Available courses
社会工程学攻击防范
25分钟的社会工程学攻击科普,以三维形式的办公人员的模拟案例故事场景展开,包括知识讲解、挑战性的互动测试,以及最终的课后考核。学员能掌握常见的社交工程攻击手法如钓鱼、电信诈骗、社交媒体挖掘、公共场所工作安全等等。
信息安全保密实践
计算机安全使用
30分钟的计算机安全课程,列出保护计算设备安全的最佳做法,以及保护软件和数据、确保在线安全和数据备份的方法。课后测试,公司计算机设备的用户必须掌握的安全使用知识和技能。
Information Classifications
An overview of Information Classifications including, confidential, restricted, internal, and public information.
Risk Management
An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.
Passwords
An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.
Mobile Devices
An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.
Be Careful with Information
An overview of Information safety including the
use of public networks, securely disposing of information, encrypting data, as
well as, keeping personal and business information separate.
Social Engineering
An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.
Ransomware
An overview of Ransomware including a short video and knowledge check.
Phishing vs. Spear Phishing
An overview of Phishing versus Spear Phishing including a short video and knowledge check.
Phishing and Emotions
An overview of Phishing and Emotions including a short video and knowledge check.
Vishing
An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.
Malware
An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.
Working Outside the Office
An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.
General Phishing
An overview of General Phishing including a short video and knowledge check.
Phishing
An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.
Brand Impersonation
An overview of brand impersonation including
popular narratives from online shopping, shared documents, social networking,
shipping, and banking.
To Catch a Threat
Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.
Resiliency Quiz
Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails.
Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.
Indicators of a Phish
Investigate the email and answer the prompts. If you score more than 80% you win the game.
Honey Comb Challenge
Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.
Phishing Category Challenge
Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.