<sub id="1p77b"></sub>
<sub id="1p77b"></sub>

<sub id="1p77b"></sub>

<address id="1p77b"><var id="1p77b"></var></address>

<sub id="1p77b"><dfn id="1p77b"></dfn></sub>
<address id="1p77b"></address>

        <address id="1p77b"></address>

        <sub id="1p77b"><var id="1p77b"></var></sub>


          KnowBe4’s game-changing partnerships with The Security Awareness Company, Popcorn Training, ThinkHR, exploqii, Canada Privacy Training, Twist & Shout, TeachPrivacy, Syntrio, and El Pescador allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

          To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

          We offer three Training Access Levels: I, II, and III depending on your subscription level. Because our library is constantly being updated, if you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library! 



          Kevin Mitnick Security Awareness Training

          Included in Training Access Level I (Silver)

          This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks. 

          This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

          This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 26 language versions.




          KnowBe4 Cybersecurity Awareness Posters

          Included in Training Access Level I (Silver)

          2019 Common Threats
          2019 Social Engineering Red Flags
          Captain Awareness
          Captain Awareness: Conquering Internet Safety for Kids
          Captain Awareness: Securing Your Mobile Devices
          Risks of Social Media Sharing
          All Your Data Are Belong To Us
          Bad Rabbit: Think Before You Click
          Be An Email Superhero
          Burning Man
          CEO Fraud
          Don't Let Your Strings Get Pulled
          Don’t Click on Me
          Email Subject Line Red Flags
          Give Us the Bitcoin
          It only takes one
          Jaws: Don’t Be a Victim
          Keep Calm and Don’t Click
          Loose Clicks Sink Ships
          Loose Lips Sink Ships
          Loose Tweets Sink Fleets
          Phishin’ Is Easy
          Poster: 2019 Your Role: Internet Security and You
          Poster: Captain Awareness: Triumph over the Reuse of Passwords
          Ransomware Apocalypse is Calling
          Ransomware Has No Borders
          Ransomware Invaders
          Resist the USB Attack
          Stop Phishing Attacks Dead in Their Tracks
          Stop, Look, Think
          Stop, Look, Think Signs
          The Clickers
          There's Something Phishy in Your Inbox
          Think Before You Click
          Think Before You Click Boy
          Think Before You Click Brain
          Think Before You Click Eye Chart
          Think Before You Click Monster
          Think Before You Click Pop-Up
          This is My Ransomware Killing Poster
          Tron Ransomware
          Uncle Sam: I Want You to Stop Clicking
          Why Security Awareness Training?
          You Can’t Go Back



          KnowBe4 Training Modules

          Also included in Training Access Level II (Gold & Platinum)

          This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

          This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

          In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

          In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

          In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

          In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

          This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

          This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

          In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

          This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

          This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

          This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

          This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

          Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

          In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

          This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

          In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.

          Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality, 9-minute course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

          KnowBe4 Training Micro-modules

          Also included in Training Access Level II (Gold & Platinum)

          CEO Fraud
          Decision-Maker Email Threats
          Mobile Device Security
          Ransomware and Bitcoin
          Remote and Travel WiFi Dangers
          Safe Web Browsing With Corporate Devices
          Secure Destruction of Sensitive Information
          Securely Working From Home
          Social Engineering the Executive
          Social Media Precautions for Executives

          Be a Human Firewall
          Conquer Internet Safety for Kids
          Securing Your Mobile Devices
          Triumph over the Reuse of Passwords
          Understanding GDPR
          Securely Working from Home
          Be Vigilant with USB Drives
          Outwit Dumpster Divers
          Travel Securely
          Handling Printouts
          Understanding Data Breaches
          Safeguard Social Media
          Protect Your Web Browser
          Guardians of Sensitive Information
          Vanquish Malicious Attachments
          Outwit Social Engineering
          Conquer Open WiFi
          Foil Phishing

          This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

          This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

          This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

          This 90 second video shows two of the worst things you can do with your password.

