可用的課程
IT安全最佳实践
25分钟IT安全模块课程,包括8个场景,每个场景会展示一个单独的IT安全问题,您需要根据IT安全政策以及安全常识来做出这些行为正确与否的判断。适合有西方外企文化基础的组织机构。
社会工程学攻击防范
25分钟的社会工程学攻击科普,以三维形式的办公人员的模拟案例故事场景展开,包括知识讲解、挑战性的互动测试,以及最终的课后考核。学员能掌握常见的社交工程攻击手法如钓鱼、电信诈骗、社交媒体挖掘、公共场所工作安全等等。
职员网络安全必知
25分钟的课程聚焦于阻止不断增长的网络盗窃威胁。培训内容专为所有员工设计,视频用非技术人员就可以理解的语言,讨论网络安全话题。学员通过课后测试便可获得学习证书。
信息安全保密实践
计算机安全使用
30分钟的计算机安全课程,列出保护计算设备安全的最佳做法,以及保护软件和数据、确保在线安全和数据备份的方法。课后测试,公司计算机设备的用户必须掌握的安全使用知识和技能。
Infosec English Daily 003
坚持每日学英语、日积月累知安全 Learn English Through Security Awareness Tips
Infosec English Daily 002
坚持每日学英语、日积月累知安全 Learn English Through Security Awareness Tips
Infosec English Daily 001
坚持每日学英语、日积月累知安全 Learn English Through Security Awareness Tips
Information Classifications
An overview of Information Classifications including, confidential, restricted, internal, and public information.
Risk Management
An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.
Passwords
An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.
Mobile Devices
An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.
Be Careful with Information
An overview of Information safety including the
use of public networks, securely disposing of information, encrypting data, as
well as, keeping personal and business information separate.
Social Engineering
An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.
Ransomware
An overview of Ransomware including a short video and knowledge check.
Phishing vs. Spear Phishing
An overview of Phishing versus Spear Phishing including a short video and knowledge check.
Phishing and Emotions
An overview of Phishing and Emotions including a short video and knowledge check.
Vishing
An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.
Malware
An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.
Working Outside the Office
An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.
General Phishing
An overview of General Phishing including a short video and knowledge check.
Phishing
An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.
Brand Impersonation
An overview of brand impersonation including
popular narratives from online shopping, shared documents, social networking,
shipping, and banking.
To Catch a Threat
Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.
Resiliency Quiz
Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails.
Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.
Indicators of a Phish
Investigate the email and answer the prompts. If you score more than 80% you win the game.
Honey Comb Challenge
Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.
Phishing Category Challenge
Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.