2020 Security Awareness Training Catalogue

What is the cyber security awareness training catalog? Our 2020 cyber security awareness training catalog contains a wide range of cyber security topics and is available to administer to your users in various formats via email generated from the Awareness Educator module. See information security awareness training topics below: 

118 Training

21 Hours

NumberMinutes
HTML533660
Keepnet Ninjio53200
Micro Videos1224
Serious Games20400
Total1181284
Title Description Category Duration
Phishing attacksThis section will deal with phishing attacks aimed at gaining sensitive information such as user names, passwords and credit card information (and indirectly money) in electronic communications, often for malicious reasons. It has been explained how the attack took place, how the users fell in the trap and what measures should be taken against this attack.Phishing AttacksLong
Hacking (Defacement)Although hacking means to hack, stroke, impact, , notch, kick, breaking, cutting, nowadays mostly means to get information from illegal ways and to access database of target web site etc. On the other hand, defacement is derived from the word "deface", which means to distort, make it ugly, to make unreadable. In this training, the usage areas of hacking or defacement and examples of these attacks will be examined. Then we will focus on what to do against this type of attack.Data SecurityLong
Basic concepts of information securityInformation security means that the confidentiality, integrity and accessibility of information is ensured. Confidentiality, integrity and accessibility are key elements of information security. They can not be thinked independently of each other. In this training, the basic concepts of information security will be emphasized and the attacks aimed at information security will be explained.Data SecurityLong
Online shopping and credit card securityOnline shopping is one of the most important conveniences that modern technology brings to us. Online shopping is the best alternative for those who do not like to walk around in crowded places or wait in long queues. In addition, online shopping with mobile payment solutions has become easier in recent years. However, online purchases bring with it a number of risks. Due to the nature of e-commerce and thousands of online store options, it can be hard to tell if users are dealing with a fake merchant or fraudster. In this training, precautions have been taken to protect the credit card when shopping online are presented.Data SecurityLong
Online securityNews can be read, games can be played, videos can be watched, shoppings and communications and learning activities, bank transactions and other daily tasks can be done online today.. However, there are some risks and these risks are often caused by either visiting malicious websites or by inadvertently disclosing personal information. This training will focus on online risks and the precautions to be taken against them.Data SecurityLong
Good online citizenshipBeing a good online citizen is more than being a secure Internet user; it means to be responsible, smart, self-respecting, and respect for others. In this training how to secure your privacy and how be a good online citizen will be revealed.Data SecurityLong
E-mail securityE-mails are now one of the most important tools used in formal / informal daily communications. The practicality of e-mail has also brought concerns about e-mail security, because e-mail has become a part of every aspect of our lives. In this training, e-mail communication risks and necessary precautions will be taken against these risks will be emphasized.Email SecurityLong
Physical securityThe attacks against the systems are becoming more complicated and disguising every day. With the development of technology, security threats are increasing in the digital world, and security measures to be taken against physical threats are becoming more important as well as threats coming from the internet. In this training, what is physical security, what is needed to be done to provide today's preciousness and physical security is addressed.Physical securityLong
Do you think you are hacked?In today's evolving cyber threats, malware protection programs (anti-virus software) are not as good as their competitors. Especially with exploits occurring in less than 24 hours, anti-viruses are usually not enough. Because malicious hackers can change their tactics. With a change of a few bytes and a known malware may no longer be recognized by anti-virus programs. So it is important to understand what you have been voluntarily intervening in time. In this tutorial, you will be asked how to understand hacking and what to do against it.Data SecurityLong
