Security First Elite Solution

  • Working Securely From Home

    Working Securely From Home

    Mobile computing devices combined with online workplace collaboration platforms and video conferencing make working from home easier than ever. However, working outside of an organization’s secured facilities can expose a remote worker and his/her...

  • Working Remotely    

    Working Remotely   

    Mobile computing devices like laptops, smartphones, and tablets can be found everywhere – at home, in the office, and everywhere in between. These devices, combined with high speed wireless connections, make working remotely easier than ever...

  • Invoice Fraud (BECs and VECs)

    Invoice Fraud (BECs and VECs)

    Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster...

  • Social Engineering Advanced

    Social Engineering Advanced

    This advanced course will teach end users how to identify and avoid giving away sensitive information to these hackers. Topics: Defeating Social Engineers In-Person Social Engineering Online and Targeted Social Engineering Countermeasures and...

  • Protecting Mobile Data and Devices

    Protecting Mobile Data and Devices

    Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed...

  • Preventing Malware: Mobile Devices

    Preventing Malware: Mobile Devices

    This course acknowledges the commonplace usage of mobile devices at work and explains key vulnerabilities that users must be aware of. By mastering the information presented in this course you will be able to help defend your mobile devices from security...

  • Protecting Against Malicious Insiders

    Protecting Against Malicious Insiders

    The threat is real. It’s taking place somewhere, right now. A malicious insider has decided to mount a cyberattack against your organization from the inside out. This malicious insider will stop at nothing to get the data they need to commit theft,...

  • IoT/Home Security

    IoT/Home Security

    Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of...

  • Phishing Defense Essentials

    Phishing Defense Essentials

    Learn how to stay ahead of hackers and cyber criminals who aim to steal data and insert malicious payloads by learning and applying the best practices outlined in this module. Topics: Anti-Phishing Best Practices