Information Security Training to meet your challenge:

Annual & Monthly Training | Customizable | Desktop and Mobile Device compatible | Graded Quiz

Host on your Learning Management System or ours | SCORM & ISO 27001 compliant

10 Topic – 17 Minutes

Appropriate Use, Email and Messaging, Internet Security, Laptop Security, Mobile Devices, Passwords, Protecting Information, Reporting Incidents, Social Engineering, Social Media

11 Topic – 23 Minutes

Browsing, BYOD, Compromised PC, Data Destruction, Email and Messaging, Encryption, Physical Security, Protecting Information, Remote Computing, Social Engineering, Social Media

13 Topic – 25 Minutes New!

Appropriate Use, Data Leakage, Email and Messaging, Internet Security, Passwords, Phishing, Physical Security, Protecting Information, Ransomware, Remote Computing, Reporting Incidents, Social Engineering, Social Media
 

22 Topic – 35 Minutes

APT, Appropriate Use, Browsing, BYOD, Data Destruction, Leakage, Email, Encryption, Insider Threat, Passwords, Personal Computing, Physical Security, Personal Cloud, Protecting Information, Remote Computing, Reporting Incidents, Social Eng., Social Media, Phishing, Ransomware

Enterprise Information Security Awareness designed for employees and contractors with access to information systems

Customization Options
  • Branded with your logo and customizable narrative
  • Can be hosted on your Learning Management System (LMS)
  • Branded LMS hosting on our secure server available (annually) with student completion reporting and more…
  • Translations available
  • Certificates of completion available
Quiz Options

Completion behavior is as important as the course content, especially when reporting for an IT audit. Completing an online security awareness course should be simple, straightforward, and self-explanatory so students have no trouble understanding how to satisfy the training requirement.

  • Set your passing quiz score anywhere between 0% – 100%
  • Acknowledgment of responsibility statement (optional), which must be accepted for course completion. This may contain a complete policy statement or abridged summary.
Training Topics in Information Security Awareness for Enterprises
  • SOCIAL ENGINEERING
  • EMAIL AND MESSAGING
  • BROWSING
  • SOCIAL NETWORKING
  • BYOD
  • PASSWORDS
  • ENCRYPTION
  • PROTECTING INFORMATION
  • PII
  • PHI
  • PCI
  • DATA DESTRUCTION
  • WI-FI
  • APPROPRIATE USE
  • REMOTE COMPUTING
  • INSIDER THREAT
  • PHISHING
  • PHYSICAL SECURITY
  • PERSONAL COMPUTING
  • RANSOMWARE
  • RECOGNIZING A COMPROMISED COMPUTER
  • REPORTING INCIDENTS
  • ADVANCED PERSISTENT THREAT
  • CLOUD COMPUTING
  • DATA LEAKAGE