General Data Protection Regulation (GDPR)Disciplining the processing of personal data and, in this context, the protection of fundamental rights and freedoms, especially the privacy of private life envisaged in the Constitution. The protection of the data is primarily aimed at protecting the persons to whom it relates, not the data. In this training, it is aimed to provide awareness about this subject by providing information about protection of personal data.Data ComplianceLong
Mobile device securityToday, mobile devices have become an important part of our lives. It is important to keep control of ever-changing mobile devices and consumer applications. In this training, mobile security solutions are presented against the threats that may arise from mobile platformsMobile Device SecurityLong
Password securityThe passwords are the first lines of defense against cybercriminals. Hackers must first go through this line of defense in order to gain access to accounts. That is why cyber criminals use many different methods to sieze passwords. However, an attack will be prevented depending on your password strongeness. With a safe password that is easy for you but difficult for others, you will be protecting your account's first line of defense. In this training, necessary measuresto taken to protect passwords and accounts will be revealedPassword SecurityLong
RansomwareThe ransomware locks valuable data in the infiltrated devices. Today it is a very popular and effective malware attack. They demand a certain amount of ransom (money) for reopening of the data or for recall. In this training, the measures to be taken against the ransom hazard and what is the ransom is given.RansomwareLong
Travel safetyMust you go to an important conference in a remote country? Is there sufficient information about travel safety or is there a directive or procedure that your institution has set up for travelling security? If you make an international trip, do you have the necessary travel briefings to ensure security? Unconscious mistakes made during travel can cause incidents that can cause financial harm to institutions. While travelling insensibly, data security is at very high risk. By taking the necessary precautions, it is possible to safeguard personal and institutional data during travelling. This training describes what needs to be done during for travelling to protect the data.Data SecurityLong
Cyber spyingCyber ​​spying or cyber espionage is the retrieval of information, the secrets of certain people, opponents, groups, governments and enemies to achieve personal, economic, political or military advantages. Cyber ​​espionage is being conducted with the use of many malicious software, including Trojans and spyware. In this training, tools and measures to be taken against cyber spying activities are given.Data SecurityLong
Actors threaten the safety of cybersecurityActors who threaten cyber security can be grouped into enemy governments, terrorists, industrial spies and organized criminal groups, malicious workers and hackers, a wide range of people. These actors played a crucial role in the cyber attacks, causing serious damage to various groups, even states, or key figures in cointries. In this training, those actors threaten the safety of cybersecurity are presented.Data SecurityLong
Social media and securitySocial media are social networking sites that allow you to socialize with the outside world and to meet and communicate with new people. Some network sites are aimed at establishing friendships or romantic relationships, while others are focused on establishing commercial links. This training focuses on the measures to be taken during the use of social networking sites.Social Media SecurityLong
Social engineeringSocial engineering is the way in which people are manipulated to obtain sensitive and personal information. The information that social engineers desire may vary, but mostly they target individuals, their passwords or banking information. In this training, we will focus on the methods of social engineering attacks and the measures to be taken against the threats coming online or on the phone.Social engineeringLong
MalwareMalware (malicious software) is software specifically designed to access or damage a computer. Spyware, keyloggers, viruses, worms are types of softwares that infiltrate a computer to spread malicious code. The simplest way to protect against malware is to avoid opening unknown email attachments, stay away from suspicious websites, and use an up-to-date anti-virus program. In this training, types of malware and measures to be taken against these softwares will be presented.MalwareLong
Cyber Security for ExecutivesIn this cyber security awareness training, we will discuss why executives are being specifically targeted by hackers, what are the most common attack methods used against executives, and what are some basic steps that can be taken to avoid security risks. Data SecurityLong
