Course Library

Full

Wizer Course Library

For your convenience, Wizer has compiled all the instructional videos in one place.

wizer-course-library
Course Overview #MFA #SIM Swapping #Logins #Account Takeover #Verification Codes #Email Thread Hijacking #Password Reset
What Employees Will Learn Employees will learn the risks of relying on social logins, best practices for security questions, and minimizing personal information online. They'll also be alerted to social engineering scams, SIM swapping, and the importance of using authenticator apps or USB security keys for MFA instead of text-based messaging.
Course Overview

#Callback scams #Dynamic Phishing URLs #Safe Copy/Paste #Verification #QR Code Scams #Fake Search Results #Fake websites

What Employees Will Learn Learners will recognize malicious QR codes, avoid sharing verification codes, and understand text scams using authoritative personas. Real-life stories will highlight chain attacks, account takeovers, and hacked emails used for wire fraud.<
Course Overview #Safe Use #Deepfake #Impersonation #Fake Tools #AI #Lookalike apps #ChatGPT #Voice Cloning #Best Practices for AI
What Employees Will Learn Learners will understand the risks of deep fake job scams, the importance of verifying job opportunities, and protecting personal information. They’ll also learn about malicious apps and browser extensions, the dangers of unauthorized AI tools, and voice cloning scams, emphasizing best practices and consulting IT before using any AI tools for work.
Course Overview Equip employees with essential cybersecurity skills to protect against cyber threats and safeguard sensitive information.
What Employees Will Learn Employees will recognize and verify phishing texts (smishing) and understand the importance of avoiding sharing personal info via text. They'll learn to prevent ransomware through identifying phishing, updating software, cautious handling of requests, and strong password use.
Course Overview #Securing Apps #Strong Passwords #MFA Bombing #Spear Phishing #Identity Verification #Incident Response #HR Scams #Mobile Security
What Employees Will Learn Employees will understand MFA prompt bombing, verify IT requests by phone, treat internal communications with caution, and use strong passphrases. They’ll also learn to avoid oversharing on social media, recognize deepfake threats, report suspicious behavior early, and identify phishing links and lookalike apps.
Course Overview

#Deepfake #Voice Cloning #QR Codes #Email Hijacking #AI #Storing Passwords #Social Engineering #App Security #Mobile Security #Sim Switching #Wire Fraud

What Employees Will Learn Employees will learn to recognize risks in email conversations, avoid storing passwords in clear text, and report unusual activity. They'll also understand the dangers of QR code scams, AI-driven impersonation, risky digital behaviors, and the importance of consulting IT before using work-related apps.
Course Overview #Social Engineering #Zero Trust #Phishing #Ransomware #Browser Exploits #Supply Chain #Data Protection #Security Culture #Mobile Security #Malware #QR Codes #Smishing #Spear Phishing #Reporting
What Employees Will Learn Employees will deepen their understanding of the importance of a strong security culture while broadening their awareness on topics recommended by NIST, such as phishing, quick reporting, data protection, privacy, and social engineering, while addressing advanced challenges like supply chain risks and ransomware. Employees will learn to defend against sophisticated phishing and smishing techniques, impersonation scams, and apply zero trust principles when working with third parties.
Course Overview

