Cyber Security Training

Cyber Security Basics

Security breaches occur every day and all organizations, large and small, are at risk. This course provides an overview of key cyber and information security concepts. It discusses measures that can be taken by all employees to help protect and defend computer systems and sensitive information from attack, damage, or unauthorized access in a digitally connected world. 

Our online course, Cyber Security Basics, will familiarize all employees with key cyber security concepts and discuss measures that can be taken to help defend computers and data from attack, damage, or unauthorized access.

Course Details:

Audience: All employees
Length: 30 minutes

Topics Covered:

  • Recognizing the various cyber threats
  • Protecting your organizations information
  • Controlling physical access
  • Securely disposing of equipment
  • Recognizing who could be a threat
  • Best practices when using mobile devices

  • VIEW A DEMO

Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data. Implementing GLBA training and data privacy training for employees on these legal responsibilities and on company expectations regarding the privacy and security of customer information is essential for compliance and for maintaining customer trust.

GLBA: Data Privacy Laws and Practices provides GLBA training and data privacy training with an overview of the Gramm-Leach-Bliley Act (GLBA) and other privacy regulations relevant to financial institutions, including insurance companies.

Course Details:

Audience: Insurance company employees who handle customer data
Length: 30 minutes

Topics Covered:

  • Federal/state privacy laws pertaining to financial institutions
  • Public and non-public personal financial information
  • Key privacy terms and concepts
  • Best practices with regard to consumer concerns.

grammpage

Privacy and Data Protection Essentials

In this course, you’ll learn the importance of privacy in the workplace, including the three common categories of protected information. You will also learn the five-step process for handling private information and variations in privacy laws in the United States and abroad.

Course Details:

Audience: All employees
Length: 35 minutes
Code: GLS-5358

GLS-5358_PrivacyDataPro

Introduction into PCI DSS

This comprehensive course covers the latest information on PCI DSS version 3.1 so that learners have instant access to important standards and regulations. It contains not only the basics of PCI DSS – such as its purpose, evolution, and benefits – but also advanced content such as compliance requirements, consequences of non-compliance, responsibilities of each department, and best practices for employees to ensure compliance.

Course Details:

Audience: All employees
Length: 15 minutes
Course: GLS-5610

GLS-5610_PCI DSS

Securing Information in the Cloud

This course outlines the steps to securing information on the cloud. Learn to identify the risks to data security and safer use of the cloud. Recognize that privacy is now assured and you are vulnerable to data theft. Learn to avoid these risk on the cloud by setting up appropriate access, encrypting sensitive files, sharing files properly, backing up files and using strong and long passwords.

Course Details:

Audience: All employees
Length: 10 minutes
Code: GLS-4347

unnamed

mobilecompatible  accessibility

Mobile and Accessibility friendly

 

COURSE FEATURES

Rich with scenarios, case studies, and interactive exercises

Optional audio (narration)

Built-in delivery and tracking using Syntrio's learning management system (LMS), or launch our courses from any standards-conforming, third-party LMS

Mastery quiz with scoring options test learner understanding of the material discussed

Mentoring feature allows students to direct questions at any time via e-mail to a subject matter expert within the organization

Options to customize course content and design including logo, policies, procedures and executive introduction