Glossary
Access Control (General Knowledge, End User)
- Learn why organizations must control access to their networks and systems
- Understand the processes involved in granting and monitoring access
Duration: 6 to 10 min
BEC (Cyber Game, Serious Game)
- Play as a cybersecurity investigator and examine different emails to identify all valid vendor payments and stop any potentially fraudulent payments due to Business Email Compromise
Duration: 5 to 10 min
Business Email Compromise (General Knowledge, End User)
- Understand what constitutes a business email compromise attack and how it is mounted
- Learn the common phishing-based scams used in such attacks
Duration: 6 to 10 min
Cloud Based Services (Cyber Game, Serious Game)
- Play as a legendary cybersecurity analyst with the responsibility of identifying the source of the data leaks and putting a stop to it, before any more damage can be done
Duration: 5 to 10 min
Cloud Services (Cyber Game, Cyber Challenge)
- Assess the risk level associated with various cloud computing practices to keep your and your organization’s information safe
Duration: 3 min
Cloud Services (General Knowledge, End User)
- Recognize the potential vulnerabilities related to storing, sharing, and accessing cloud-based documents or systems
- Learn how to use cloud services securely with cyber-safe collaboration techniques
Duration: 6 to 10 min
Confidentiality on the Web (General Knowledge, End User)
- Understand the risks of inadvertently disclosing sensitive information on the web
- Understand and recognize potential online threats
Duration: 6 to 10 min
Data Leakage (General Knowledge, End User)
- Understand what constitutes a data leak and how it affects an organization
- Learn common internal and external data leaks causes
Duration: 6 to 10 min
Data Transfer (Cyber Game, Serious Game)
- Play as an employee in the Business Operations department and finish your weekly to-do list by carefully managing your files and emails for a stress-free weekend, without risking being interrupted due to a major data breach
Duration: 5 to 10 min
Email (Cyber Game, Cyber Challenge)
- Describe and differentiate the email-based strategies fraudsters use to infiltrate organizational networks or access confidential information
Duration: 3 min
Email (General Knowledge, End User)
- Recognize common email threats and email misuse
- Learn what precautions to take with incoming and outgoing emails
Duration: 6 to 10 min
Identity Theft (General Knowledge, End User)
- Understand how identity theft affects victims and organizations
- Learn about common methods used to carry out identity theft
Duration: 6 to 10 min
Incident Identification for Reporting (Cyber Game, Cyber Challenge)
- Identify security incidents and report them to the appropriate instances in a timely manner to help protect your organization
Duration: 3 min
Incident Reporting (General Knowledge, End User)
- Understand the importance of detecting and handling security incidents promptly
- Learn how to identify and detect various types of security incidents
Duration: 6 to 10 min
Information Classification (Cyber Game, Cyber Challenge)
- Classify information based on its sensitivity levels so as to apply appropriate security measures
Duration: 3 min
Information Classification (General Knowledge, End User)
- Understand how and why organizations classify their information
- Practice classifying information according to levels of sensitivity
Duration: 6 to 10 min
Information Lifecycle (General Knowledge, End User)
- Understand the value of an organization’s information
- Learn how to manage information correctly throughout its lifecycle
Duration: 6 to 10 min
Intellectual Property (General Knowledge, End User)
- Learn what is considered intellectual property
- Understand behaviors and situations that may violate intellectual property rights
Duration: 6 to 10 min
Introduction to Information Security (General Knowledge, End User)
- Learn about information security and its overall importance
- Understand users’ responsibilities in protecting the organization’s information
Duration: 6 to 10 min
Malware (Cyber Game, Cyber Challenge)
- Examine and identify ways in which malicious programs can infiltrate your electronic devices
Duration: 3 min
Malware (General Knowledge, End User)
- Learn about the different types of malware
- Understand the human behaviors and technical factors involved in preventing malware infection
Duration: 6 to 10 min
Mobile Devices (Cyber Game, Cyber Challenge)
- Adopt best practices when using mobile devices in order to protect your company and personal information
Duration: 3 min
Mobile Devices (General Knowledge, End User)
- Understand the vulnerabilities related to mobile devices
- Learn about preserving the security and integrity of mobile devices
Duration: 6 to 10 min
Open Wi-Fi Risks (General Knowledge, End User)
- Understand the potential risks of connecting to an unsecured Wi-Fi network
- Learn best practices when it comes to sharing information of a network outside your home or office
Duration: 6 to 10 min
Passwords (General Knowledge, End User)
- Understand the importance of creating effective passwords
- Learn how to create a strong yet easy to remember password
Duration: 6 to 10 min
Phishing (Cyber Game, Cyber Challenge)
- Recognize and identify the features of a phishing message and website
Duration: 3 min
Phishing (General Knowledge, End User)
- Learn about common phishing tactics and how they threaten information security
- Recognize and identify the features of a phishing message and website
Duration: 6 to 10 min
Phishing Websites (General Knowledge, End User)
- Understand common tactics used by hackers to construct phishing websites
- Learn how to effectively safeguard your data from malicious sites
Duration: 6 to 10 min
Physical Security (General Knowledge, End User)
- Understand why organizations must secure all their facilities and equipment
- Learn how common work areas can be protected from threats
Duration: 6 to 10 min
Privacy (Cyber Game, Cyber Challenge)
- Identify personal information managed by your organization and handle it in compliance with security and privacy requirements
Duration: 3 min
Privacy (General Knowledge, End User)
- Learn about privacy and related rights and obligations
- Identify what is considered personal information
Duration: 6 to 10 min
Protecting Payment Card Data (General Knowledge, End User)
- Understand an organization’s obligation to protect payment card data
- Learn about the threats to payment card data
Duration: 6 to 10 min
Protecting Your Home Computer (General Knowledge, End User)
- Learn the common methods used by cyber criminals to gain access to your information
- Recognize home environment vulnerabilities and risky internet activities
Duration: 6 to 10 min
Protecting Your Home Office (Cyber Game, Cyber Challenge)
- Identify and eliminate information security vulnerabilities in your home office for safer remote work
Duration: 3 min
Ransomware (Cyber Game, Cyber Challenge)
- Understand the risks associated with ransomware attacks, and apply best practices to keep your organization’s information safe
Duration: 3 min
Ransomware (Cyber Game, Serious Game)
- Play as a cybersecurity investigator trainee and race against the clock to identify the source of a ransomware attack before an organization’s entire system is compromised
Duration: 5 to 10 min
Pagination
- Page 1
- Next page