          This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

          This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

          This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

          The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

          This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

          This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

          This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

          This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

          This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

          This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.




          The Security Awareness Company Content Library

          Also included in Training Access Level III (Diamond)

          Active Shooter & Physical Incident Response
          Call Center & Help Desk Awareness
          Computer Security & Data Protection
          Cross Border Data Protection
          Data Classification
          Developing an Incident Response Plan
          Empowering Your Employees for Better Security
          Executive Awareness Leadership
          How to be a Human Firewall
          Identification & User Authentication
          Identity Theft and Data Breaches
          Insider Threats for Executives and Managers
          Malware
          Mobile Security Basics
          Non-technical Security Basics
          OWASP Top 10
          PCI DSS Retail Store Experience
          Password Basics
          Phishing Andrew's Inbox
          Phishing Awareness
          Phishing Fundamentals
          Privacy Basics
          Ransomware
          Secure Online Behavior
          Security Awareness Fundamentals
          Security Triads
          Social Engineering
          Social Engineering & Phishing for Executives
          Social Engineering Basics
          The Top 10 Security Awareness Fundamentals Test Out
          Top 10 Security Awareness Fundamentals for New Hires
          Understanding and Mitigating Security Risks for Executives
          Understanding and Protecting PII
          Workforce Safety & Security Awareness
          Workplace Violence and Safety
          FERC/NERC for End Users
          FERC/NERC for Managers and Executives
          FERPA (Education)
          FFIEC (Financial Compliance)
          GLBA (Finance)
          HIPAA (Healthcare)
          PCI-DSS (Retail Compliance)
          Sarbanes-Oxley (Accounting)
          13 Habits of Savvy SM Users
          5 Examples of Social Engineering
          5 Steps to Prevent ID Theft
          5 Steps to Prevent ID Theft
          5 Traits of a Security Aware Employee
          7 Tips for Travelers
          A Real Life Spear Phishing Attack
          Access Controls
          Advanced Persistent Threats
          April 2018 Security Awareness Newsletter
          Are Your Things Part of a Botnet?
          August 2018 Security Awareness Newsletter
          Availability
          Back to School Security Checklist
          Bad Passwords
          Bank Secrecy Act
          Being a Human Firewall in All Three Domains
          China's Cybersecurity Law
          Click With Care
          Confidentiality
          Cross Border Data Protection Overview
          DIY Home Internet Security Policy
          Data Breaches and You
          Data Classification at Home
          Data Classification at Work
          December 2017 Security Awareness Newsletter
          EU GDPR: The Basics
          February 2018 Security Awareness Newsletter
          Field Guide to Phishing Emails
          Following Policy and Reporting Incidents
          Forms of Social Engineering
          Hey! That???s my pie! Opps, I mean PII
          How VPNs Work
          How to Identify a Social Engineering Attack
          In Case of Emergency
          Incident Response in Action
          Incident Response in All Three Domains
          Integrity
          IoT Gone Rogue
          January 2018 Security Awareness Newsletter
          July 2018 Security Awareness Newsletter
          June 2018 Security Awareness Newsletter
          Keeping Kids Safe on Social Media + 10 Tips for Parents
          LinkedIn Scams & It’s a Spammer???s World
          Malware on the go!
          March 2018 Security Awareness Newsletter
          May 2018 Security Awareness Newsletter
          Mined Your Data
          Non-technical Security in ALL THREE DOMAINS
          November 2017 Security Awareness Newsletter
          October 2017 Security Awareness Newsletter
          PHI stands for Protected Health Information
          PII: To Prominent Constant of Information Security
          Passphrases: The Smart Alternative
          Phishing In Action
          Privacy vs. Security
          Proven Password Policies
          Ransomware Security One Sheet
          Redefining What it Means to be a Human Firewall
          Regulations Near and Far
          Respecting Privileged Access
          Securing Mobile Devices
          Securing Smart Devices
          Security Incidents and Where to Report Them
          September 2017 Security Awareness News
          Shipshape SM Behavior
          Simple Steps to Online Safety