Information Security for IT ProfessionalsIn this cyber security awareness training, you are going to learn about some of the most common information security threats behind cyber attacks, fundamental goals of information security, and the important role the IT staff plays in managing information security risks. IT StaffLong
Insider ThreatsIn this cyber security awareness training, you will learn the categories of insider threats, their signs, and how to protect yourself and your organization against malicious insiders. Insider ThreatsLong
Incident ReportingIn this cyber security awareness training, you will learn what is a security incident, responsibilities in case of an incident, the importance of policies, procedures and testing in preventing or reducing the harm caused by an incident. Data SecurityLong
Privileged AccessIn this cyber security awareness training, common risks related to administrative privileges, effective controls to secure the privileged access, and some of the best practices for enhancing the security of administrative privileges will be discussed. Data SecurityLong
CEO FraudIn this cyber security awareness training, you will learn the definition of cyber attacks commonly known as “CEO fraud”, how and why these attacks occur, and how to protect your organization from this serious threat.Social EngineeringLong
Clean DeskIn this cyber security awareness training, you will learn the definition of a clean desk policy. You will also understand benefits of a clean desk policy and some simple clean desk best practices which are easy to implement.Physical securityLong
Data ClassificationIn this cyber security awareness training, you will learn what is a data classification and how to classify data. Also, you will know some best practices to protect your sensitive business information.Data SecurityLong
SMS PhishingIn this cyber security awareness training, you will learn the definition of SMS Phishing, characteristics of a typical SMS Phishing attack, and how to identify and prevent a SMS Phishing attempt.Social EngineeringLong
Phishing for ExecutivesIn this cyber security awareness training, you will learn how executives are phished by fake messages. You will also learn “whaling”, the type of phishing specifically targeting executives and some best practices against phishing attacks.Social EngineeringLong
PCI DSSIn this cyber security awareness training, you will learn what is PCI DSS and why it is important to be compliant. You will also understand the Cardholder Data definitions and handling procedures. Finally, you will learn about PCI DSS requirements and how to protect Cardholder DataData ComplianceLong
Account TakeoverIn this cyber security awareness training, you will learn Account Takeover attacks, or ATO. You will also understand the differences and similarities between an ATO and identity theft, what happens during an account takeover, and how you can protect yourself against account takeovers in the future.Social Engineering and Identity TheftLong
Password Security for ExecutivesAs an executive, you should be leading your organization’s efforts in cybersecurity. This means that in addition to protecting your own passwords, you have to actively promote and articulate the importance of password security throughout your entire company. Password SecurityLong
Secure Working RemotelyIn this cyber security awareness training, you will learn how to use public networks and computers safely. You will also learn how to secure your home computers and home network.Working RemotelyLong
Title Description Category Duration
Season 1, Episode 1: Drive Bye (3:01)This episode is inspired by the Jeep/Chrysler attackUSB SecurityMedium
Season 1, Episode 2: Amber Ashlynn pt 1 (3:36)This episode is inspired by the Ashley Madison attackSocial Engineering through Social MediaMedium
Season 1, Episode 3: Amber Ashlynn pt 2 (3:45)This episode is inspired by the Ashley Madison attackMS Word Document AttacksMedium
Season 1, Episode 4: Sunny Phishing (4:02)This episode is inspired by the Sony Pictures attackSpear PhishingMedium
Season 1, Episode 5: Turbine Twist (3:32)This episode is inspired by the American Super Conductor attackPassword SecurityMedium
Season 1, Episode 6: Hospital Hijinks (3:54)This episode is inspired by the Hollywood Presbyterian Medical Center attackRansomwareMedium
Season 1, Episode 7: The W2 Heist (4:00)This episode is inspired by the Sprouts Farmers Market attackW-2 scamsMedium
Season 1, Episode 8: Catfishing (3:56)This episode is inspired by multiple online dating sitesCat fishing scamsMedium
Season 1, Episode 9: The Wi-Fi Trap (3:23)This episode is inspired by the LinkedIn breachPublic Wi-Fi SecurityMedium
Season 1, Episode 10: The Great Password Breach (3:12)This episode is inspired by the Anthem breachTelephone Social EngineeringMedium
