Search Results
IT Security: Work Off-Site (Individual)
This course examines the IT security risks associated with remote work. Learn to keep your computer, devices and home network secure, use public networks safely, and recognize phishing and targeted...
Physical Information Security (Individual)
Successful security programs combine general security and loss prevention techniques that are designed for daily operations with targeted techniques that are designed to prevent losses from...
IT Security: Credential Stuffing (Individual)
This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...