Quick view Tales From CPU City™ (Episode 1) - Cryptojacking Episode One of Tales from CPU City takes place at the CPU City Clinic. Find out what happens when an ailing laptop checks in to see why his performance is faltering and learn what you can do to help protect your computer from being cryptojacked. ... View Details
Quick view Working Securely From Home Mobile computing devices combined with online workplace collaboration platforms and video conferencing make working from home easier than ever. However, working outside of an organization’s secured facilities can expose a remote worker and his/her... View Details
Quick view Working Remotely Mobile computing devices like laptops, smartphones, and tablets can be found everywhere – at home, in the office, and everywhere in between. These devices, combined with high speed wireless connections, make working remotely easier than ever... View Details
Quick view Invoice Fraud (BECs and VECs) Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster... View Details
Quick view Social Engineering Advanced This advanced course will teach end users how to identify and avoid giving away sensitive information to these hackers. Topics: Defeating Social Engineers In-Person Social Engineering Online and Targeted Social Engineering Countermeasures and... View Details
Quick view Protecting Mobile Data and Devices Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed... View Details
Quick view Preventing Malware: Mobile Devices This course acknowledges the commonplace usage of mobile devices at work and explains key vulnerabilities that users must be aware of. By mastering the information presented in this course you will be able to help defend your mobile devices from security... View Details
Quick view Protecting Against Malicious Insiders The threat is real. It’s taking place somewhere, right now. A malicious insider has decided to mount a cyberattack against your organization from the inside out. This malicious insider will stop at nothing to get the data they need to commit theft,... View Details
Quick view IoT/Home Security Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of... View Details
Quick view Phishing Defense Essentials Learn how to stay ahead of hackers and cyber criminals who aim to steal data and insert malicious payloads by learning and applying the best practices outlined in this module. Topics: Anti-Phishing Best Practices View Details