Season 1, Episode 11: Hack the Vote (3:48)This episode is our first fictional episode and depicted a scenario where voting booths were hacked during the Presidential Election.Microsoft Support ScamMedium
Season 1, Episode 12: The Wahoo Waterhole (3:44)This episode is inspired by the Yahoo! Breach that occurred in September of 2016Watering Hole AttacksMedium
Season 2, Episode 1: Cyber Oil Warfare (4:43)This episode is inspired by the Saudi Aramco hack (the most expensive hack in cyber history)Badge Surfing and a Clean Desk PolicyMedium
Season 2, Episode 2: The Homeless Homebuyer (4:43)This episode is inspired by the many wire fraud incidents that happen every dayUsing verbal authorization on any transfer of fundsMedium
Season 2, Episode 3: Slippery Side Loading (3:26)This episode is inspired by the Googlian AttackSide Loading Mobile AppsMedium
Season 2, Episode 4: IoT Gone Wild (4:35)This episode in inspired by the DYN DNS attackChanging your default username and password on IOT DeviceMedium
Season 2, Episode 5: The Ransomware Pyramid Scheme (3:52)This episode in based on a Ransomware variant in production gives you an option to pay the ransom, or infect two other people to get you unlocked for freeRansomwareMedium
Season 2, Episode 6: My Password is Password (5:02))This episode is based on the McDonald’s twitter hack and features bad/reused passwordsPassphrases and two-factor authenticationMedium
Season 2, Episode 7: 156 Alarms (4:24)This episode is based on the Dallas SirensSpear PhishingMedium
Season 2, Episode 8: ElectroSign of Things to Come (4:16)This episode is based on the DocuSign hackBusiness Email CompromiseMedium
Season 2, Episode 9: Pension Plan Telescam (4:39)This episode is based on caller ID scamsTelephone spoofingMedium
Season 2, Episode 10: Beware of the Insider (4:42)This episode is based on the Google/Uber IP lawsuitMalicious Insider ThreatsMedium
Season 2, Episode 11: Juice Jacking (3:43)This episode is based on the Equifax breachPhone charging hacksMedium
Season 2, Episode 12: Mis-Delivery (3:00)This episode is based on email misdeliveryAccidental insider threats and email misdeliveryMedium
Season 3, Episode 1: Phishing the Stream (4:09)This episode is inspired by Netflix phishing emailsPhishing and Identity TheftMedium
Season 3, Episode 2: Laid Off, Paid Off (4:24)This episode is inspired by the Uber nondisclosure of a hackSecurely working from home and VPN securityMedium
Season 3, Episode 3: Chicken or Smish (3:30)This episode is inspired by text message phishing schemesSmishingMedium
Season 3, Episode 4: 2 Factor Fake Out (3:52)This episode is inspired schemes used to subvert 2FA via SMS2FA SecurityMedium
Season 3, Episode 5: The Macro Trojan Takedown (3:21)This episode is inspired by the Boryspil Airport attackMacro MalwareMedium
Season 3, Episode 6: Ransomware is Everywhere - CORE 4 (3:23)This episode is inspired by the City of Atlanta attackRansomwareMedium
Season 3, Episode 7: Update Double Take (3:49)This episode is inspired by the malicious ad-resultsMalvertisingMedium
Season 3, Episode 8: Cryptominer Pants on Fire (2:55)This episode is inspired cryptominingCryptojackingMedium
Season 3, Episode 9: Strawberry X Forever (2:57)This episode is inspired by the US Navy hack and teaches about small devices used to exploit Wi-Fi networksWi-Fi SecurityMedium
Season 3, Episode 10: A Terminal Mistake – CORE 4 (3:38)This episode is inspired by the SingHealth breachSpear PhishingMedium
Season 3, Episode 11: Data Loss by the Logger (3:14)This episode is inspired by the Zoho hacksKeystroke loggersMedium
Season 3, Episode 12: Your Page is My Page – CORE 4 (3:47)This episode is inspired by the Facebook breachPassword securityMedium
Season 4, Episode 1: You Never Call… – CORE 4 (3:45)This episode is inspired by Cathay Pacific breachBusiness Email CompromiseMedium
Season 4, Episode 2: C’est La Vie, Chamonix (3:52)This episode is inspired by Marriott breachMobile Device ManagementMedium
Season 4, Episode 3: Up, Upvote, and Away (4:17)This episode is inspired by insider breachesData ClassificationMedium
Season 4, Episode 4: It’s Not What You Think… (4:17)This episode is inspired by blackmail scamsVerifying Email SpoofingMedium
Season 4, Episode 5: Say It, Don’t Spray It (3:55)This episode is inspired by the Citrix breachPassword SprayingMedium
Season 4, Episode 6: Vacation Devastation (4:11)This episode is inspired by the Airbnb scamsSocial Media SecurityMedium
Season 4, Episode 7: Blame Game (3:16)This episode is inspired by the Binance hackMalicious Insider ThreatsMedium
Season 4, Episode 8: SMS SOS (3:38)This episode is inspired by The Community hacking ringSIM Card HijackingMedium
Season 4, Episode 9: USB Nation (3:20)This episode is inspired by infrastructure breachesUSB DropsMedium
Season 4, Episode 10: Voicemail Fail (4:22)This episode is inspired by Capital One breachSpear Phishing DetectionMedium
