Browse Courses

Course Library

Find the titles that fit your needs best. Search and filter below to find courses on a specific topic, industry, or workplace.

Cyber Security Awareness Part 2: Social Engineering Featured Image

Cyber Security Awareness Part 2: Social Engineering

Successful phishing attacks can cost a mid-sized enterprise well over a million dollars, and while phishing attempts in...
Cyber Security Awareness Part 3: Malware Featured Image

Cyber Security Awareness Part 3: Malware

This training course is the third part of a five-part series on cyber security awareness. This video training...
Cyber Security Awareness Part 4: Password Management Featured Image

Cyber Security Awareness Part 4: Password Management

It is a common practice for people to use one or two passwords for many different accounts online....
Cyber Security Awareness Part 5: Internet And Physical Security Featured Image

Cyber Security Awareness Part 5: Internet And Physical Security

The fifth and final part of this series on cyber security awareness, continues to explore digital risks via...
Cybersecurity Essentials Featured Image

Cybersecurity Essentials

Cybersecurity has been of growing interest for many organizations and governments throughout the last decade. A 2022 Forbes...
Cybersecurity Essentials For Employees Featured Image

Cybersecurity Essentials For Employees

Hacking has become a far too common occurrence. This training course shows how vulnerable everyone is to data...
Daily Team Huddle In 1 Minute Featured Image

Daily Team Huddle In 1 Minute

This one-minute video shares five things you can do in a daily team huddle to start the day...
Data Security Compliance: Avoiding Inadvertent Disclosure Featured Image

Data Security Compliance: Avoiding Inadvertent Disclosure

This training focuses on how to protect oneself from sharing data without knowing it. Most users do not...
Data Security Compliance: Data Breaches and ID Theft Featured Image

Data Security Compliance: Data Breaches and ID Theft

Data security is all about keeping private data private. Malicious attacks on data are not new, and they...
Data Security Compliance: Device Security Basics Featured Image

Data Security Compliance: Device Security Basics

With ongoing and increasing threats of internet hackers, computer viruses, and identity theft, data security is becoming increasingly...
Data Security Compliance: Physical and Technical Safeguards Featured Image

Data Security Compliance: Physical and Technical Safeguards

Inconsistencies in the handling and care of sensitive personal and business data have resulted in millions of unintentional...
Dealing With A Silent Colleague Or Customer In 1 Minute Featured Image

Dealing With A Silent Colleague Or Customer In 1 Minute

This one-minute video provides tips to help open communication up with colleagues, co-workers or customers who don’t respond...