Available courses

|INTRO2ASTRO|-Introduction To Astrology and Interpreting Birth Charts

This course will expose the student to all of the basic and foundational key components of what an astrological natal chart consists of and how to interpret certain conditions in order to create a description or make futuristic predictions about a personality or events in a person's life.

Physical Security

The Physical Security module covers topics on: the danger of theft of a device, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.

Passwords

The Passwords module covers topics on: the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.

Mobile Devices

The Mobile Devices module covers topics on: how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.

Data Protection

The Data Protection module covers topics on: your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.

Ransomware

The Ransomware module covers topics on: what ransomware is and how it is delivered, ransomware's effect, minimizing the threat of ransomware, and reporting ransomware attacks.

Malware

The Malware module covers topics on: what malware is, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.

Cloud Computing

The Cloud Computing module will differentiate desktop from cloud computing; identify the advantages and disadvantages of cloud computing; and describe several best practices for using the cloud safely.

Social Networking

The Social Networking module covers topics on: how information posted online can be used against you, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.

Malicious Links

The Malicious Links module covers topics on: why links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.

Surfing the Web

The Surfing the Web module covers topics on: safe web surfing, secure websites, and how to identify and avoid malicious sites and links.

Business Email Compromise Scams

The Business Email Compromise (BEC) Scams module covers topics on: identifying BEC scams, differentiating between the three main types of BEC scams, and reporting a suspected attack.

Advanced Spear Phishing

The Advanced Spear Phishing module covers topics on: identifying three types of advanced spear phishing techniques,
identifying indicators of an advanced spear phishing email, and understanding what to do if you are the target.

Spear Phishing

The Spear Phishing module covers topics on: why spear phishing poses a threat to our organization, the three types of spear phishing emails, and the indicators of a spear phishing email.

Social Engineering

The Social Engineering module covers topics on: the difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.

Security Outside the Office

The Security Outside the Office module covers topics on: attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen.

Insider Threats

The Insider Threats module covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity.

Cybersecurity Awareness

The lesson was developed to raise awareness about how to avoid online threats that might target you or our organization. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimize the risk of an attack.

|GDPR QUIZ|-General Data Protection Regulation Assessment

General Data Protection Regulation (GDPR) is an overview of compliance regulations, your responsibilities under GDPR, and how to report a non-compliance issue.

|GDPR|-General Data Protection Regulation

General Data Protection Regulation (GDPR) is an overview of compliance regulations, your responsibilities under GDPR, and how to report a non-compliance issue.

|PCI-DSS|-Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards (PCI-DSS) answers “what is cardholder data,” the standard and regulations both an IT-professional and Non-IT professional must follow to protect the data and privacy of the cardholder, and how to report a data breech.

|PII|-Personally Identifiable Information (PII)

Personally Identifiable Information (PII) focuses on the laws and regulations that govern the protection of sensitive personal data, security measures that can be taken to protect the data, and the steps to take when reporting a data breech.

|HIPAA|-Health Insurance Portability and Accountability Act

Health Insurance Portability and Accountability Act (HIPAA) is an overview of the HIPAA, HITECH and Omnibus legislation and security measures that can be taken to protect the data, and the reporting procedure in case of a data breech.

|NBD|-Privacy Amendment Act 2017

Privacy Amendment (NDB) Act module is an overview of the 2017 Act that was instituted in February of 2018 in Australia. The module focuses on the definition of a data breach, and the notification process for eligible data breaches.

BBB VIRTUAL CLASSROOM FOR SNM ONSITE BIGBLUEBUTTON