Season 4, Episode 11: Disregard the Gift Card (3:56)This episode is inspired by gift card scamsGift Card FraudMedium
Season 4, Episode 12: Plug and Pay (3:36)This episode is inspired by the Pitney Bowes hackRansomwareMedium
Season 5, Episode 1: Hook, Line, and Spoofer (3:47)This episode is inspired by gift card scamsTelephone SpoofingMedium
Season 5, Episode 2: Passphrase For Days (4:13)This episode is inspired by the most recent Macy’s breachPassphrasesMedium
Season 5, Episode 3: A Comprimising Crash (4:39)This episode is inspired by London Stock Exchange cyberattackBusiness Email CompromiseMedium
Season 5, Episode 4: Let's Get PhysicalThis episode is inspired by physical security breachesPhysical SecurityMedium
Season 5, Episode 3E: Safe At HomeThis episode includes cyber tips while working from homeSecurely working from homeMedium
Title Description Category Duration
Travel safetyEasy - and careful travelling! In this video, Hasan's travelling story is given.Data SecurityShort
Social networksExcessive use of social networks - This video is about the story of Taner's use of social networks.Social Media SecurityShort
Social engineeringSocial engineering - Protecting information against fraud. In this video, Ali's story about the social engineering attack is given.Social EngineeringShort
Online threatsThreats? It is important to understand them! A viedo to understand their online risk.Data SecurityShort
RansomwareProfessional tools are extremely personal. This video tells the story of a ransomware attack on Gülçin who has given her personal computer to her children to play.RansomwareShort
Phishing attacksPhishing Attacks: Do not fall into the trap! This video tells the story of phishing attack that happened to Ayşe.Phishing AttacksShort
Physical securityA well-organized office is the easiest method for security. Video about physical security and clean table policy at Seda's institution.Physical securityShort
Mobile device securityLost smartphones and tablets: Do not waste time. Betül's interesting storyabout lost cell phone.Mobile device securityShort
Open networksOpen networks and computer privacy. Interesting story of Hakan and Ozlem about open networks.Data SecurityShort
Password securityPasswords: There are some things you can trust. In this video, Yaşar's interesting story about creating passwords is given.Password securityShort
Using USB devicesFlash drivers - How to protect from Cyber attacks?Flash drivers you do not know can damagePhysical securityShort
Web navigationBrowsing on the web: stay responsible. This video describes how to surf the internet.Data SecurityShort
Title Description Category Duration Training Objectives Synopsis
Sentinel office Security 1This is the first of the three chapters that make up the “Office Security” scenario.Office SecurityMediumThe training challenges the trainee to recognize Social Engineering threats and information security vulnerabilities that can be exploited: • Inadequate protection of sensitive data • Unlocked cabinets, drawers and storage areas • Non-compliant destruction of sensitive documents • Risk of intrusion into facilities or a computer network • Unprotected business hardware In this first chapter, Sentinel is sent to Holdastar’s offices, a solar power hardware development company. Their CEO suspects an information security breach, however they have no clear evidence to prove it. Sentinel starts by inspecting the reception area for vulnerabilities, which is directly exposed to visitors.
Sentinel office Security 2This is the second of the three chapters that make up the “Office Security” scenario.Office SecurityMediumThe training challenges the trainee to recognize Social Engineering threats and information security vulnerabilities that can be exploited: • Inadequate protection of sensitive data • Unlocked cabinets, drawers and storage areas • Risk of intrusion into facilities or a computer network • Unprotected business hardwareIn this second chapter, Sentinel follows a clue regarding a visitor accessing employees-only areas of the company. Sentinel is now looking for information security vulnerabilities that the visitor may have exploited.
Sentinel office Security 3This is the third and final chapter of the “Office Security” scenario.Office SecurityMediumThe training challenges the trainee to recognize Social Engineering threats and information security vulnerabilities that can be exploited: • Inadequate protection of sensitive data • Unlocked cabinets, drawers and storage areas • Non-compliant destruction of sensitive documents • Risk of intrusion into facilities or a computer network • Unprotected business hardware In this third and final chapter, Sentinel attempts to uncover the reasons why the intruder wanted to have his interview in the conference room where R&D meetings are held by Holdastar scientists. Sentinel must think like an attacker and find the evidence of breach.
