Search
IT Security: Corporate Account Takeover (Individual)
This course is designed for all employees who use computers and other electronic devices in the course of their work. Employees learn to recognize Corporate Account Takeover (CATO) attacks and take...
IT Security: Business E-mail Compromise (Individual)
This course explores the e-mail fraud schemes known collectively as Business E-mail Compromise (BEC). In a BEC attack, cyberthieves compromise a corporate e-mail account and impersonate the e-mail...
IT Security: It Begins With You (Individual)
This course is designed for all employees who use computers and other devices to access their organizations’ systems. Learn about the main ways that cybercriminals use people to compromise systems,...
IT Security: Password Security Awareness (Individual)
This course explores the importance of having strong passwords, how and why hackers access accounts and systems, the consequences of these security breaches as well as both good and bad password...