          Smishing: Phishing Gone Mobile
          Spam Emails vs Phishing Emails
          The CIA Triad: Security to the Power of Three
          The Cloud Is Not Yours
          The Domains Triad: Mind, Body, and Soul
          The Future of Identification and Authentication
          The Horrors of Malware
          The Importance of Data Classification
          The Internet of Things and the Concerns of Convenience
          The Journey to Being Anonymous on the Internet
          The Many Lives Triad
          The Many Lives of PII
          The Physical Side of Security Awareness
          The Rule of Three
          The Three Domains of Social Engineering
          The Three Lives of Incident Response
          The Underground Marketplace and Common Cyber Attacks
          Tis the Season..... for Scams
          Top 10 Security Practices for Work
          Top 10 Ways to Stay Safe at Home
          Top 10 Ways to Stay Secure on the Go
          Understanding BEC
          Understanding Compliance Standards
          Understanding Insider Threats
          Understanding Insider Threats & Offboarding
          Understanding the Attackers
          Whale and Spear Phishing
          What is A Human Firewall?
          What is NIST Cybersecurity Framework?
          What is Privacy Shield?
          What’s the WiFi Password?
          Where Do You Hide Your Passwords?
          Where in the World is Ransomware
          Where's the Remote
          Who are Cybercriminals
          Why Does Compliance Matter
          You Need a PW Manager
          10 ways to avoid phishing scams
          10 ways to keep PII private
          10 ways to stay safe on social media
          A Day of Bad Passwords
          Backup
          Being a Human Firewall
          Beyond Phishing
          Catching malware
          Cyber Crime Starts with You
          Dangers of USBs
          Data Breach Overview
          Data Breaches and You
          Data Classification Overview
          Data Loss and Insiders
          Definition of Social Engineering
          Dumpster Diving
          Email Spoofing
          Executives Mitigating Insider Threats
          Hide your passwords
          Human Firewall and Data Classification
          Incident Response 101
          Introduction to Ransomware
          Introduction to the cloud
          Low-Tech Hacks to Steal Your ID
          Mouse Overs
          Non-Technical Security Skills
          Non-Technical and Physical security tips and tricks
          PII and Compliance
          Phishing Contest Winner
          Phishing From Facebook
          Phishing From Netflix
          Phishing From Your Bank
          Phishing in Action
          Physical Security Threats
          Pretexting: (Fake Fraud Protection)
          Pretexting: (Fake Help Desk)
          Pretexting: Fake Employee to Help Desk
          Pretexting: Fake Executive to I.T.
          Pretexting: From Fake Credit Card Company
          Pretexting: From Fake I.T.
          Privacy Vs. Security
          Protecting Data
          Road Warriors
          Safe Surfing 1: HTTP vs HTTPS & Online Authentication
          Security Myths Busted
          Social Media
          Social Media Data Mining
          Social Networking Do's and Don’ts
          The CIA Triad
          The Domains Triad
          The Human Firewall's Top Concerns in All Three Domains
          The Many Lives Triad
          The Many Lives of PII
          Understanding Encryption
          Welcome to Security Awareness Training
          Welcome to Security Awareness Training - Animated
          What Are APTs
          What Does a Social Engineer Look Like?
          What is I.D. Theft
          What is PII?
          Why Executives Need Awareness Training
          Why Security Awareness?
          Workplace Physical Awareness
          Your Security Awareness Journey
          End of the Day Security Challenge
          Human Firewall Big Business
          Human Firewall Trivia
          Human Firewall World Race
          Password Big Business Game
          Password World Race Game
          Phishing Awareness Big Business
          Phishing Awareness Trivia
          Phishing Awareness World Race
          Security Awareness World Race
          Security Awareness Big Business
          Security Awareness Card Stack
          Security Awareness Casino Challenge
          Security Awareness Trivia
          Social Engineering & Phishing Millionaire Challenge
          Social Engineering Big Business Game
          Social Engineering Trivia
          Social Engineering World Race Game
          Anatomy Of A Phishing Email
          Are You The Weakest Link?
          Back Up
          Bad Guys don't always wear Masks
          Be Alert
          Be a Human Firewall
          Be a Human Firewall- Always Follow Policy
          Break Up With Your Password
          Buckle Up
          Can you Spot a Social Engineer?
          Changed your Password?
          Confidential Documents
          Confused By our Security Policies?
          Confused about policy?
          Critical Assets In Your Hands
          Ctrl+Alt+Delete
          Cyber Security in the Workplace
          Data Protection Life Cycle