#Privacy #PII

What Employees Will Learn Employees will learn best practices for collecting, storing, and sharing information to comply with California's consumer data regulations, including what constitutes selling data and required opt-out features. They’ll also receive an overview of the CCPA, covering its scope, residents' rights, data handling, third-party integrations, and the importance of data encryption.
Course Overview #Scams #Spoofing #Security Questions
What Employees Will Learn Employees will grasp the basics of securing their smart devices at home, emphasizing practices like changing default WiFi settings and enabling two-factor authentication. They'll also receive guidance on maintaining security while working remotely, identifying and mitigating risks associated with remote work, and implementing best practices for keeping work tech secure.
Course Overview #BEC  #Smishing  #Impersonation Scams  #Email Thread Hijacking  #Supply Chain  #Wire Fraud
What Employees Will Learn Introduce common impersonation scams of leadership whether it's someone posing as the CEO or a team manager in order to commit wire fraud or steal data. Reiterate the importance of verifying sensitive requests, following company verification procedures, and staying alert for both new hires and experienced employees.
Course Overview #CUI #Compliance #DataProtection
What Employees Will Learn Introduce employees to Controlled Unclassified Information (CUI), explaining what it is, how to identify and mark it, and key guidelines for proper handling.
Course Overview #Deepfakes #Voice Cloning
What Employees Will Learn Help learners spot deepfakes by asking the right questions, not just trusting familiar voices or images. Teach them how to use safety words and other tips to protect against deepfakes and voice cloning.
Course Overview #Equity #US Equality Act #Workplace Behavior #Mediating Conflict #DEI
What Employees Will Learn Employees will understand the definitions of diversity, equity, and inclusion and learn about the seven protected classes under the US Equality Act. They'll also receive guidance on navigating workplace conflicts and promoting expected behavior, empowering them to contribute to a culture of DEI where all individuals feel respected and valued.
Course Overview #Codes of Conduct #Workplace Behavior #Mediating Conflict
What Employees Will Learn Employees will learn the distinction between unethical and illegal behavior, receive examples of unethical workplace conduct, and learn about workplace ethics and behavior expectations. They'll also be equipped with a guideline for assessing ethical dilemmas, seeking guidance, and making decisions based on ethical principles, fostering a culture of integrity and accountability.
Course Overview #Executive Targeting #Spear Phishing #Wire Fraud #Security Culture
What Employees Will Learn Executives will understand the key elements of building a positive cybersecurity culture, the risks of neglecting employee training, and the importance of leadership buy-in. They'll also learn critical questions to avoid wire fraud, their susceptibility to spear phishing, and how to encourage a positive cybersecurity mindset while guarding against smishing and wire fraud scams.
Course Overview #Wire Fraud #Email Spoofing #Macros #Identity Verification #Email Thread Hijacking
What Employees Will Learn Real-life stories will illustrate common cyber threats, emphasizing the importance of vigilance and adherence to established processes, particularly in Purchasing and Finance departments. They will also learn about the risks of enabling macros and the necessary precautionary steps to protect against malware and phishing attacks effectively.
Course Overview #Privacy #PII
What Employees Will Learn Employees will understand GDPR's six main principles and key definitions, learn best practices for handling personal data, and gain insights into user consent and data transparency. The training will also provide an overview of GDPR's scope and expectations, empowering employees to ensure compliance and uphold ethical data practices.
Course Overview Compliance, GLBA, Data Protection
What Employees Will Learn Learners will learn the basics of GLBA, what information is covered, and what rules to follow to secure the data.
Course Overview Data Privacy, Data Protection
What Employees Will Learn Introduce employees to the GLBA requirements for handling customer private data, what data is considered NPI, and expectations for maintaining safety of customer data.
Course Overview

#Privacy #PII

What Employees Will Learn Employees will review physical and digital best practices for safeguarding PHI, understand the importance of privacy and confidentiality, and gain a clear understanding of their responsibilities under HIPAA. They'll receive in-depth training on HIPAA's Privacy and Security Rules, including practical examples, to ensure compliance and protect patient health information.
Course Overview #Security Questions #Scams #MFA #Shopping Scams #Account Safety #2FA #Verification Codes #Online Shopping
What Employees Will Learn Viewers will receive guidance on identifying suspicious flags when shopping online, recognizing potential fraud, and preventing fraudulent transactions. They'll learn to scrutinize websites for authenticity, verify payment gateways, and validate seller credentials to reduce the risk of online scams.
Course Overview

#Smart Devices #IoT #Industrial IoT #IIoT #ICS #OT Security #Infrastructure

What Employees Will Learn Learners will hear a real-life story illustrating the vulnerability of industrial control systems, emphasizing the importance of cybersecurity in safeguarding critical infrastructure. They'll also learn how ICS environments can be hacked and recognize signs of cyber threats unique to their environment.
Course Overview #Trade Secrets #Privilege Misuse #Fraud #Report It #Insider Threat #Espionage
What Employees Will Learn Employees will understand the potential impact of insider threats on the organization, recognize suspicious behavior, and receive guidelines for reporting suspected threats effectively. They'll also learn about different threat types, tactics used by cybercriminals, and the importance of limiting personal social media exposure to prevent insider recruitment.
Course Overview

