2018 Security Awareness Training for Enterprise Users
2018 Security Awareness Training for All Hands
This course is for regular computer users - no prior security knowledge required.
- Security terms like "phishing" are defined in easy-to-understand language.
- Scenarios and lessons-learned are from the learner's viewpoint.
- We focus on things that a worker can control, like recognizing improper requests for access.
Incorporates the newest intelligence about cyber-security:
- Real examples of security breaches in the last year
- 7 biggest user-preventable threats to enterprises, and how to recognize them
- When should you contact the security department for help?
- Passwords: Longer is better! 9 tips for keeping your accounts safe from hackers
- Information system access rules - inappropriate use of company resources
- How to move files without bringing viruses along for the ride
- Using two-factor authentication
- Protecting against physical threats like piggybacking and dumpster divers
- Guidelines for secure remote work and traveling
- Securing your mobile device
- Insider threats
- Crisis and opportunity - the psychology of an insider threat
- 3 most common insider threat scenarios
- Why it doesn't pay to be an insider
- How to respond when you see a potential threat
- Cloud security and data leaks
Enable your workforce to recognize and respond to the latest security threats. And do it in an engaging way with our fun and sticky content!
Are you working on FISMA compliance for your 2019 federal training program?
The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
If you're building a training program, you should demo our courses, ask for sample newsletters, or read through our more in-depth educational material. Please let us know what you are interested in - we love to share what we've been working on!
Native Intelligence has been providing security awareness courses and role-based training to the government and private sector for more than twenty years.
Our security awareness training courses are SCORM-compliant.
Sharable Content Object Reference Model (SCORM) is a set of technical standards for eLearning software products, such as online courses and Learning Management Systems (LMSs). SCORM tells programmers how to write their code so that it can be used with other eLearning software. SCORM ensures that online learning content and LMSs communicate with each other. SCORM also defines how content (courses) may be packaged into a transferable ZIP file.
Basically, SCORM compliance means that our courses will work on any popular LMS.
Incorporating NIST SP 800-50 and SP 800-16 best practices
The two publications are complementary – SP 800-50 works at a higher strategic level, discussing how to build an IT security awareness and training program, while SP 800-16 is at a lower tactical level, describing an approach to role-based IT security training.
Our courses cover topics and use techniques described in SP 800-50 and 800-16 so that you don't need to reinvent the wheel.
Our Federal Government courses are Section 508-compliant
Section 508 was made part of the Rehabilitation Act of 1973 in 1998. Its purpose is to require Federal agencies to make their electronic and information technology (EIT) accessible to people with disabilities.