可用的课程

IT安全最佳实践

25分钟IT安全模块课程,包括8个场景,每个场景会展示一个单独的IT安全问题,您需要根据IT安全政策以及安全常识来做出这些行为正确与否的判断。

信息资产安全保护

如其它资产一样,信息也是一种业务资产。它有一定的价值,必须受到保护。本30分钟的课程涵盖了基本的工作实践和指导方针,以帮助您安全、自信地处理信息。

社会工程学攻击防范

25分钟的社会工程学攻击科普,以三维形式的办公人员的模拟案例故事场景展开,包括知识讲解、挑战性的互动测试,以及最终的课后考核。学员能掌握常见的社交工程攻击手法如钓鱼、电信诈骗、社交媒体挖掘、公共场所工作安全等等。

信息安全保密实践

20分钟简明快速的电子学习课程,适合各类型机构的信息安全与保密意识科普,课件以知识科普讲解为主,贯穿几个办公室风格的安全案例,启发学员互动参与,并配以课后测试题以检测学员的学习情况。

计算机安全使用

30分钟的计算机安全课程,列出保护计算设备安全的最佳做法,以及保护软件和数据、确保在线安全和数据备份的方法。课后测试,公司计算机设备的用户必须掌握的安全使用知识和技能。

公司员工安全意识

35分钟的课程,包含现代科技感很强的信息安全意识动画教程,以及课后测试题,国际中文版适用于各种规模的商业型公司,特别是外向型企业。

信息安全意识入门

15分钟的信息安全意识入门课程模块儿,非常浅显和基础的,适用于所有类型机构的所有工作人员。

聪明上网最佳实践

10分钟的互联网安全课程包括:常见的互联网安全威胁,安全使用互联网进行网络冲浪方面的基础知识讲解和课程测试等。

隐私与保密意识

本30分钟的动画课程包含9个隐私保护与保密意识话题,有一个测试题(样本),允许学员自由跳转,快速完成测试和通过学习。

Information Classifications

An overview of Information Classifications including, confidential, restricted, internal, and public information.


Risk Management

An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.


Passwords

An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.


Mobile Devices

An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.


Be Careful with Information

An overview of Information safety including the use of public networks, securely disposing of information, encrypting data, as well as, keeping personal and business information separate.

Social Engineering

An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.


Ransomware

An overview of Ransomware including a short video and knowledge check.


Phishing vs. Spear Phishing

An overview of Phishing versus Spear Phishing including a short video and knowledge check.


Phishing and Emotions

An overview of Phishing and Emotions including a short video and knowledge check.


Vishing

An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.


Malware

An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.


Working Outside the Office

An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.


General Phishing

An overview of General Phishing including a short video and knowledge check.


Phishing

An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.


Brand Impersonation

An overview of brand impersonation including popular narratives from online shopping, shared documents, social networking, shipping, and banking.

To Catch a Threat

Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.


Resiliency Quiz

Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails.

Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.


Indicators of a Phish

Investigate the email and answer the prompts. If you score more than 80% you win the game.


Honey Comb Challenge

Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.


Phishing Category Challenge

Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.