Browse Courses

Security: Cyber Security Library

Find the titles that fit your needs best. Search and filter below to find courses on a specific topic, industry, or workplace.

Data Security Compliance: Device Security Basics Featured Image

Data Security Compliance: Device Security Basics

With ongoing and increasing threats of internet hackers, computer viruses, and identity theft, data security is becoming increasingly...
Data Security Compliance: Physical and Technical Safeguards Featured Image

Data Security Compliance: Physical and Technical Safeguards

Inconsistencies in the handling and care of sensitive personal and business data have resulted in millions of unintentional...
HIPAA: Mobile Device Privacy and Security Featured Image

HIPAA: Mobile Device Privacy and Security

Protecting patient health information is a major concern for those working in healthcare. It is important to consider...
How To Protect Yourself From Cyber Security Threats Featured Image

How To Protect Yourself From Cyber Security Threats

By the year 2025 cyber-crime is estimated to cost over 10 trillion dollars per year. This illustrates how...
Protect Sensitive Information: Start with Security Featured Image

Protect Sensitive Information: Start with Security

This training, featuring video produced by the Federal Trade Commission, helps explain the importance of businesses protecting themselves...
The General Data Protection Regulation (GDPR) Part 1: Why GDPR Featured Image

The General Data Protection Regulation (GDPR) Part 1: Why GDPR

In this first of a four-part series, you are introduced to the essential elements of the General Data...
The General Data Protection Regulation (GDPR) Part 2: Five Basic Principles Featured Image

The General Data Protection Regulation (GDPR) Part 2: Five Basic Principles

This training, the second of four parts, focuses on data protection in the workplace, as related to the...
The General Data Protection Regulation (GDPR) Part 3: Foundations Of Data Processing Featured Image

The General Data Protection Regulation (GDPR) Part 3: Foundations Of Data Processing

For some, their work involves the collection, organization and processing of data. The central concern of the General...
The General Data Protection Regulation (GDPR) Part 4: Responsibilities Of Controllers Or Processors Featured Image

The General Data Protection Regulation (GDPR) Part 4: Responsibilities Of Controllers Or Processors

The General Data Protection Regulation (GDPR) mandates that those who are accountable for processing data within an organization...
The Gramm-Leach-Bliley Act (GLBA) Made Simple Featured Image

The Gramm-Leach-Bliley Act (GLBA) Made Simple

As an employee of a financial institution, you have ethical and legal responsibilities to protect the privacy and...
Understanding The California Consumer Privacy Act (CCPA) Featured Image

Understanding The California Consumer Privacy Act (CCPA)

Businesses collect your personal information daily. As of January 1, 2020, California became the first state to enact...