          Decorate Your Devices
          Definition: Click Happy
          Definition: Phish Face
          Did You Click A Phishing Link?
          Did You Forget To Backup?
          Did you follow Policy?
          Digital Signature
          Do You Know FERC/NERC?
          Do You Know Malware? (Spider)
          Do You Know Malware? (Warning)
          Do You Know Our Policies?
          Do You Know Your Security Responsibilities
          Do You Think Before You Click?
          Do You Think Before You Click? Ask!
          Do you Download Apps?
          Do you Trust the Delivery Man?
          Do you know what you are Downloading?
          Don't Leave Us In the Dark
          Don't Turn Off the Lights
          Don't Use your Dog's Name for a Password
          Don't be Fooled(IRS)
          Don't be Phishing Bait
          Don't get hooked on Phishing Scams
          Don’t Be Phishing Bait
          Don’t Be a Puppet
          Don’t Let Social Engineers In Your Head
          EU-US Privacy Shield
          Fishing Bait Click Bait
          Forget Passwords
          GDPR is Here
          GLBA Pretexting Protection
          GLBA Safeguards Rule
          Got A Problem?
          HIPAA Penalties
          HIPAA is More Than Just Compliance
          HIPAA isn't just for medical professionals
          Have You Been Social Engineered Lately?
          Health Care Requires Data Care
          How Do You Know If Your ID Has Been Stolen
          How Much Information Can Be Stolen From Your Laptop?
          Human Firewall Details
          I Know What I Am Downloading
          I know what you did last Friday
          IRS will never threaten with Law Enforcement
          Incident Response Is All About Time
          Incident Response LifeGuard
          InfoSec Is Your Responsibility
          InfoSec Is Your Responsibility World
          Information Security Is All Of Us
          Insider Threat Malicious or Unintentional
          Isn't Their Business (Sunset)
          Keep A Clean Desk!
          Keep Calm Ask if you don't know
          Keep Calm Change Your Password
          Keep Calm Delete Phishing Emails
          Keep Calm Follow Policy
          Keep Calm Report Security Issues
          Keep Calm Think Before You Click
          Keep Secrets Secret
          Keys to the Kingdom
          Kiss your Data Goodbye
          Laptop Security
          Leaks Make Us Weak - Caller
          Leaks Make Us Weak - Click
          Leaks Make Us Weak - Password
          Login Info Is Private
          Messy Desk? Clean Up Your Act!
          Mixed Up Password
          Mobile Phones - Personal Data
          My Password is Complex and Creative
          NIST Cybersecurity Framework
          Need Help with your Password?
          Never Share Passwords
          No Piggybacking Zone
          No Thru Traffic
          No information without Protection
          Not All Insider Threats Are Obvious
          PCI-DSS Cardholder Data
          PCI-DSS POS Security
          PW Smoothie
          Password Expiration
          Passwords Hard to Crack
          Perils of the Internet
          Protect Company Data (No personal data on company devices)
          Protected Health Information
          Protecting Data Across Borders
          Protecting PHI
          Ransomware - Just One Click
          Ransomware Encrypts Your Data
          Ransomware Is A Malicious Program
          Recognize and Protect PII
          Report Anything Unusual
          Report Strange Incidents
          Report Strange Things!
          Report it Immediately
          SHHH Keep Company Conversations Private
          Secure Network
          Secure Your Devices
          Security Doesn't End With Software
          Security Is Not a Vacuum
          Security Leader Lighthouse
          See Something Strange... Report It
          Shred
          Simple Steps to Staying Safe Online
          Social Engineering
          Social Engineering
          Social Engineers Target People
          Social Media
          Something Out of the Ordinary
          Stop Think Connect
          Stop and Shred
          Strong Passwords (Woman)
          Tax Season Checklist
          Tax Season got you Flustered?
          The Cloud is Someone Else's Computer
          The Universe is Expanding
          These Keys Lock Your Computer
          They Don't Wear Name Tags
          Tips To Avoid Ransomware
          Today's Predictions for Tomorrow's Internet
          Together We Are Human Firewalls
          Transferring Data Across Borders
          Treat Passwords Like Your Underpants
          Treat Your Password Like A Toothbrush Photographic
          Treat Your Password Like Underwear
          Treat Your Passwords Like Your Toothbrush - Silhouette
          Triad Classic
          Triad Many Lives
          Triad SNL Passwords
          Triad Security Domains
          USB
          Understanding Compliance
          Unfamiliar Persons
          Use Mobile Devices Safely
          Watch Out for Tailgaters
          Watch out for Shoulder Surfers
          What is PII?
          Whiteboard Security
          Wifi Hot Spot
          Work Phone lost or Stolen?
          Wrong Way



