Our computer skills training courses teach fundamental business computer skills with a heavy focus on IT Security / Cybersecurity and all the various threats to an organization’s IT infrastructure in today’s world. Phishing, ransomware attacks, and password & identity theft have become increasingly more common in recent years. It is absolutely essential for an organization to train its employees in password, email, and general IT security. Browse our catalog of online IT security courses and other business computer skills courses to find the right solution to your needs for computer skills training. Computer skills are a must in today's world no matter which industry you’re in, so it’s important your team understands the correct, safe, and secure way to use computers within their organization.
This AI Information Security online training course is designed for all employees. Since the field of generative AI is relatively new, it is logical to assume that some of the risks that come with it are unfamiliar as well. By taking this online training course, you will be able to prepare yourself and your organization to face any cybersecurity challenges that arise out of using generative AI. The biggest concerns surrounding the misuse of generative AI are around data privacy, data security, and intellectual property. In this course, you will learn some best practices that will enable you to mitigate these risks.
This Cloud Computing: An Introduction online training course introduces learners to the exciting world of cloud computing and will learn to define cloud computing. The learner will explore how cloud computing evolved, describe how businesses can benefit from cloud computing, draw attention to the risks of cloud computing, and conclude with the practicalities of its implementation.
This IT Disaster Recovery Planning: An Overview online training course is designed for employees with IT systems responsibilities. Learn about Disaster Recovery Planning (DRP) - the development and implementation of strategies, processes, and procedures designed to prevent and anticipate disruptions to an organization’s critical IT systems and infrastructure, and to restore them as quickly and completely as possible after a disruptive event or disaster.
This IT Security - An Overview online training course is designed for all employees who use computers, tablets, and smartphones in the course of their work. Learn about methods that cyber thieves use to compromise systems, and what we can all do to reduce the risks to our computers, devices, networks, personal information, and corporate data.
This IT Security: E-Mail Security Awareness online training course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect computers, devices and networks with malware. Learn good practices for keeping e-mail systems and communications secure.
This IT Security: Credential Stuffing online training course is designed for all employees in all industries. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into another, unrelated service. Learn what credential stuffing is, the potential negative effects of a credential stuffing attack, and best practices for IT Departments and employees to prevent credential stuffing attacks.
This IT Security: E-Mail Security Awareness online training course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail and infect computers, devices, and networks with malware. Learn good practices for keeping e-mail systems and communications secure.
This IT Security: Mobile Phone Security Awareness online training course is designed for employees who use smartphones in the course of their work. In this course, you will learn to identify smartphone security threats, how to configure your smartphone to mitigate the risks and use your smartphone in a secure way.
This IT Security: Password Security Awareness online training course is designed for all employees. In this course, participants will learn about the importance of password security, good and bad password security practices, how and why hackers access accounts and systems, the consequences of these security breaches, and good practices for avoiding them.
This IT Security: Phishing Awareness online training course explores the various ways that cyberthieves use phishing messages to trick victims into providing personal information and provide access to their computers, networks, and mobile devices. Learn what phishing is, the various ways cyberthieves try to exploit our computer systems and personal information, the types of damage they can cause, and the ways to reduce the likelihood of being “phished”.
This IT Security: Ransomware online training course is designed for employees in all industries who work on computers. In this course, you will learn about ransomware, best practices for IT staff and other employees to prevent ransomware attacks, and recovery options in the event that your organization becomes a ransomware victim.
This IT Security: Safe Web Browsing online training course is designed for all employees who access the World Wide Web and explores the threats to your security and privacy, and threats to your organization. In this course, you will learn about best practices for protecting your security and privacy on the web.
This IT Security: Working Off-Site online training course is designed for employees who are working at home or elsewhere outside the office, part-time or full-time. Learn to keep your computer, devices, and home network secure, use public networks safely, and recognize phishing and targeted phishing attempts.
Ce cours de formation en ligne Sécurité TI – Sensibilisation à l’hameçonnage a été conçu pour tous les employés qui utilisent un ordinateur ou appareil mobile. Apprenez ce qu'est l'hameçonnage, les différentes façons dont les cybercriminels tentent d'exploiter nos systèmes informatiques et nos informations personnelles, les types de dommages qu'ils peuvent causer et les moyens de réduire la probabilité d'être victime d'hameçonnage.
Ce cours de formation en ligne Sécurité informatique – Sensibilisation à la protection des courriels a été conçu pour tous les membres du personnel ayant une adresse courriel de l’entreprise. Dans ce cours, vous allez voir comment les cybercriminels s’y prennent pour mettre la main sur les renseignements personnels grâce aux courriels et pour infiltrer les ordinateurs, les appareils et les réseaux au moyen de maliciels. Il vous apprendra les meilleures façons de protéger votre système de courriel et vos communications électroniques.
This Supply Chain Cybersecurity online training course is designed for Chief Information Security Officers (CISOs) and IT security employees. Learn about the two types of supply chain attacks: island hopping and third-party software attacks, and how to mitigate the risks for both types of attacks within your organization and your supply chain.
This Synthetic Identity Fraud online training course is designed for employees of banks and other lending institutions. In this course, you will learn what Synthetic Identity Fraud is, how fraudsters create and use synthetic identities, and what you can do to reduce the risk of loss from this type of fraud.