Building Amazing Organizations
Got Questions? 800‑258‑3837
Preview video
Preview Video
Product ID
tabccemp_vod
Training Time ?
16 to 26 minutes
Language(s)
English
Video Format
High Definition
Required Plugins
None
Number of Lessons
10
Quiz Questions
10
Question Feedback
Wrong Answer Remediation
Lesson Bookmarking
Downloadable Resources
Course screen Course screen Course screen
Overview

Most cyber breaches occur by way of naïve employees. This training focuses on how to prevent hacking and data breaches.

One easy way hackers get through security systems is through passwords, which is why we must create strong passwords and change them regularly. This course explains how hackers get information so employees can become more skilled at protecting their information. Phishing is another popular way hackers can get information. Opening bad files, links, or emails can sometimes give them access to your whole network. Social engineering has helped hackers make it easier to trick people into opening a corrupt file. There are clues, shown in the training, to help employees recognize red flags when receiving emails.

Giving information on a website can also pose a risk, so being careful is important. Understanding the risks and safety requirements on different websites can make a difference in protecting data. Other ways security can be affected are through the lack of security updates at companies, wireless connections and the use of USB drives. This course explains the best practices employees should follow to avoid being the weak link in an organization’s network.

Video on Demand   This course is in the Video On Demand format, to read about Video On Demand features click here.

  • Install on any SCORM LMS
  • Full-screen video presentation
  • Print certificate and wallet card
  • You have 30 days to complete the course
Audience

All employees

Topics
The course presents the following topical areas:
  • Overview
  • Passwords
  • E-Mail
  • Security Updates
  • Public Network Connections
  • Home Network Connections
  • USB Drives
  • Websites
  • Other Security Risks
  • Conclusion

© Mastery Technologies, Inc.