C6 Training Courses
COMPLIANCE EXPERT: IT Security - Safeguarding Mobile Devices
This course discusses how to use mobile devices in a secure manner.
ViewCompliance Expert - Privacy and Information Security - Examples
Employees play a key role in helping ensure data security and safety. This course covers best practices to help prevent data loss and theft.
View
COMPLIANCE EXPERT: Privacy and Information Security - The Basics
This course covers some key considerations that you should keep in mind for following your company's data protection policies and procedures.
ViewCompliance Impact: Information Security – The Break-In
This course covers best practices you should follow when you suspect a breach
ViewCompliance Impact: Social Media - Blogger Gone Bad
This course covers the risks associated with unsafe blogging practices, and actions you can take to ensure safe blogging for both yourself and your company.
ViewCompliance Impact: Using the Internet – Beware the Share
This course covers key best practices for properly using the Internet at work to help keep both you and your company secure and productive.
ViewCompliance Short - Cybersecurity
Lax security practices and poor security awareness on the part of employees can result in security breaches that have serious consequences for organizations. Hackers will take advantage of any vulnerability, and their reach is global.
ViewConducting Interviews: Asking the Right Questions
Most organizations rely on the job interview as the primary tool for selecting which employees to hire. This impact explores how to use four common interview questioning techniques.
View
Cybersecurity and Online Habits
This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks.
ViewCybersecurity Short: Avoiding Phishing Attacks
This short course covers the different types of phishing attempts that you may encounter, how they work, and what you can do to help ensure you don't become a victim to one.
View
Data Protection and Device Security
This course covers a variety of best practices for preventing the loss and theft of company data, as well as protecting the physical devices employees use in their jobs, both at and away from the office.
ViewDecontamination (HAZWOPER)
This training provides information concerning decontamination, which is the process of removing contaminants that have collected on workers and equipment
View