Course Library

Full

Wizer Course Library

For your convenience, Wizer has compiled all our pre-set courses in one place.

wizer-course-library
Course Overview #BEC  #Smishing  #Impersonation Scams  #Email Thread Hijacking  #Supply Chain  #Wire Fraud
What Employees Will Learn Introduce common impersonation scams of leadership whether it's someone posing as the CEO or a team manager in order to commit wire fraud or steal data. Reiterate the importance of verifying sensitive requests, following company verification procedures, and staying alert for both new hires and experienced employees.
Course Overview #Executive Targeting #Spear Phishing #Wire Fraud #Security Culture
What Employees Will Learn Executives will understand the key elements of building a positive cybersecurity culture, the risks of neglecting employee training, and the importance of leadership buy-in. They'll also learn critical questions to avoid wire fraud, their susceptibility to spear phishing, and how to encourage a positive cybersecurity mindset while guarding against smishing and wire fraud scams.
Course Overview #Wire Fraud #Email Spoofing #Macros #Identity Verification #Email Thread Hijacking
What Employees Will Learn Real-life stories will illustrate common cyber threats, emphasizing the importance of vigilance and adherence to established processes, particularly in Purchasing and Finance departments. They will also learn about the risks of enabling macros and the necessary precautionary steps to protect against malware and phishing attacks effectively.
Course Overview

#Smart Devices #IoT #Industrial IoT #IIoT #ICS #OT Security #Infrastructure

What Employees Will Learn Learners will hear a real-life story illustrating the vulnerability of industrial control systems, emphasizing the importance of cybersecurity in safeguarding critical infrastructure. They'll also learn how ICS environments can be hacked and recognize signs of cyber threats unique to their environment.
Course Overview #PII #Mobile Security #Authorized Channels #Privacy
What Employees Will Learn Learners will be provided with examples of different bits of data that is considered PII as well as have an outline of the do's and don'ts when securing it, including dealing with this type of data on mobile devices.
Course Overview #Malicious Files #Security Risks #Installing Software #Strong Passwords
What Employees Will Learn Administrators will receive questions for evaluating software, ensuring due diligence and identification of potential security risks. They'll also learn technical best practices covering authentication, encryption, vulnerability scanning, and access control measures to secure software installations effectively.
Course Overview #Vendor Risk Management #Email Hijacking #Data Sharing #Cloud Access #Third-Party Apps #Zero-Trust
What Employees Will Learn Employees will deepen their understanding of advanced supply chain threats, such as email thread hijacking and backdoor risks from vendor vulnerabilities. They’ll master evaluating third-party apps and services, implementing stricter cloud access controls, and securely managing sensitive data with vendors. Emphasis is placed on fostering a zero-trust approach, even with trusted partners, and proactive collaboration with IT to secure critical workflows.
Course Overview #Wire Fraud  #Phishing  #Travel  #USB Security  #Device Security  #Lost Device  #Stolen Device  #App Security  #Executive
What Employees Will Learn Educate frequent travelers on common travel scams to stay on the lookout for as well as best practices for device security and data protection when working on-the-go.

Ready to Get Started?

Create an Account to Access These Courses & More!

Start 10 Days Free