Course Library
We add new courses in both English and Spanish each month.
Whiteboard Animation Courses
A chalkboard artist takes you inside a workplace where unwary employees are lured by hackers into online behaviors that lead to damaging data breaches.
Each story tells users how to spot and avoid these attacks. Content lessons are reinforced at the end with 5 Quick Tips and a Quiz.
Emails are an essential communication tool for all organizations. Emails are also a popular target for hackers. The course describes an example of a malicious email and the damages it can cause to an individual and organization. It also provides email security tips.
Advanced capabilities of smartphones come with benefits and security risks. All the bad things that can happen to you online on a computer can happen to you on a smartphone. The course describes an example of a smart phone attack that affects the individual and organization. It also provides smartphone security tips.
Cloud based solutions may provide cost-savings, but they also present potential security risks to you and your organization. This course describes an example cloud based IT infrastructure provider data breach. It also provides cloud security tips.
DDoS (Distributed Denial of Service) attacks overload your organization’s most important computers and servers rendering them unusable during the duration of the attack. The course describes an example of a DDoS attack. It also provides security tips related to potential DDoS attacks.
Security and compliance are completely different. Compliance does not ensure Information Security. The course describes an example of an organization that relied solely on compliance and experienced a data breach. It also provides tips regarding balancing security and compliance.
Your Business Continuity Plan guides how your organization’s critical functions will continue to operate and minimize the impact during an emergency. This course describes an example earthquake emergency and alternate data center preparation. It also provides best practice tips.
Mergers & Acquisitions are a common corporate tool for growth, but they also pose potential Information Security risks. The course describes an example of an undetected security breach that the acquired company experienced before the acquisition. It also provides M&A security tips.
Organizations must develop adequate budgets and develop dashboards to measure Information Security ROI. The course describes an organization that did not have an adequate Information Security budget to complete required preventative assessments. It also provides dashboard and related security tips.
The work you do for your organization, including your know-how, and the deliverables that result from it belong to the organization and are considered its intellectual property. This course provides an overview of Intellectual Property and tips on how to handle the right way.
You cannot outsource your legal and regulatory liabilities and obligations to your third party vendors. This course provides an overview of Third Party Vendor Security and tips to build a robust third party vendor risk management process.
Physical security is a critical aspect of Information Security. This course provides tips on how to stay safe – general tips and IT department tips.
NIST stands for the National Institute of Standards and Technology, a non-regulatory government agency that promotes innovation and competitiveness in a safe and secure manner through the development and issuance of standards and guidance. This course provides an overview of NIST.
GLBA stands for the Gramm-Leach-Bliley Act. It is also known as the Financial Modernization Act of 1999. Organizations classified as a financial institution that "significantly engaged" in "financial activities" must comply with GLBA. This course provides an overview of GLBA.
This course provides a high-level overview of HIPAA regulations and provides specific best practices for complying with the law and protecting the personal health information you are working with. We’ll also share some general cybersecurity-related tips.
PCI stands for Payment Card Industry Data Security Standard. This course provides an introduction to PCI and related security tips.
PHI is data that relates to an individual’s past, present or future physical or mental health or condition, the provision of health care to the individual, or the past, present, or future payment for the provision of health care to the individual. This course provides an overview of PHI.
The General Data Protection Regulation (Regulation (EU) 2016/679) was adopted on April 27, 2016 and was created by the European Parliament, the Council of the European Union (EU), and the European Commission. This course provides an overview of GDPR.
PII is Personally Identifiable Information. This course provides an overview of PII, confidentiality classification tips as well as tips for an organization regarding preparing for a security breach.
The Health Information Technology for Economic and Clinical Health Act (HITECH) was enacted as part of the American Recovery and Reinvestment Act of 2009 and became effective on February 17, 2009. This course provides an introduction to HITECH.
Bite-sized Videos
These 30-second “cyber dictionary” videos make it easy to identify and understand the latest cyber threats. Users learn how data can be compromised if they aren’t careful online.
Told in bullet-point fashion, this content is for employees who need to be aware of risky online behaviors. They can watch at their desk or on their smartphones, and quickly get back to work.
- Hacker
- Phishing
- Spear Phishing
- Pharming
- Firewall
- Cloud
- IP Address
- HTTP vs. HTTPS
- Rootkits
- Key Logger
- Ransomware
- Adware
- Spyware
- Virus
- Trojan Horse
- Worm
- Backdoor
- Exploit
- Bitcoin
- DDOS
- Cache Poisoning
- Dumpster Diving
- Encryption
- Jailbreaking
Lecture Courses
Told in a collection of 1- to 3-minute videos, these courses help users who prefer video learning to understand basic information about cyberthreats and how to stay safe online.
Participants learn core concepts and other important information in a clear and concise fashion so that the topic can be easily understood.
Emails are an essential communication tool for all organizations. Emails are also a popular target for hackers. The course describes an example of a malicious email and the damages it can cause to an individual and organization. It also provides email security tips.
Social media creates a web of trust and false sense of security that’s dangerous to rely on. Privacy issues and identity theft in social media are a growing concern. This course describes an example of social media incident that affects the individual and organization. It also provides social media security tips.
Social media creates a web of trust and false sense of security that’s dangerous to rely on. Privacy issues and identity theft in social media are a growing concern. This course describes an example of social media incident that affects the individual and organization. It also provides social media security tips.
Advanced capabilities of smartphones come with benefits and security risks. All the bad things that can happen to you online on a computer can happen to you on a smartphone.
Malware comes in all shapes and sizes – e.g., ransomware, scareware, keyloggers, Trojans, viruses, and worms. But they all have the same objective – to steal your money or your information. This course describes an example drive-by download attack. It also provides malware security tips.
When you are on the move, your laptop, mobile phone and other devices expose you and your organization to Information Security risks. The course describes an example of organizational information being stolen on a public Wifi network. It also provides security on the move tips.
IoT stands for Internet of Things and as the name suggests, it’s essentially when everyday things from your life like watches, TVs, glasses, cars, refrigerators, and a really long list of other things can connect to the Internet and become “smart things.” This course provides an overview of IoT. It also provides IoT security tips.
Keeping sensitive information secure can sometimes be as simple as employees maintaining a clean workspace. Technology based solutions have never been enough to protect an organization and maintain the trust of its customers. This course provides an overview of Insider Threat. It also provides related security tips.
Security At Home is increasing in importance as cyber threats continue to increase. The course includes six, 1-3 minute lecture videos. The lecture videos include the following: why bother about security at home, common threats, signs you may have been hacked, and security best practices. This course is a part of ERMProtect's Security Awareness Training Library.
PCI stands for Payment Card Industry Data Security Standard. This course provides an introduction to PCI and related security tips.