Click on an icon to read a course description.
ABCs of Cybercrime
The virtual criminal community is highly organized with millions of dollars being generated by tightly‐coordinated
groups of specialists, all syphoned by naive money mules into bank accounts around the world. The more we know
about cybercrime, the better equipped we are to defend against it. This course provides an overview of black hat
hacking and the black market; how it works, why you should care and how to protect yourself and your
Corporate Account Takeover
Cybercriminals are using increasingly sophisticated techniques to commit payments fraud against commercial business
accounts. In this course, you'll learn about corporate account takeover, how businesses are attacked, how federal
regulators and financial institutions are collaborating to help you to prevent it from happening to your business, and
how you can protect yourself.
Data Records & Retention
Recent years have witnessed a tremendous growth in the use of electronically stored information. The ease with
which information may be created, the number of places where it may be stored, and requirements regarding the use
of electronically stored information in litigation, all require that institutions manage stored information effectively,
efficiently and consistent with legal obligations. This course helps educate staff on how to properly create, retain and
destroy electronic information.
Defense Against Online Threats
New online hacking techniques are created every day. This course covers the main online threats and vulnerabilities to
watch out for when surfing the web such as web browser vulnerabilities, Fake AV, Spyware, Rootkits, Botnets and
more. Students will earn what preventive measures can be taken to defend home and office systems and networks.
The days of communicating verbally are almost a thing of the past. Communicating via email is the way we solve
problems, address issues, answer questions, provide updates, disseminate reports, give direction, or share ideas with
our colleagues and customers. In order to make a good impression and communicate effectively, we need to be mindful
of what we say and how we say it before hitting the send button.
A lot of sensitive information is sent via email, including addresses, phone numbers, names, and even financial data
such as receipts, order confirmation numbers, and other details about confidential transactions. In this course, you’ll
learn how to keep yourself and your customers protected, how to recognize and avoid email scams and threats, and
how to employ email security best practices.
An Introduction to Identity Theft
This two‐part course is intended to sharpen and build upon your existing knowledge of identity theft and will provide
an overview of the following topics: The makings of an identity, including attributes and unique identifiers;
Identification – how to ensure a person is who they say they are; Identity Management – managing and protecting
an identity; and an individual’s right to privacy.
Avoiding Identity Theft
Identity theft has been, and remains to be, a very real concern in the world today. Protecting yourself against it is
important but not always fool‐proof. You can take any number of measures to keep your identity safe but you are
not guaranteed that it will not happen. In this course, you’ll learn the basics of identity theft, including its potential
impact, how it happens, and who is affected. You’ll learn to spot and effectively react to identity thieves and, know
what actions to take if you become a victim.
Introduction to Cyber Security Awareness
Because we handle a great deal of sensitive information each day, it’s important to understand the fundamental
principles of information security and the importance of policies, standards and procedures. This course serves as an
introduction to the Information Security Awareness course series.
Passwords! They can be a source of frustration at times, but passwords are necessary to keep your accounts safe and
to prove that you are who you say you are. This course will help you understand the importance of creating a strong
password – one that’s both easy to remember and difficult to guess. You’ll also learn what you need to do should you
suspect your password has been compromised.
Physical security around the facility is the front line of defense for any organization. When that fails, all fails. Without
physical security, none of your organization’s security policies and procedures would matter because they would be
easily bypassed. The goal of this course is to equip you with the knowledge you need to help keep our facilities, people
and assets secure and safe while maintaining the quality of life in the workplace that we have come to expect.
The Essentials of Social Engineering
It's much easier to enter a building if the door is left open. Employees who are not trained to spot and stop social
engineers in their tracks, will unwittingly leave the door open. Hackers know that "if you can't hack the technology,
hack the people." This course will explain social engineering, how attackers select their targets as well as the
techniques they use. Armed with this knowledge, you will stand a better chance of not becoming their next victim.
With impersonation, the social engineer approaches the target in person and assumes a role, usually of authority. The
impersonator’s goal is to ultimately gain access to a system or network in order to commit fraud, industrial espionage
or identity theft. In this course you will learn about some of the common roles used by impersonators, why they are so
effective, and how you can defend against this type of social engineering attack.
Phishing is a form of social engineering perpetuated over digital communications like email. The banking and financial
services sector find themselves bearing the brunt of these attacks which account for more than 90% as opposed to
retail and other industries. In this course, you’ll learn about eight unique phishing traps and how to spot them. You’ll
also learn what you should and shouldn’t do to protect yourself from becoming a victim; and steps you can take if you
suspect you’ve become a victim.
Many people are familiar with the idea of illegal computer hacking and identity theft, but very few people are
familiar with the practice of pretexting. Social engineering attacks are the most time‐consuming to render, but
historically they have been among the most damaging. This course covers what pretexting is, why it is so effective,
and what you can do to protect yourself and your company from these types of social engineering attacks.
Social Media Security
Given the new rules of social media & other communication vehicles, it's easy to say or do the wrong thing. Missteps can have lasting consequences. They also present security risks for you or your company. This course sets out the rules, guidelines, and risks associated with social media. It suggests ways to use these technologies in a productive manner while ensuring the security of your personal and organizational information.