          Securable.io Videos

          Also included in Training Access Level III (Diamond)

          FISMA- Federal Information Security Management Act
          Intro to Phishing
          LinkedIn Security
          Monitoring Facebook Services
          Protect Your Kids Online
          Public WIFI Safety
          Ransomware Attacks
          Traveling Abroad
          Twitter Security
          USB Safety



          Popcorn Training

          Also included in Training Access Level III (Diamond)

          Something Phishy Series Videos & Quiz (Animated)
          Something Phishy Introduction
          Mobile Mayhem (mobile threats)
          Pass the Password (passwords, social engineering)
          Breaking the Barrier (physical, clean desk)
          Phishous Malicious (Internet use)
          Dicey Devicey (BYOD Security)
          Freaky Leaky (DLP)
          Cloudy with a chance of Phish (Cloud Apps)
          Social Media Fever (Social Network Security)


          Cyber Heroes Series Videos & Quiz (Live Action)
          Cyber Heroes Introduction
          Don't take the bait (spear phishing, social engineering, vishing)
          Mobile Mayhem (mobile threats)
          Pass the Password (pass word, social engineering)
          Internet Threats (Internet use)
          Dicey Devicey (BYOD Security)
          Freaky Leaky (DLP)
          Cloudy with a chance of Phish (Cloud Apps)
          Social Media Fever (Social Network Security)


          Security Moment Short Clip Videos & Quiz (Motion Graphic)
          The Big Phish
          Social Engineering
          Ransomware
          Spot the fake attachment
          Spot the fake link
          Privileged user access management (PAM)
          Hacking Emotions
          Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
          Secure Transactions and Secure Deployments
          Authentication and Authorization
          Data Security
          Injection Attacks and How to Avoid Them
          Introduction to Web Application Security
          Secure Session Management

          Compliance Series (Animated)
          PCI DSS for Merchants
          PCI DSS for Corporate Office
          PCI DSS for Retail Stores
          SupaPOPI (RSA)
          Consumer Protection Act (RSA)
          Treating Customer Fairly (RSA)
          Conflict of interest policy
          Business Continuity / Business Resilience


          Privacy Series Videos and Quiz (Live Action)
          Personal Information–Currency of the 21st Century
          Identity Theft–Protect your Personal Information
          Privacy Principles–Handling Personal Information at Work
          Protecting Personal Information–Security & Safeguards
          General Data Protection Regulation (GDPR)–User Rights

          Building Secure Software Series
          Ep 1 - Very Early and Often
          Ep 2 - Leverage Security Frameworks and Libraries
          Ep 3 - Secure Database Access