Sentinel office Security 4
Sentinel office Security 5
Sentinel office Security 6
Sentinel office Reloaded
Travel Security 1This is the first of the three chapters that make up the “Travel Security” scenario.Travel SecurityMediumThe training challenges the trainee to recognize the information security threats and vulnerabilities that can be exploited during business travel: • Inadequate protection of sensitive data • Using a non-secure hardware item or network for business purposes • Vulnerable equipment left unattended • Disclosure of sensitive data in a public place In this first chapter, Sentinel receives a mission dossier with information about Holdastar, a solar power hardware development company. Their CEO suspects an information security breach during their on-going corporate meeting in the Bahamas. Sentinel is tasked to examine the mission dossier containing the preliminary observations on Holdastar personnel who may have caused the vulnerabilities that resulted in the breach.
Travel Security 2This is the second of the three chapters that make up the “Travel Security” scenario.Travel SecurityMediumThe training challenges the trainee to recognize the information security threats and vulnerabilities that can be exploited during business travel: • Inadequate protection of sensitive data • Using a non-secure hardware item or network for business purposes • Vulnerable equipment left unattended • Disclosure of sensitive data in a public place In this second chapter, Sentinel meets with Holdastar’s CEO at the hotel loby. She suggests starting the inspection from the hotel room where one of the key Holdastar employees is staying. It seems the company’s information security culture leaves a lot to be desired…
Travel Security 3This is the third and final chapter of the “Travel Security” scenario.Travel SecurityMediumThe training challenges the trainee to recognize the information security threats and vulnerabilities that can be exploited during business travel: • Inadequate protection of sensitive data • Using a non-secure hardware item or network for business purposes • Vulnerable equipment left unattended • Disclosure of sensitive data in a public place In this third and final chapter, Sentinel learns that the support team has identified a suspect who had been previously involved in a cyber crime. Sentinel is asked to follow her trail to the hotel’s business center where she was spotted.
Travel Security 4
Travel Security 5
Travel Security 6
Cyber sec chapters 1This is a mini Info-Sentinel mission that can be completed in approximately 10 minutes. The training can be deployed standalone, or with other scearios in the Info-Sentinel line of training products.Computer SecurityMediumThe training challenges the trainees to recognize cyber security threats and vulnerabilities that occur in office computers: • Weak or accessible password • Risk of workstation intrusion or malware infection • Insufficient protection of confidential information In this mini mission, Sentinel is called to Holdastar, a solar power hardware development company, to try to figure out how an intruder assumed the digital identity of one of the managers in the company, and accessed the corporate network. Sentinel must examine the manager’s work computer to see if he made any mistakes that lead to the identity theft.
Cyber sec chapters 2This is a mini Info-Sentinel mission that can be completed in approximately 10 minutes. The training can be deployed standalone, or with other scearios in the Info-Sentinel line of training products.Email SecurityMediumThe training challenges the trainees to recognize email-born cyber security threats and vulnerabilities in their office computers: • Phishing • Inappropriate use of email account • Insecure transfer of confidential information • Spam or unsolicited email In this mini mission, Sentinel is called to Holdastar, a solar power hardware development company, to try to figure out how a key R&D document was stolen. Holdastar suspects that an R&D employee was targeted via email. Sentinel must try collect evidence to work out how the breach was executed.
Cyber sec chapters 3This is a mini Info-Sentinel mission that can be completed in approximately 10 minutes. The training can be deployed standalone, or with other scearios in the Info-Sentinel line of training products.Social MediaMediumThe training challenges the trainees to recognize cyber security threats and vulnerabilities in their office computers: • Insufficient protection of confidential information • Weak or accessible password • Risk of workstation intrusion or malware infectionIn this mini mission, Sentinel is called to Holdastar, a solar power hardware development company, to try to figure out how an intruder assumed the identity of the R&D manager and gained access to the secure corporate network.
