Discover the knowledge you need

Cybersecurity Awareness Courses.

Filter

Showing all 12 Cyber courses
This curated course provides end-users cybersecurity training and can help organizations by teaching employees how to recognize and prevent cyber threats, such as social engineering attacks and malware. This can lead to a reduction in successful attacks on the organization, which can save the company time, money, and resources that would otherwise be spent responding to and recovering from an attack. Additionally, end-user training can help to create a culture of security within the organization, which can further strengthen the organization's defenses against cyber threats.
On Demand
1h 12m
Includes
Skill Lab
Assessment
Malicious software, or malware, is any software that is designed to harm or exploit vulnerabilities in computer systems. By teaching employees about the types of malware, how it spreads, and how to identify and avoid it, an organization can help prevent malware infections and the potential damage they can cause. This can include things like phishing attacks, ransomware, and other types of malware. Overall, having a high level of malware awareness can help to strengthen an organization's defenses against cyber threats.
On Demand
18m
Includes
Assessment
Having safe networks can help prevent unauthorized access to the organization's devices and data, and can also help protect against cyber attacks and data breaches. Using secure protocols and encryption can help to ensure the confidentiality and integrity of data transmitted over the network. Additionally, implementing network segmentation and using firewalls can help to further protect the network by limiting access and controlling the flow of traffic. Overall, having safe networks is an important aspect of protecting an organization's cybersecurity.
On Demand
6m
Includes
Assessment
Having a secure password can help protect your personal and sensitive information from being accessed by unauthorized individuals. A strong password is difficult for others to guess or crack, making it more difficult for cybercriminals to gain access to your accounts or devices. Using unique, complex passwords for each of your accounts can also help prevent one compromised password from being used to access multiple accounts. Overall, using secure passwords is an important aspect of protecting yourself and your information online.
On Demand
16m
Includes
Assessment
Having physical security measures in place can help an organization protect against cyber threats by creating an additional layer of defense. These measures can include things like secure access controls, such as keycards or biometric scanners, for physical locations; secure storage for devices and data; and surveillance cameras to help detect and deter unauthorized access. By implementing physical security measures, an organization can help prevent unauthorized access to its devices, data, and physical locations, which can in turn help protect against cyber attacks and data breaches.
On Demand
23m
Includes
Assessment
Training employees to recognize and resist social engineering attempts is an important part of a strong security posture. It can help prevent sensitive information from falling into the wrong hands and protect against a variety of threats, including phishing attacks, pretexting, baiting, and quid pro quo. By teaching employees how to identify and respond to these tactics, organizations can significantly reduce the risk of falling victim to social engineering attacks.
On Demand
18m
Includes
Assessment

In September of 2017, consumer credit reporting agency Equifax announced it had been the target of a data breach in which 143 million records were compromised. In this episode, cyber security experts unravel a perfect storm of hacker preparedness and an unpatched system vulnerability. Watch and learn how hackers planned and executed this massive security infiltration in less than a week - and what you can do to protect your personal information and data.

On Demand
20m
We've all heard about ransomware. The payoff for hackers comes when end-users and businesses pay the ransom to get their files back. But what if the hackers have other motives? Dive deep with our security experts as they explore the NotPetya attack, where chaos is the prize. In this episode, you'll see how hackers have learned to leverage minor security vulnerabilities into a global issue.
On Demand
22m
Sharing and protecting personal information can sometimes seem at odds when we fill out online forms and use modern medical services. In studying the OPM attack, Cybersecurity and IT experts reveal the most dangerous tool in a hacker's toolkit: patience. Watch this episode to learn how hackers got into one of the largest personal and medical information databases in the United States and how security experts are striking back.
On Demand
23m

"Hidden in plain sight" is how the SolarWinds breach went undetected for months. But how did hackers insert the malicious code into the systems and distribute it to thousands of users? In this episode, cyber security experts reveal how the attack was initiated, and patience was rewarded.

On Demand
44m
Cyberwarfare has stepped out of the realm of science fiction and into our geopolitical reality. But how was an isolated enriched uranium facility hacked, even though it has no external network or internet connections? In this episode, cybersecurity experts uncover each layer of the Stuxnet attack – a long game with nuclear consequences.
On Demand
24m
Spear phishing, credential harvesting, social engineering, and the dark web are all covered in this episode of Cyber Autopsy. In July, 2020 a teenager hacked Twitter and accomplished one of the most visible and remarkable cyber-attacks of the 21st century. Watch this episode as cybersecurity experts dissect every detail and explain how this could have been avoided.
On Demand
27m