Indonesian

View all 35 of our Indonesian language content pieces available in SecurityIQ.

Do you know your organization's phish rate?

Launch a free Phishing Risk Test to see who takes the bait.

Safe Web Browsing Assessment

Safe Web Browsing Assessment

View More
Security Awareness Baseline Knowledge Assessment III

Security Awareness Baseline Knowledge Assessment III

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices.

View More
Password Security Assessment

Password Security Assessment

View More
Malware

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Social Engineering Brief

Social Engineering Brief

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.

View More
Mobile Security Assessment

Mobile Security Assessment

View More
Working Remotely Assessment

Working Remotely Assessment

View More
Working Remotely

Working Remotely

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
How Much Is Too Much? (Password Security)

How Much Is Too Much? (Password Security)

In less than one minute, this video reinforces the importance of keeping passwords private.

View More
Phishing

Phishing

Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Conclusion

Conclusion

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Malware Brief

Malware Brief

An abbreviated version of our core malware training, this module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.

View More
Phishing In Brief

Phishing In Brief

An abbreviated version of our core phishing training, this module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.

View More
Securing Home Networks and Devices

Securing Home Networks and Devices

This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.

View More
Password Security

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Privacy and PII Brief

Privacy and PII Brief

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).

View More
Physical Security Assessment

Physical Security Assessment

View More
Safe Web Browsing Brief

Safe Web Browsing Brief

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.

View More
Introduction to Security Awareness

Introduction to Security Awareness

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Physical Security Brief

Physical Security Brief

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.

View More
Physical Security

Physical Security

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
Security Awareness Baseline Knowledge Assessment IV

Security Awareness Baseline Knowledge Assessment IV

View More
Protecting Mobile Devices

Protecting Mobile Devices

This video covers the steps you can take to protect your device from prying eyes and theft. Topics include screen locks, encryption and frequent software and firmware updates.

View More
Safe Web Browsing

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.

View More
Mobile Wi-Fi Security

Mobile Wi-Fi Security

Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.

View More
PCI DSS Brief

PCI DSS Brief

This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data.

View More
Removable Media Assessment

Removable Media Assessment

View More
Social Engineering Assessment

Social Engineering Assessment

View More
Security Awareness Baseline Knowledge Assessment II

Security Awareness Baseline Knowledge Assessment II

View More
Removable Media

Removable Media

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Malware Assessment

Malware Assessment

View More
Social Engineering

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Phishing Assessment

Phishing Assessment

View More
Security Awareness Baseline Knowledge Assessment I

Security Awareness Baseline Knowledge Assessment I

View More