminels essaient de manipuler les gens pour qu’ils réalisent des actions qui compromettent leurs ordinateurs et leurs appareils ou exposent des renseignements personnels ou de nature délicate.
This Social Engineering Awareness online training course is designed for all employees. The techniques that cybercriminals use have been evolving over the years. As companies become better at securing their systems, cybercriminals are increasingly turning to social engineering – manipulating people into performing actions that either compromise their computers and devices or expose personal or sensitive information. Learn to recognize the ways that criminals try to manipulate people into performing actions that either compromise their computers and devices or expose personal or sensitive information.
This Supply Chain Cybersecurity online training course is designed for Chief Information Security Officers (CISOs) and IT security employees. Learn about the two types of supply chain attacks: island hopping and third-party software attacks, and how to mitigate the risks for both types of attacks within your organization and your supply chain.
This Synthetic Identity Fraud online training course is designed for employees of banks and other lending institutions. In this course, you will learn what Synthetic Identity Fraud is, how fraudsters create and use synthetic identities, and what you can do to reduce the risk of loss from this type of fraud.