How do I choose the most appropriate training?

We have handpicked a number of videos, interactions, quizzes and other additional elements that can help when deciding which training content to use in an eLearning Fusion course.

Phishing

Title

Type

Duration

Customer Intro

Video

0:40

What is Phishing?

Video with Knowledge Check

2:40

Types of Phishing

Video

2:20

Can you Spot a Phish?

Interaction

Approx. 5:00

Phishing – Why am I a Target?

Video

1:55

Additional Material (Optional)

Anti-Phishing Company Policy

Policy

 

Phish Reporting Internal Guidelines

Communication

 

Real-life examples of Phish targeted to Organisations

Communication

 

 

Physical Security

Title

Type

Duration

Customer Intro

Video

0:40

What is Tailgating?

Video

2:44

An Access Control Breach

Video with Knowledge Check

2:21

Laptop Security

Video

1:24

Best Practice of BYOD

Video with Knowledge Check

2:33

Additional Material (Optional)

Access Control Company Policy

Policy

 

Access Breach Guidelines

Communication

 

 

Passwords

Title

Type

Duration

Customer Intro

Video

0:40

Passphrase

Video

2:05

How to Create a Strong Password

Video with Knowledge Check

2:04

Password Safety

Interaction

Approx. 5:00

Passwords – Keep them Confidential!

Video

0:55

Additional Material (Optional)

Password Management Company Policy

Policy

 

Password Dos and Don’ts

Communication

 

 

Social Engineering

Title

Type

Duration

Customer Intro

Video

0:40

What is Social Engineering?

Video

2:09

The Best Practice of Smishing

Video

3:59

Can you Spot a Smish?

Interaction

Approx. 5:00

What is Vishing?

Video

2:38

Is this a Vish? – Message from your Bank

Interaction

Approx. 5:00

Additional Material (Optional)

Social Engineering Guidelines

Communication

 

 

Attacks & Scams

Title

Type

Duration

Customer Intro

Video

0:40

Getting Hacked – A Day in the Life

Video

2:22

How Cybercriminals Attack

Video with Knowledge Check

2:34

Would You Fall for a CEO Scam?

Video

3:16

Is this a Vish – A Call from your CFO

Interaction

Approx. 5:00

Additional Material (Optional)

How to Spot an Attack or Scam Guidelines

Communication

 

 

Information Security

Title

Type

Duration

Customer Intro

Video

0:40

Information is Valuable

Video

0:52

Importance of Clear Screen

Video

2:31

Importance of Clear Desk

Video

1:30

Tidy Desk

Interaction

Approx. 5:00

Additional Material (Optional)

Clear Screen/Desk Policy

Policy

 

 

GDPR

Title

Type

Duration

Customer Intro

Video

0:40

What is GDPR? Version 2

Video

2:25

Why GDPR Matters

Video

3:56

GDPR and You

Video

7:03

GDPR – Protecting Data in the Office

Interaction

Approx. 5:00

Additional Material (Optional)

GDPR/Data Protection Company Policy

Policy

 

 

Secure Remote Working

Title

Type

Duration

Customer Intro

Video

0:40

Secure Remote Working

Video

1:41

Working Remotely

Interaction

Approx. 5:00

Printer Safety and Working from Home

Video

2:35

Securely Working from Home – Who’s Really Calling

Video

1:43

Additional Material (Optional)

Remote Working Internal Guidelines

Communication

 

Working from Home Policy

Policy

 

 

Social Media Safety

Title

Type

Duration

Customer Intro

Video

0:40

Best Practices when using Social Networks

Video

2:00

The Dangers of Social Networks

Video

1:15

Social Networks

Interaction

Approx. 5:00

How Social Media is Used as a Phishing Tool

Video

3:42

Are you Sharing too much Information on Social Media?

Video

2:45

Additional Material (Optional)

Social Media Company Policy

Policy

 

Internal Social Media Best Practice Guidelines

Communication

 

 

Malicious Software

Title

Type

Duration

Customer Intro

Video

0:40

What is Ransomware?

Video with Knowledge Check

2:22

When Ransomware Strikes

Video

1:50

Be Your Own Firewall

Video with Knowledge Check

2:46

What are Malicious Attachments?

Video with Knowledge Check

2:57

Additional Material (Optional)

Malicious Software Best Practice Guidelines

Communication

 

How to Report Malicious Activity

Communication

 

Back to all articles