View all 53 of our Russian language content pieces available in SecurityIQ.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.
Introduction to Security Awareness
The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.
This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.
Working Remotely Assessment
Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.
Secure Connection (Data In Transit)
This micro-learning module highlights the importance of using secure connections when conquering a mountain or sending sensitive data over the Internet.
This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.
Is it Safe? (Mobile Security)
This short video reinforces the importance of using trusted publishers when installing mobile applications. It uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of insecure mobile applications.
Protecting Mobile Devices
This video covers the steps you can take to protect your device from prying eyes and theft. Topics include screen locks, encryption and frequent software and firmware updates.
This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.
Insider threats include security threats posed by employees, contractors or vendors. This module explains why malicious insiders are dangerous, and provides examples of common behaviors that can be indicators of insider threats. Suggestions for incident reporting are also included to help combat insider threats.
Safe Web Browsing Assessment
Social Engineering Brief
This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.
How Much Is Too Much? (Password Security)
In less than one minute, this video reinforces the importance of keeping passwords private.
Cross-Site Scripting (XXS)
Cross-site scripting (XXS) allows attackers to run scripts in a victim’s browser to bypass access controls. In this module, we explain three types of XSS attacks and suggest XXS prevention measures.
Security Awareness Baseline Knowledge Assessment II
Knowledge Is Power (Security Training)
Security training should be a part of your daily life.
Privacy and EU GDPR
In this module, we review the new European Union General Data Protection Regulation (EU GDPR).
Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.
Physical Security Brief
An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.
This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices.
Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.
Removable Media & PHI
This module details best practices healthcare professionals can follow to safeguard protected health information and avoid infection from removable media.
Cross-Site Request Forgery (CSRF)
In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.
Security Awareness Baseline Knowledge Assessment IV
PCI DSS Brief
This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data.
Safe Web Browsing Brief
This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.
An abbreviated version of our core malware training, this module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.
Password Security Assessment
Physical Security Assessment
Security Awareness Baseline Knowledge Assessment III
Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.
How Secure Is Public WiFi? (Public WiFi)
In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers.
Securing Home Networks and Devices
This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.
Phishing In Brief
An abbreviated version of our core phishing training, this module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.
Security Awareness Baseline Knowledge Assessment I
Broken Access Control
This module defines and explains broken access control, which allows attackers to access unauthorized functionality and/or data.
Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.
Removable Media Brief
This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.
Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.
Removable Media Assessment
Mobile Wi-Fi Security
Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.
Mobile Security Assessment
Social Engineering Assessment
Cloud services include any service available via the Internet through a third-party’s server. This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services.
This module explains the concept of encryption in common terms. It details the encryption process and types of assets that can be encrypted, and reinforces the importance of following encryption-related policies to protect sensitive information.
Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.
Privacy and PII Brief
This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).
Broken Authentication and Session Management
This module describes what incorrect implementation of authentication and session management functions are, and explains how it can allow attackers to assume other users’ identities.
Password Security Brief
This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.
Safe Web Browsing
Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.
One Wrong Move (Phishing)
This one-minute video uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of a phishing attack.