Infrared Logo

SECURITY AWARENESS TRAINING COURSE

Fulfills Security Awareness Compliance Requirements For: HIPPA, ISO/IEC 27001 & 27002, FISMA, NERC CIP, and many more.

Information Security Training for Everyone

People all over the world are using business networks to collaborate, communicate, and access data. Businesses, eager to increase productivity, have embraced the growing integration of network communications. Now more than ever, employees are far less dependent on their central office space to complete their work. Although this may provide benefits for both employees and employers, network based collaboration spaces corporate data within a broader environment that is difficult to protect. Infrared Security’s General Security Awareness course takes the participant through an average work day, from entering the work place to answering emails at home, and describes in detail the wide array of security risks employees face on a daily basis.

Viewers of this security awareness course will learn how to detect and mitigate everyday security threats through relatable scenarios as well as real world examples. Viewers can then evaluate their knowledge through a series of quiz questions provided at the end of the course. Quiz scores can be tracked and used to assess your employees’ knowledge of the material. Participants of this security awareness course will gain an understanding of the major risks inherent to their daily work environment; but more importantly, gain the confidence needed to be less susceptible to common security threats.

Do You Have Developers?

Are they coding secure applications? KMI Learning and Infrared Security offer a suite of courses for software developers and their managers.
Scalable Security Awareness Training

Solid and Scalable Security Awareness Training

This course will provide participants with the tools necessary to recognize common workplace security risks including but not limited to network sniffing, social engineering, phishing, and data theft. In addition, the course will summarize several key security controls that can be used to mitigate some of the most prevalent attacks found in the modern workplace. Employees everywhere are using business networks to connect, collaborate, and access company data. Businesses, eager to increase productivity, have embraced the growing integration of network communications.

Employees are encouraged to take advantage of technology such as wireless devices and public hotspots. Now more than ever, employees are becoming less dependent on their central office space in order to complete their work. Meetings are done remotely, documents are signed electronically, and emails can be answered from pretty much anywhere. Although this may provide benefits to both employees and employers, network-based collaboration introduces corporate data into a vast environment that is diverse and difficult to protect.

Take a Closer Look

Infrared Security and KMI Learning Offer a 10 Part General Security Awareness Training Course Including:

ENTERING THE BUILDING:

Learn how to spot and mitigate a very common and overlooked attack known as Piggy-Backing.

ENTERING THE WORKSPACE:

Learn to understand and identify the dangers of network monitoring via rogue devices.

LOGGING INTO WORKSTATION:

Learn how to mitigate the possibility of a passerby attack with proper password handling and two-factor authentication systems.

INTERACTING WITH SOFTWARE:

Gain a greater understanding of the risks associated with utilizing vulnerable machines including, phishing attacks and unintentionally installing malware.

INTERACTING WITH WEBSITES:

Understand the risks associated with utilizing vulnerable websites not protected with TLS.

INTERACTING WITH SENSITIVE DATA:

Gain a greater understanding of the risks associated with handling private company data on shared servers.

INTERACTING WITH PEOPLE:

Learn how to spot and mitigate social engineering attacks in the workplace.

INTERACTING WITH FOREIGN NETWORKS:

Understand the risks associated with utilizing insecure networks while handling company data.

INTERACTING WITH FOREIGN DEVICES:

Gain a greater understanding of the risks associated with utilizing unknown devices such as mobile phones and thumb drives in the workplace.

WORKING REMOTELY:

Understand the risks associated with utilizing personal devices to handle company data outside of the workplace.