Cybersecurity Training Courses
Compliance Expert - Privacy and Information Security - Examples
Depending on the context, personal information may need to be protected for confidentiality. Organizations with access to this information need to understand how and when to protect privacy. This course will present some examples from the trenches.
ViewCOMPLIANCE EXPERT: Privacy & Information Security - The Basics
This training explains how to protect personal information for confidentiality. Organizations with access to this information need to understand how to judge what and when to protect privacy.
ViewCompliance Short - Cybersecurity
This training identifies security risks associated with using the company's electronic devices, network, and other IT resources
ViewCybersecurity and Online Habits
This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks.
ViewCybersecurity Short: Avoiding Phishing Attacks
This short course covers the different types of phishing attempts that you may encounter, how they work, and what you can do to help ensure you don't become a victim to one.
ViewData Protection and Device Security
This course covers a variety of best practices for preventing the loss and theft of company data, as well as protecting the physical devices employees use in their jobs, both at and away from the office.
ViewGlobal Internet, Social Media, and Electronic Communication
This training explores company use of the Internet, social media, and other electronic communication and recommends you be familiar with your company's policy on these resources.
ViewGlobal Privacy and Information Security
This course gives high-level awareness of the regulatory, legal, and corporate requirements for handling and protecting personal information. It explores information security laws and best practices for handling data appropriately.
View