Our Security Literacy content is composed of six distinct courses, each dealing with a unique set of security behaviors and situations. The following is a brief description of each course followed by a list of available video modules.
1. Security Fundamentals - Every organization needs its users to have a basic understanding of security awareness. The "Security Fundamentals" course provides instruction on topics such as creating and remembering secure passwords, as well as what do to when you have been hacked. Each lesson will increase awareness in users in order to make your organization more secure from hacking attacks.
- Thinking Risk
- How Hackers Get In
- I Think I’ve Been Hacked
2. Why This Matters to You - Even though traditional training outlines what to and not to do, many do not outline why. The “Why This Stuff Matters to You’ course increases and personalizes the users understanding of the process so that they are better able to identify problems and resolve them before they are an issue for your organization.
- Human Firewall
- Data Protection and Destruction
3. Online Security - The Internet is an invaluable resource to users, as well as your organization, but with such benefits come risk. The “Online Security” course informs users within your organization about how information posted online can be used against you as well as how to mitigate such attacks.
- Information on the Internet
- Staying Secure Online
- Social Media Friends Strategy
- Phishing and Social Engineering
4. Polices - Every organization has them, but many users are not informed as to what is appropriate to do at the office and why. The ‘Policies’ course no only goes over the do’s and don’ts of office interactions but also outlines how violating these policies is not just an HR violation, but more importantly a security risk.
- Appropriate Use
- Use and Abuse
5. Physical Aspects of Security - With so many high technology security systems, many forget the importance of physical security to an organization. The ‘Physical Aspects of Security’ course outlines how your organization can be attacked from the inside, as well as the outside. More specifically, this course teaches your users that something as little as loosing your smart phone or not closing a security door is enough to give a social engineer access to your entire organization.
- Internal and External Threats
- Physical Security
- Social Engineering in the Real World
6. When You’re Not in the Office - The age of work only being done in the office is long gone and users are checking mail and working on projects everywhere. ‘When you’re not in the Office’ guides your users through how to make sure they are still secure when handing your organizations valuable information remotely.
- Personal Computers
- Wi-Fi Security
- Working Remotely