Explore Our Suite of Comprehensive Role Based
Security Awareness Training

Security Incident
Response Training

This course aims to strengthen your teams’ knowledge and vigilance to identify security incidents, how to report them, and what to expect once a security incident is reported.

This course covers:

  • What is a security incident?
  • When and where do security incidents happen?
  • How to spot a security incident.
  • How immediate reporting of a security incident can prevent a data breach.
  • What you can expect once a security incident is reported.

Customization: Fully customizable to meet your training requirements. See Examples
Time to Complete: Approximately 20 minutes.
Quiz: 10 question quiz with adjustable score.
Target Roles: Focus is on all roles or can be targeted to specific teams.

Incident Response Training. Types of incidents.
Incident Response Training. When to report incidents.

Privileged Access Training

Your organization’s privileged accounts are attractive targets for cyberattacks. According to recent cybersecurity surveys, approximately 75% of data breaches take advantage of privileged accounts. Empower your Privileged Users to protect those accounts from cyber threats by giving them up-to-date training to mitigate your organization’s risk.

This course covers:

  • Types of privileged accounts.
  • The Principle of Least Privilege.
  • Users responsibilities to secure privileged account access.
  • Mechanism for using privileged accounts, including PAM Solutions.
  • Credentials for privileged accounts.
  • Abusing privileges – complying with policies and procedures.
  • Securing privileged access and reporting incidents.

Customization: Fully customizable to meet your training requirements. See Examples
Time to Complete: Approximately 20 minutes.
Quiz: 10 question quiz with adjustable score.
Target Roles: Privileged Account Holders.

Privileged Access Training.
Privileged Access Training. Attacking credentials.

Security Awareness Training for Senior Leadership

Your organization’s Senior Leaders have additional responsibilities for helping to safeguard the cybersecurity of your company’s systems, networks, data, and other digital assets against a variety of cyber threats. They help protect your organization against fines and lawsuits from day-to-day risks. This focused training course helps Senior Leadership understand the emerging digital and physical security threats that jeopardize organizations every day.

This course covers:

  • Understanding emerging cybersecurity threats.
  • How senior leaders and executive assistants may be targeted by cyber criminals.
  • How senior leaders can identify and stop cybersecurity attacks.
  • Practicing cyber hygiene to safeguard digital assets.
  • Basic responsibilities to help create a culture of cybersecurity within their teams and divisions.

Customization: Fully customizable to meet your training requirements. See Examples
Time to Complete: Approximately 25 minutes.
Quiz: No quiz or quiz optional.
Target Roles: Executives, Board Members, Executive Assistants

Security Awareness for Senior Leadership. Digital and physical attack threats.
Security Awareness for Senior Leadership. Supply chain attacks.

Security Awareness Training for IT Professionals

IT Teams are more likely than regular users to be targeted by cyber attackers because of their access to digital assets Every aspect of IT involves safeguarding security to some degree. Give your IT teams meaningful cybersecurity awareness training to support the sensitive role they hold in the organization.

This course covers:

  • How basic security and privacy principles relate to your daily work.
  • How you can identify and prevent cyber-attacks that may target you or our company.
  • Reinforce basic principles, including Privacy, Resilience of Systems, Risk Management, Contingency Planning, and more.
  • Identifying Attacks, including Compromised Third-Party Providers and Insider Threats.
  • Preventing cyber attacks by maintaining Cyber Hygiene of Systems, and Configuring Internet of Things (IoT) Devices to keep them updated.
  • Protecting Information, Safeguarding Technical Knowledge, and Sanitization and Destruction of Media and Devices.

Customization: Fully customizable to meet your training requirements. See Examples
Time to Complete: Approximately 25-30 minutes
Quiz: 5 questions randomly drawn from 10 questions
Target Roles: IT Team Members

Security Awareness for IT Professionals. Course objectives.
Security Awareness for IT Professionals. Incident response.

Course Customization Options