Courses that make a difference
Every KnowCyber™ module is created to ensure that learners receive the best possible cybersecurity education, as fast as possible! Each module:
- Builds both knowledge and skills
- Engages learners through rich media and interactive features
- Includes an assessment that validates mastery, allows progress to be tracked, and indicates strengths and vulnerabilities
- Is augmented by our proprietary @ A Glance memory jogger, with key learning points and behavioral guidelines
- May be customized and branded for your organization
Security Awareness Now!™
Our core series of practical, high-impact online training modules
Phishing . . . malware . . . social engineering . . . social media attacks . . .
More and more, cyber attackers use such techniques to target users—people—rather than attack an organization’s networks and systems directly. Too often, they succeed.
But your people shouldn’t be your organization’s weakest link when it comes to cybersecurity. They can, in fact, be your greatest resource . . . if they are aware, knowledgeable, and motivated . . . when they are prepared to think and act effectively.
Security Awareness Now!™ provides the necessary baseline of cybersecurity competence for any 21st century enterprise’s first line of defense—its people.
Our recommended Infusion Plan™
For maximum effectiveness, we recommend deploying the Security Awareness Now!™ Series per our Infusion Plan™. As employees complete one module every 3 to 4 weeks, cybersecurity remains top of mind; employees stay alert to threats and mindful of their own behaviors.
Modules are shown here in recommended Infusion Plan sequence. This sequence may be modified to address your learners’ needs.
01. Security Awareness Essentials
Hack after recent hack has demonstrated that cybersecurity is not just an IT matter. Cybersecurity concerns touch the lives and activities of virtually every employee, every day. This module illustrates the wide reach of cybersecurity issues and introduces key topics covered in greater depth in succeeding modules.
As email connects employees with the outside world, it presents one of the biggest opportunities to gain unauthorized access to enterprise systems. This module explores email vulnerabilities, teaches email best practices, and prescribes what to do when email is hacked or compromised.
Phishing is aptly named because it uses bait to dupe unsuspecting victims into providing access to enterprise systems. In this module, employees learn how to spot phishing scams, avoid taking the bait, and deal with phishing emails they receive.
Passwords provide access. Poor password construction and hygiene account for more cybersecurity breaches than any other factor. This module explains what constitutes a strong password and explores effective password management.
05. Mobile Devices
Mobile devices—phones and tablets—are increasingly our preferred way to connect with the on-line world and, accordingly, increasingly a preferred target of hackers. This module alerts learners to specific vulnerabilities as it demonstrates how to combat them and how to know if a device has been compromised.
06. Threat Universe
The world of cybersecurity threat has become an entire universe. This module identifies and illustrates the different types and sources of cybersecurity threats, and explains how those threats can appear in the daily routine of employees in any organization.
07. Wireless Networks
Wireless networks afford unprecedented opportunity to maintain online presence and boost work productivity. They also invite unprecedented security vulnerability, as many public wireless networks lack even the most fundamental security measures. In this module, learners explore the potential threats and learn how to protect themselves and their organizations.
08. Social Engineering
Social engineering refers to efforts to turn the most basic elements of human nature against people so as to gain unauthorized access to data and systems. This module demonstrates how social engineers use human psychology to create relationships that become stepping stones to cybersecurity breaches. It then demonstrates top ways to resist social engineering exploits.
09. Malware and Spyware
Infecting devices with malicious software —malware or spyware—is one of the most common ways of collecting information or, worse, gaining deep, unauthorized access into enterprise systems and assets. In this module, learners master how to spot various forms of malware and spyware, what to do if they are encountered, and how to keep their devices safe.
10. Acceptable Use
Every enterprise has the authority, more importantly, the responsibility to define how its systems, devices, and data may be used by its employees. This module explains the key elements of an enterprise acceptable use policy, and what acceptable use means for employees on a daily basis.
11. Data Protection
Data is increasingly the lifeblood of any enterprise, and protecting data is one of the key responsibilities of every employee. This module explores the different types of enterprise data that are critical to protect, and illustrates key employee behaviors that contribute to effective data protection.
12. Insider Threat
Most cybersecurity attention goes to identifying and protecting against external threats. But the threats posed by an organization’s own employees—insiders—can be even more insidious. In this module, learners come to understand the sources and implications of insider threats, and how to recognize and respond to specific instances.
KnowCyber™ PCI DSS Training
Quick, just-in-time learning for front-line staff
Any business that accepts payment through credit cards must achieve and maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) administered by the PCI Security Standards Council.
Focused, regular training is a key part of PCI DSS compliance. Upon hire, and annually thereafter, staff members must receive training on the importance of cardholder data security, and how to ensure it.
Our modules bring PCI compliance to life. A rigorous instructional design framework employs a rich mix of diverse media elements that engages learners. Interactive features ensure learner involvement, and conceptual mastery is validated by a post-module assessment. And at the conclusion of each module, participants receive a proprietary KnowCyber @ A Glance module summary – a take-away that summarizes key module learning points and presents clear, concise behavioral guidance for improved cardholder data protection.
Concise, convenient 10-minute modules
- Quickly train front-line staff in exactly what they need to know to help your business protect cardholder data
- Cover all key topics in engaging, rich-media format
- Can be completed whenever and wherever convenient—on mobile phones, tablets, or computers
Compliance for Restaurant Employees
Restaurant staff are the front line in cardholder data protection; every day, they serve customers who pay by credit card. This module ensures that front-line staff in counter service and table service restaurants understand their critical role in protecting cardholder data. It prepares them to recognize all key indicators and warning signs of fraud and fraudulent behavior.
Compliance for Retail Employees
Retail staff are the front line in cardholder data protection, as every day they serve customers who pay by credit card. This module ensures that cashiers and other retail store staff understand their critical role in protecting cardholder data. It prepares them to recognize all key indicators and warnings signs of fraud and fraudulent behavior.
Compliance for Call Center Employees
Call center employees frequently handle cardholder data when processing customer transactions over the phone or internet. This module ensures that call center staff understand their critical role in protecting cardholder data. It alerts them to key issues and critical indicators of fraudulent behavior, and prepares them to discuss cardholder data protection questions with customers.