ad-sponsored-text

Skip to Main Content
ICBA

Search

Sort

IT Security: Credential Stuffing (Individual)

This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...

CPE Credits: 0.25
Information Technology Technology Security +1 More...

IT Security: Business E-mail Compromise (Individual)

This course explores the e-mail fraud schemes known collectively as Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail...

CPE Credits: 0.50
Information Technology Technology Security +1 More...

IT Security: Mobile Phone Security Awareness (Individual)

This course explores the threats to security on smartphones. Smartphones are fully functional computers as well as communication devices. As such, they are subject to the same types of IT security...

CPE Credits: 0.50
Information Technology Technology Security +1 More...

IT Security: Ransomware (Individual)

This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...

CPE Credits: 0.75
Information Technology Technology Security +1 More...

ad-sponsored-text