          Cyber Essentials Series
          Information Security 101

          Standups 4 Security Series: (Live Action)
          Cybercrime Promo
          A Goliath Hack
          Behind the Scam with Loyiso Madinga
          Open Secrets - A Password Exhibition
          Spear phishing - Catching the Big Phish
          Don't Trust Anybody - CEO Scam
          Social Media Oversharing
          The Dark Web Pop-up
          Cyber Heroes Series
          Cloudy with a Chance of Phish
          Dicey Devicey
          Don't Take the Bait
          Freaky Leaky
          Internet Threats
          Mobile Mayhem
          Pass the Password
          Social Media Fever

          Security Moments Series
          Hacking Emotions
          Privileged User Access Management
          Ransomware
          Social Engineering 101
          Spot the Bad Attachment
          Spot the Bad Link
          The Big Phish
          Something Phishy Series
          Breaking the Barrier
          Cloudy With A Chance of Phish
          Dicey Devicey
          Freaky Leaky
          Mobile Mayhem
          Pass The Password
          Phishious Malicious
          Social Media Fever
          Something Phishy

          Privacy Series
          GDPR
          Identity Theft
          Personal Information
          Privacy Principles
          Protecting Personal Information



          ThinkHR Training Modules

          Also included in Training Access Level III (Diamond)

          A Manager's Guide to Discipline and Documentation 
          A Manager's Guide to Diversity, Inclusion and Accommodation 
          Active Shooter 
          Bullying and Hazing on Campus 
          Bullying and Violence in the Workplace 
          Campus Security Obligations Under Federal Law 
          EEO and Lawful Hiring 
          FERPA for Higher Education 
          FMLA Leave and More: An Overview of Legally Protected Leave 
          HIPAA - Privacy Essentials 
          HIPAA - Privacy Rules for Business Associates 
          HIPAA - Security Rules for Business Associates 
          HIPAA for Non-Medical Employees Optimizing Your Work/Life Balance: Maintaining Your Life Balance
          Optimizing Your Work/Life Balance: Taking Control of Your Stress 
          Pandemic Flu Awareness 
          Preventing Harassment in the Global Workplace - Employee Edition 
          Preventing Harassment in the Global Workplace - Manager Edition 
          Promoting a Substance-Free Workplace 
          Rightful Employment Termination 
          Sexual Harassment Prevention for Employees 
          Title IX for Higher Education 
          Wage and Hour Awareness for Managers 
          Workplace Harassment Prevention for Employees, State of New York 
          Workplace Harassment Prevention for Managers, State of New York 
          Workplace Harassment Prevention for Employees (Title VII) 
          Workplace Harassment Prevention for Managers - Multi-State Edition, V3.0 Workplace Management: Employment Laws and Regulations



          exploqii Videos

          Also included in Training Access Level III (Diamond)

          Anti Trust 1 - Basic Regulations & Risks
          Basic Rules of Secure Communication
          Bluetooth & WiFi
          Business Partner Compliance
          CEO Fraud - Fake President
          Clean Desk Policy
          Cloud Services
          Code of Conduct
          Compliance Checklist
          Compliance Management System
          Conflict of Interest
          Corruption
          Crisis Management
          Data Protection
          Disinformation
          EU GDPR
          Export Control
          Fairness & Respect in the Workplace
          Gifts & Hospitality
          IT Security in the Workplace
          Identity Theft
          Industrial Espionage
          Information Classification
          Information Security @ Mobile Devices
          Information Security @ Remote Workplaces
          Information Security @ Social Media
          Insider Threat
          Internal Investigations
          Know-How Security
          Money Laundering
          Payment Fraud
          Phishing Attacks on Companies
          Phone Scam
          Price Rigging
          Proxy Servers & Data Privacy
          Ransomware Micro-module
          Secure Passwords
          Security-Oriented Personnel Selection
          Sexual Harassment
          Social Engineering Micro-module
          Social Media Guidelines
          Threat Management
          Travel Security
          USB Attacks
          Visitor Management
          4Whistleblower



