Bulgarian

View all 38 of our Bulgarian language content pieces available in SecurityIQ.

Infosec Named a Leader in 2019 Gartner Magic Quadrant

Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.

Introduction to Security Awareness

Introduction to Security Awareness

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Mobile Security Assessment

Mobile Security Assessment

View More
Working Remotely

Working Remotely

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
Spearphishing

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

View More
Safe Web Browsing

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.

View More
Social Engineering Assessment

Social Engineering Assessment

View More
Security Awareness Baseline Knowledge Assessment II

Security Awareness Baseline Knowledge Assessment II

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices.

View More
Removable Media Assessment

Removable Media Assessment

View More
Password Security

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Password Security Assessment

Password Security Assessment

View More
Malware

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Under-protected APIs

Under-protected APIs

This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.

View More
Physical Security

Physical Security

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
Privacy and EU GDPR

Privacy and EU GDPR

In this module, we review the new European Union General Data Protection Regulation (EU GDPR).

View More
Phishing

Phishing

Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Conclusion

Conclusion

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Safe Web Browsing Assessment

Safe Web Browsing Assessment

View More
Cross-Site Scripting (XXS)

Cross-Site Scripting (XXS)

Cross-site scripting (XXS) allows attackers to run scripts in a victim’s browser to bypass access controls. In this module, we explain three types of XSS attacks and suggest XXS prevention measures.

View More
Broken Access Control

Broken Access Control

This module defines and explains broken access control, which allows attackers to access unauthorized functionality and/or data.

View More
Security Awareness Baseline Knowledge Assessment III

Security Awareness Baseline Knowledge Assessment III

View More
Working Remotely Assessment

Working Remotely Assessment

View More
Insider Threats

Insider Threats

Insider threats include security threats posed by employees, contractors or vendors. This module explains why malicious insiders are dangerous, and provides examples of common behaviors that can be indicators of insider threats. Suggestions for incident reporting are also included to help combat insider threats.

View More
Security Awareness Baseline Knowledge Assessment I

Security Awareness Baseline Knowledge Assessment I

View More
Password Security Brief

Password Security Brief

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.

View More
Cloud Services

Cloud Services

Cloud services include any service available via the Internet through a third-party’s server. This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services.

View More
Removable Media

Removable Media

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Phishing Assessment

Phishing Assessment

View More
Physical Security Assessment

Physical Security Assessment

View More
Broken Authentication and Session Management

Broken Authentication and Session Management

This module describes what incorrect implementation of authentication and session management functions are, and explains how it can allow attackers to assume other users’ identities.

View More
Injection

Injection

Injection is one of the most common, and harmful, security risks to web applications. This module details different types of injection and suggests effective mitigation strategies for the workplace.

View More
Encryption

Encryption

This module explains the concept of encryption in common terms. It details the encryption process and types of assets that can be encrypted, and reinforces the importance of following encryption-related policies to protect sensitive information.

View More
PCI DSS Brief

PCI DSS Brief

This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data.

View More
Social Engineering

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Security Awareness Baseline Knowledge Assessment IV

Security Awareness Baseline Knowledge Assessment IV

View More
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.

View More
Removable Media & PHI

Removable Media & PHI

This module details best practices healthcare professionals can follow to safeguard protected health information and avoid infection from removable media.

View More
Malware Assessment

Malware Assessment

View More