#Counterfeit Software #Email Forwarding #USB Devices #Browser Extensions

What Employees Will Learn Learners will hear real-life stories illustrating the caution needed when downloading apps and browser add-ons. They'll also review risks associated with fake software and unknown USBs and how to protect their device when they are not physically present.
Course Overview #Enable MFA #Strong Passwords #Authenticator Apps #Sim Swapping #Verification Codes
What Employees Will Learn Learners will grasp the significance of MFA in enhancing account security, understand how it works, and learn to enable it in settings. They'll be educated on the dangers of SIM swapping scams, the superiority of authenticator apps or USB security keys over text-based messaging for MFA, and the importance of never sharing verification codes
Course Overview #Phishing #Scams #Oversharing #Report It #New Job Scams #Hiring Scams #Intern #New Hires
What Employees Will Learn New hires will grasp the importance of company policies for workplace safety and security, fostering a culture of compliance and accountability. They'll receive best practices for their initial weeks, including avoiding sharing work badges on social media and being aware of executive impersonation scams.
Course Overview #PCI #PCI DSS
What Employees Will Learn Learners will receive an overview of guarding credit card information, including proper device use and safe data storage. They'll understand the importance of PCI standards and learn best practices for securing payment processing systems physically and digitally.
Course Overview Data Privacy, Data Protection
What Employees Will Learn Employees will learn the basics of understanding what constitutes PII, SPII, and best practices for securing the data.
Course Overview POPIA, Data Protection, Data Privacy
What Employees Will Learn Employees will be introduced to what POPIA is, how data is collected, retention requirements, how data may be used, and handled as well as the importance of securing it. 
Course Overview #Data Protection #Data Privacy #PII #SPII #Screen Sharing #Supply Chain #Vendor Risk #Role Permissions #Video Sharing #Video Calls #Compliance #Zoom #Privacy #Cloud Sharing #Google Drive #OneDrive #AI #Browser Extensions
What Employees Will Learn Employees will gain a comprehensive understanding of the risks associated with unintentional data leaks through real-world scenarios, including accidental screen sharing, collaboration with trusted vendors, potential pitfalls of using AI tools, and other situations that could jeopardize privacy and compliance.
Course Overview #PII #Mobile Security #Authorized Channels #Privacy
What Employees Will Learn Learners will be provided with examples of different bits of data that is considered PII as well as have an outline of the do's and don'ts when securing it, including dealing with this type of data on mobile devices.
Course Overview #Ransomware #Blackmail #Phishing
What Employees Will Learn Learners will hear real-life stories illustrating the risks of mixing personal and work accounts, emphasizing potential repercussions and proactive prevention measures. They'll understand the importance of identifying phishing attacks, updating software regularly, being cautious with change requests, and practicing good password hygiene to mitigate the risk of ransomware attacks.
Course Overview #Malicious Files #Security Risks #Installing Software #Strong Passwords
What Employees Will Learn Administrators will receive questions for evaluating software, ensuring due diligence and identification of potential security risks. They'll also learn technical best practices covering authentication, encryption, vulnerability scanning, and access control measures to secure software installations effectively.
Course Overview

#What is Harrassment #What to Do #How to Report It

What Employees Will Learn Employees will receive clear definitions of sexual harassment, including verbal, non-verbal, and physical conduct, along with examples and where it can occur. They'll understand the importance of reporting incidents, including whom to report to, company procedures, confidentiality measures, and protections against retaliation.
Course Overview #MFA #Fake Logins #Text scams #Text-based phishing #Smishing #Whatsapp #CXO #CEO
What Employees Will Learn Learners will explore a real-life story of a chain attack from sharing verification codes and gain insights into text scams using authoritative personas. They’ll also learn the basics of smishing, common tactics used by cybercriminals, and best practices to minimize risks, effectively identifying and thwarting smishing attempts.
Course Overview #Fake Ads #Safe Apps #Piracy #Social Media #Facebook #Instagram #Pirated Movies #Pirated Games #LinkedIn
What Employees Will Learn Employees will grasp the basics of securing their smart devices at home, emphasizing practices like changing default WiFi settings and enabling two-factor authentication. They'll also receive guidance on maintaining security while working remotely, identifying and mitigating risks associated with remote work, and implementing best practices for keeping work tech secure.
Course Overview #Vendor Risk Management #Email Hijacking #Data Sharing #Cloud Access #Third-Party Apps #Zero-Trust
What Employees Will Learn Employees will deepen their understanding of advanced supply chain threats, such as email thread hijacking and backdoor risks from vendor vulnerabilities. They’ll master evaluating third-party apps and services, implementing stricter cloud access controls, and securely managing sensitive data with vendors. Emphasis is placed on fostering a zero-trust approach, even with trusted partners, and proactive collaboration with IT to secure critical workflows.
Course Overview #Wire Fraud  #Phishing  #Travel  #USB Security  #Device Security  #Lost Device  #Stolen Device  #App Security  #Executive
What Employees Will Learn Educate frequent travelers on common travel scams to stay on the lookout for as well as best practices for device security and data protection when working on-the-go.
Course Overview #Public Wi-Fi #Identity Verification #Strong Passwords #MFA #WFH #Remote Work #Smart devices #IoT #IoT Security
What Employees Will Learn Employees will grasp the basics of securing their smart devices at home, emphasizing practices like changing default WiFi settings and enabling two-factor authentication. They'll also receive guidance on maintaining security while working remotely, identifying and mitigating risks associated with remote work, and implementing best practices for keeping work tech secure.

Ready to Get Started?

Create an Account to Access These Courses & More!

Start 10 Days Free