          Canada Privacy Training Modules

          Also included in Training Access Level III (Diamond)

          Canadian Private Sector Privacy
           



          Twist & Shout Video Modules

          Also included in Training Access Level III (Diamond)

          Restricted Intelligence Series
          Season 1

          Episode 1:The Test (passwords and passes)
          Episode 2: Browsing (safe surfing)
          Episode 3: A Cry for Help (email hacking and phishing)
          Episode 4: The Journey (portable storage devices)
          Episode 5: The Leak (beware what you share
          Episode 6: The Lesson (mobile devices)

          Restricted Intelligence Privacy Edition
          Season 2

          Episode 1: Nothing To Do With Me (What Is PI?)
          Episode 2: Nobody Reads That Stuff (Privacy by Design)
          Episode 3: Once More Unto the Breach (Retention & Disposal)
          Episode 4: The Heart of the Matter (Purpose & Minimisation)
          Episode 5: Mr. Cellophane (Transparency)
          Episode 6: Partners (Third Party Partners)
          Bonus: GDPR Intro (GDPR is Coming
          The Inside Man
          Season 1

          Episode 1: The New Guy (Social Engineering)
          Episode 2: Social Hour (Social Media)
          Episode 3: On Our Side (Phishing Attacks)
          Episode 4: Surprise (Document Disposal)
          Episode 5: Takeaways (Clear Desktop Policy)
          Episode 6: Masquerade (Cloud Services)
          Episode 7: Buying Time (Passwords)
          Episode 8: Taken (Ransomware)
          Episode 9: Where The Wild Things Are (Travel)
          Episode 10: Keep Your Friends Close (App security and permissions)
          Episode 11: The Sound Of Trumpets (External Devices)
          Episode 12: Checkmate (Insider Threats)



          TeachPrivacy Training Modules

          Also included in Training Access Level III (Diamond)

          California Health Privacy
          Canadian Anti-Spam Legislation (CASL)
          Data Breach
          Data Disposal
          Data Retention
          Encryption
          FERPA (K-12)
          General Data Protection Regulation (GDPR)
          Global Privacy and Data Protection
          Secure Workspaces Game
          The Privacy Act for Federal Government Contractors



          Syntrio Training Modules

          Also included in Training Access Level III (Diamond)

          Avoiding Antitrust Violations
          Avoiding Conflicts of Interest
          Avoiding Insider Trading Risk
          Back Injury Prevention
          California Workplace Harassment Prevention for Employees
          California Workplace Harassment Prevention for Managers
          Connecticut Sexual Harassment for Managers
          Controlling Workplace Exposure to Bloodborne Pathogens
          Delaware Sexual Harassment for Employees
          Delaware Sexual Harassment for Managers
          Disability Discrimination and Accommodation
          Employee Privacy: Balancing a Manager's Right to Know
          ErgoNet: A Training Guide for Healthy Office Workers
          Ethics and Code of Conduct
          FCPA Anti-Corruption and Bribery
          Global Anti-Corruption
          Maine Sexual Harassment for Employees
          Maine Sexual Harassment for Managers
          New York Preventing Sexual Harassment for Employees
          New York Preventing Sexual Harassment for Managers
          Personal Protective Equipment: A General Awareness
          Preventing Unlawful Retaliation in the Workplace
          Slip, Trip, and Fall Prevention
          Understanding the Family and Medical Leave Act
          Valuing Diversity for Managers



          El Pescador Training Modules

          Also included in Training Access Level III (Diamond)

          Data Collection
          Data Collection Quiz
          C-Level Phishing
          Finance Sector Phishing
          Lei Geral de Prote??o de Dados
          Phishing: Why Should We Care
          Phishing, The Major Cause of Information Leakage
          Relationship Trust
          The Threat May Be Closer Than You Think

           

          KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

          It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 900+ interactive modules, videos, games, posters and newsletters.

          Get Started

          Get the latest about social engineering

          Subscribe to CyberheistNews

          人妻熟女a在线播放