Attackers can hijack trusted websites you visit daily. This video teaches employees how to spot watering hole attacks, avoid malicious downloads, and report threats before they spread.
Scammers impersonating leadership can trick employees into urgent transactions. This course teaches them to verify suspicious requests through trusted methods and recognize why scammers exploit authority to manipulate trust.
3 videos | 3 quiz questions
Scammers exploit travel situations to take advantage of distracted or rushed individuals. Designed for professionals who travel frequently, this course equips them to verify suspicious notifications, avoid common traps, and protect their information while on the go.
4 videos | 3 quiz questions
Properly handling Controlled Unclassified Information (CUI) is essential for compliance and security. This course teaches employees how to identify, protect, and properly handle CUI, ensuring compliance with DoD regulations and safeguarding sensitive information.
6 Videos | 6 Quiz Questions