Agent Surefire InfosecAgent Surefire: Infosec skill development game consists of an office setting with over 120 security violations available for discovery and categorization. Learner is free to explore the virtual space for searching and tagging threats and vulnerabilities, collecting points as well as uncovering an insider working with an outside hacker.Information SecurityLong
Agent Surefire Insider ThreatAgent Surefire: Insider Threat is a skill development adventure game and challenge. The scenario drives the experience while the learner is responsible for exploring the virtual space for threats and vulnerabilities. Information SecurityLong
Agent Surefire Network SecurityAgent Surefire: Network Security is a modified version of “Agent Surefire: Insider Threat” where the Learner is tasked with handling tasks that are normally assigned to IT personnel.Network SecurityLong
Ajan 4141Agent 4141 is an internationally awarded information security awareness simulation developed to help protect information assets, adopt information security practices and Clean Desk Policy in the office environment and increase employee awareness on these issues.Clean Desk PolicyLong
Title Category
Use better passwordsPassword Security
Delete when in doubtPhishing Attacks
I do my part in the fight against cybercrime!Data Security
I Back Up My Digital World Continuously…Data Security
I Back Up My Digital Life!Data Security
I use different passwordsPassword Security
I Have Different Passwords For Each Online Account!Password Security
I pay attention to wireless networksWi-Fi Security
I'm Careful About Wireless Access Points!Wi-Fi Security
Keep your password in a safe place!Password Security
Privacy is Important for Your Institution!Data Security
Don't Publish Your Location!Social Engineering
Do Not Share Your Flight Cards!Social Engineering
Stay Away From Suspicious Emails!Phishing Attacks
Title
Game Recommendations for Parents
Bots and Botnets
Be Careful When Shopping Online!
Online Game Advice for Kids and Teens
Digital Cleaning List
Ransomware Attacks
Physical Security is a Part of Our Life
Privacy is Important for Our Organization
Create Strong Passwords!
Do You Think You Are Hacked?
Become a Good Online Citizen!
Privacy in Wireless Networks
Be Careful When Making Transactions With Credit Card!
Protect Your Mobile Devices!
Mobile Applications and Access Permissions
Watch out for phishing attacks!
Be Careful While Traveling!
Cyber Security Rules
Do You Use Social Networks Safely?
Key Recommendations
Your Flight Miles Are Safe!
Online Safety Advice for the Elderly
Title Category
Protect your mobile devices and personal informationMobile Device Security
Don't share your personal files on social networksSocial Networks
Create different and strong passwords for each online accountPassword Security
Don't be a victim of Social Engineering attacksSocial Engineering
Information Security is everyone's responsibilityData Security
Physical Security is part of our business and social lifePhysical Security
If you are safe, everyone is safeData Security
Protect yourself and your devicesPhysical Security
Stay safe while traveling; whether at home or abroadTravel Safety
Learn how to protect yourself from attacksData Security
Protect your data and online presenceOnline Security
Title
Weekly Cybersecurity Briefing No.1Weekly Cybersecurity Briefing No.2Weekly Cybersecurity Briefing No.3Weekly Cybersecurity Briefing No.4
Weekly Cybersecurity Briefing No.5Weekly Cybersecurity Briefing No.6Weekly Cybersecurity Briefing No.7Weekly Cybersecurity Briefing No.8
Weekly Cybersecurity Briefing No.9Weekly Cybersecurity Briefing No.10Weekly Cybersecurity Briefing No.11Weekly Cybersecurity Briefing No.12
