Get instant support with our search!
How do I choose the most appropriate training?
We have handpicked a number of videos, interactions, quizzes and other additional elements that can help when deciding which training content to use in an eLearning Fusion course.
Phishing |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
What is Phishing? |
Video with Knowledge Check |
2:40 |
Types of Phishing |
Video |
2:20 |
Can you Spot a Phish? |
Interaction |
Approx. 5:00 |
Phishing – Why am I a Target? |
Video |
1:55 |
Additional Material (Optional) |
||
Anti-Phishing Company Policy |
Policy |
|
Phish Reporting Internal Guidelines |
Communication |
|
Real-life examples of Phish targeted to Organisations |
Communication |
|
Physical Security |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
What is Tailgating? |
Video |
2:44 |
An Access Control Breach |
Video with Knowledge Check |
2:21 |
Laptop Security |
Video |
1:24 |
Best Practice of BYOD |
Video with Knowledge Check |
2:33 |
Additional Material (Optional) |
||
Access Control Company Policy |
Policy |
|
Access Breach Guidelines |
Communication |
|
Passwords |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
Passphrase |
Video |
2:05 |
How to Create a Strong Password |
Video with Knowledge Check |
2:04 |
Password Safety |
Interaction |
Approx. 5:00 |
Passwords – Keep them Confidential! |
Video |
0:55 |
Additional Material (Optional) |
||
Password Management Company Policy |
Policy |
|
Password Dos and Don’ts |
Communication |
|
Social Engineering |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
What is Social Engineering? |
Video |
2:09 |
The Best Practice of Smishing |
Video |
3:59 |
Can you Spot a Smish? |
Interaction |
Approx. 5:00 |
What is Vishing? |
Video |
2:38 |
Is this a Vish? – Message from your Bank |
Interaction |
Approx. 5:00 |
Additional Material (Optional) |
||
Social Engineering Guidelines |
Communication |
|
Attacks & Scams |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
Getting Hacked – A Day in the Life |
Video |
2:22 |
How Cybercriminals Attack |
Video with Knowledge Check |
2:34 |
Would You Fall for a CEO Scam? |
Video |
3:16 |
Is this a Vish – A Call from your CFO |
Interaction |
Approx. 5:00 |
Additional Material (Optional) |
||
How to Spot an Attack or Scam Guidelines |
Communication |
|
Information Security |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
Information is Valuable |
Video |
0:52 |
Importance of Clear Screen |
Video |
2:31 |
Importance of Clear Desk |
Video |
1:30 |
Tidy Desk |
Interaction |
Approx. 5:00 |
Additional Material (Optional) |
||
Clear Screen/Desk Policy |
Policy |
|
GDPR |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
What is GDPR? Version 2 |
Video |
2:25 |
Why GDPR Matters |
Video |
3:56 |
GDPR and You |
Video |
7:03 |
GDPR – Protecting Data in the Office |
Interaction |
Approx. 5:00 |
Additional Material (Optional) |
||
GDPR/Data Protection Company Policy |
Policy |
|
Secure Remote Working |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
Secure Remote Working |
Video |
1:41 |
Working Remotely |
Interaction |
Approx. 5:00 |
Printer Safety and Working from Home |
Video |
2:35 |
Securely Working from Home – Who’s Really Calling |
Video |
1:43 |
Additional Material (Optional) |
||
Remote Working Internal Guidelines |
Communication |
|
Working from Home Policy |
Policy |
|
Social Media Safety |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
Best Practices when using Social Networks |
Video |
2:00 |
The Dangers of Social Networks |
Video |
1:15 |
Social Networks |
Interaction |
Approx. 5:00 |
How Social Media is Used as a Phishing Tool |
Video |
3:42 |
Are you Sharing too much Information on Social Media? |
Video |
2:45 |
Additional Material (Optional) |
||
Social Media Company Policy |
Policy |
|
Internal Social Media Best Practice Guidelines |
Communication |
|
Malicious Software |
||
Title |
Type |
Duration |
Customer Intro |
Video |
0:40 |
What is Ransomware? |
Video with Knowledge Check |
2:22 |
When Ransomware Strikes |
Video |
1:50 |
Be Your Own Firewall |
Video with Knowledge Check |
2:46 |
What are Malicious Attachments? |
Video with Knowledge Check |
2:57 |
Additional Material (Optional) |
||
Malicious Software Best Practice Guidelines |
Communication |
|
How to Report Malicious Activity |
Communication |
|