Course
How to Protect Yourself Against Phishing Attacks (006-ArtRise)
Information Technology and Cybersecurity
How to Protect Yourself Against Phishing Attacks (006-ArtRise)
Introduction:
Phishing attacks are becoming increasingly common in today's digital age. These attacks can result in the loss of sensitive information, financial loss, and even identity theft. It is essential to understand what phishing attacks are...
Protecting Trade Secrets (12956EN)
Information Technology and Cybersecurity
Protecting Trade Secrets (12956EN)
Introduction:

As an employee, it is essential to understand the importance of protecting your company's trade secrets. Trade secrets are valuable assets that give your company a competitive edge in the market. Misappropriation of trade secrets can...
Protecting Your Identity (14579EN)
Information Technology and Cybersecurity
Protecting Your Identity (14579EN)
Introduction
Identity theft is a serious crime that affects millions of people worldwide. It can cause significant financial and emotional damage to victims, and it is becoming increasingly prevalent in today's digital age. In this course, we will...
Security Awareness (15536EN)
Information Technology and Cybersecurity
Security Awareness (15536EN)
Introduction:

Security is an essential aspect of any organization, and an effective security program is crucial for protecting work product, physical assets, intellectual assets, and personnel. This e-learning module aims to introduce key concepts...
Information Security (19377EN)
Information Technology and Cybersecurity
Information Security (19377EN)
Organizations are increasingly concerned about the security of electronic information. This course identifies the safeguards needed to ensure the confidentiality, integrity and security of the information that employees work with. Correctly...
IT Security: Phishing Awareness (41137EN)
Information Technology and Cybersecurity
IT Security: Phishing Awareness (41137EN)
Introduction:
Cybercrime is a growing threat to individuals and businesses alike. Cyberthieves use various tactics to steal personal information and money from their victims. One of the most common methods they use is phishing. In this course, we...
IT Security: E-Mail Security Awareness (41139EN)
Information Technology and Cybersecurity
IT Security: E-Mail Security Awareness (41139EN)
Introduction:
This course is aimed at all employees who use corporate e-mail. In today's digital age, cyber threats are becoming increasingly sophisticated, and it is essential to understand how to keep e-mail systems and communications secure.

...
IT Security: Safe Web Browsing (41140EN)
Information Technology and Cybersecurity
IT Security: Safe Web Browsing (41140EN)
Introduction:
In today's digital age, security and privacy are becoming increasingly important concerns for individuals and organizations alike. With the rise of cyber threats and data breaches, it is essential to understand how to protect...
IT Security: Working Off-Site (41152EN)
Information Technology and Cybersecurity
IT Security: Working Off-Site (41152EN)
Introduction:
In recent years, remote work has become increasingly popular, allowing employees to work from home or other locations outside of the traditional office environment. However, with this flexibility comes new IT security risks that must...
IT Security: Business E-mail Compromise (41163EN)
Information Technology and Cybersecurity
IT Security: Business E-mail Compromise (41163EN)
Introduction
Business E-mail Compromise (BEC) is a type of cybercrime that involves the compromise of a corporate e-mail account to deceive a company, its customers, partners, and employees into sending money or sensitive data to the...

Oh, no. Nothing was found.

Use a different term and try again.