Weekly Cybersecurity Briefing No.13Weekly Cybersecurity Briefing No.14Weekly Cybersecurity Briefing No.15Weekly Cybersecurity Briefing No.16
Weekly Cybersecurity Briefing No.17Weekly Cybersecurity Briefing No.18Weekly Cybersecurity Briefing No.19Weekly Cybersecurity Briefing No.20
Weekly Cybersecurity Briefing No.21Weekly Cybersecurity Briefing No.22Weekly Cybersecurity Briefing No.23Weekly Cybersecurity Briefing No.24
Weekly Cybersecurity Briefing No.25Weekly Cybersecurity Briefing No.26Weekly Cybersecurity Briefing No.27Weekly Cybersecurity Briefing No.28
Weekly Cybersecurity Briefing No.29Weekly Cybersecurity Briefing No.30Weekly Cybersecurity Briefing No.31Weekly Cybersecurity Briefing No.32
Weekly Cybersecurity Briefing No.33Weekly Cybersecurity Briefing No.34Weekly Cybersecurity Briefing No.35Weekly Cybersecurity Briefing No.36
Weekly Cybersecurity Briefing No.37Weekly Cybersecurity Briefing No.38Weekly Cybersecurity Briefing No.39Weekly Cybersecurity Briefing No.40
Weekly Cybersecurity Briefing No.41Weekly Cybersecurity Briefing No.42Weekly Cybersecurity Briefing No.43Weekly Cybersecurity Briefing No.44
Weekly Cybersecurity Briefing No.45Weekly Cybersecurity Briefing No.46Weekly Cybersecurity Briefing No.47Weekly Cybersecurity Briefing No.48
Weekly Cybersecurity Briefing No.49Weekly Cybersecurity Briefing No.50Weekly Cybersecurity Briefing No.51Weekly Cybersecurity Briefing No.52
Weekly Cybersecurity Briefing No.53Weekly Cybersecurity Briefing No.54Weekly Cybersecurity Briefing No.55Weekly Cybersecurity Briefing No.56
Weekly Cybersecurity Briefing No.57Weekly Cybersecurity Briefing No.58Weekly Cybersecurity Briefing No.59Weekly Cybersecurity Briefing No.60
Weekly Cybersecurity Briefing No.61Weekly Cybersecurity Briefing No.62Weekly Cybersecurity Briefing No.63Weekly Cybersecurity Briefing No.64
Weekly Cybersecurity Briefing No.65Weekly Cybersecurity Briefing No.66Weekly Cybersecurity Briefing No.67Weekly Cybersecurity Briefing No.68
Weekly Cybersecurity Briefing No.69Weekly Cybersecurity Briefing No.70Weekly Cybersecurity Briefing No.71Weekly Cybersecurity Briefing No.72
Weekly Cybersecurity Briefing No.73Weekly Cybersecurity Briefing No.74Weekly Cybersecurity Briefing No.75Weekly Cybersecurity Briefing No.76
Weekly Cybersecurity Briefing No.77Weekly Cybersecurity Briefing No.78Weekly Cybersecurity Briefing No.79Weekly Cybersecurity Briefing No.80
Weekly Cybersecurity Briefing No.81Weekly Cybersecurity Briefing No.82Weekly Cybersecurity Briefing No.83Weekly Cybersecurity Briefing No.84
Weekly Cybersecurity Briefing No.85Weekly Cybersecurity Briefing No.86Weekly Cybersecurity Briefing No.87Weekly Cybersecurity Briefing No.88
Weekly Cybersecurity Briefing No.89Weekly Cybersecurity Briefing No.90Weekly Cybersecurity Briefing No.91Weekly Cybersecurity Briefing No.92
Weekly Cybersecurity Briefing No.93Weekly Cybersecurity Briefing No.94Weekly Cybersecurity Briefing No.95Weekly Cybersecurity Briefing No.96
Weekly Cybersecurity Briefing No.97Weekly Cybersecurity Briefing No.98Weekly Cybersecurity Briefing No.99Weekly Cybersecurity Briefing No.100
Weekly Cybersecurity Briefing No.101Weekly Cybersecurity Briefing No.102Weekly Cybersecurity Briefing No.103Weekly Cybersecurity Briefing No.104
Weekly Cybersecurity Briefing No.105Weekly Cybersecurity Briefing No.106Weekly Cybersecurity Briefing No.107Weekly Cybersecurity Briefing No.108
Weekly Cybersecurity Briefing No.109Weekly Cybersecurity Briefing No.110Weekly Cybersecurity Briefing No.111Weekly Cybersecurity Briefing No.112
Weekly Cybersecurity Briefing No.113Weekly Cybersecurity Briefing No.114Weekly Cybersecurity Briefing No.115Weekly Cybersecurity Briefing No.116
Weekly Cybersecurity Briefing No.117Weekly Cybersecurity Briefing No.118