19th Ave New York, NY 95822, USA

Security Awareness Course

SECURITY AWARENESS TRAINING COURSE

[divider line_type=”No Line” custom_height=”20″]
Fulfills Security Awareness Compliance Requirements For: HIPPA, ISO/IEC 27001 & 27002, FISMA, NERC CIP, and many more.
[divider line_type=”No Line” custom_height=”20″]
[image_with_animation image_url=”7745″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%”]
[divider line_type=”No Line” custom_height=”20″][nectar_btn size=”large” open_new_tab=”true” button_style=”see-through-2″ color_override=”#000000″ hover_color_override=”#000000″ hover_text_color_override=”#ffffff” icon_family=”none” text=”GET A FREE DEMO” url=”http://webhost.testing.kmionline.com/general-security-awareness-demo-form/”][divider line_type=”No Line” custom_height=”5″][nectar_btn size=”large” button_style=”see-through-2″ color_override=”#000000″ hover_color_override=”#000000″ hover_text_color_override=”#ffffff” icon_family=”none” text=”BUY NOW” url=”http://webhost.testing.kmionline.com/products/general-security-awareness/”]
Information Security Training for Everyone
[divider line_type=”No Line” custom_height=”20″]
People all over the world are using business networks to collaborate, communicate, and access data. Businesses, eager to increase productivity, have embraced the growing integration of network communications. Now more than ever, employees are far less dependent on their central office space to complete their work. Although this may provide benefits for both employees and employers, network based collaboration spaces corporate data within a broader environment that is difficult to protect. Infrared Security’s General Security Awareness course takes the participant through an average work day, from entering the work place to answering emails at home, and describes in detail the wide array of security risks employees face on a daily basis.
Viewers of this security awareness course will learn how to detect and mitigate everyday security threats through relatable scenarios as well as real world examples. Viewers can then evaluate their knowledge through a series of quiz questions provided at the end of the course. Quiz scores can be tracked and used to assess your employees’ knowledge of the material. Participants of this security awareness course will gain an understanding of the major risks inherent to their daily work environment; but more importantly, gain the confidence needed to be less susceptible to common security threats.
Do You Have Developers?
[divider line_type=”No Line” custom_height=”20″]
Are they coding secure applications? KMI Learning and Infrared Security offer a suite of courses for software developers and their managers.
[nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ffffff” link_type=”regular” alignment=”left” link_text=”Check it Out” url=”http://webhost.testing.kmionline.com/application-security-training/”]
[image_with_animation image_url=”9933″ alignment=”” animation=”Fade In” border_radius=”5px” box_shadow=”small_depth” max_width=”100%”]

Solid and Scalable Security Awareness Training

[divider line_type=”No Line” custom_height=”40″]
This course will provide participants with the tools necessary to recognize common workplace security risks including but not limited to network sniffing, social engineering, phishing, and data theft. In addition, the course will summarize several key security controls that can be used to mitigate some of the most prevalent attacks found in the modern workplace. Employees everywhere are using business networks to connect, collaborate, and access company data. Businesses, eager to increase productivity, have embraced the growing integration of network communications.
Employees are encouraged to take advantage of technology such as wireless devices and public hotspots. Now more than ever, employees are becoming less dependent on their central office space in order to complete their work. Meetings are done remotely, documents are signed electronically, and emails can be answered from pretty much anywhere. Although this may provide benefits to both employees and employers, network-based collaboration introduces corporate data into a vast environment that is diverse and difficult to protect.

Take a Closer Look

[divider line_type=”No Line” custom_height=”40″]
[nectar_video_lightbox link_style=”play_button_2″ nectar_play_button_color=”Extra-Color-1″ image_url=”9785″ hover_effect=”defaut” box_shadow=”medium_depth” border_radius=”5px” play_button_size=”larger” video_url=”https://www.youtube.com/watch?v=NFN6p_6e8Uw”]
Oops...
Slider with alias Security-Awareness-Course not found.
[nectar_btn size=”jumbo” button_style=”see-through-3d” color_override=”#000000″ text=”Contact Us” url=”http://webhost.testing.kmionline.com/contact-us/”]
Infrared Security and KMI Learning Offer a 10 Part General Security Awareness Training Course Including:
[divider line_type=”No Line” custom_height=”20″]
[carousel script=”owl_carousel” desktop_cols=”6″ desktop_small_cols=”3″ tablet_cols=”2″ mobile_cols=”1″ column_padding=”20px” loop=”true” autorotate=”true”][item id=”1519819932-1-88″ tab_id=”1519820788619-3″ title=”Item”]
ENTERING THE BUILDING:

Learn how to spot and mitigate a very common and overlooked attack known as Piggy-Backing.

[/item][item id=”1519825011215-0-4″ tab_id=”1519820788619-3″ title=”Item”]
ENTERING THE WORKSPACE:

Learn to understand and identify the dangers of network monitoring via rogue devices.

[/item][item id=”1519826774005-0-4″ tab_id=”1519820788619-3″ title=”Item”]
LOGGING INTO WORKSTATION:

Learn how to mitigate the possibility of a passerby attack with proper password handling and two-factor authentication systems.

[/item][item id=”1519826808386-0-0″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH SOFTWARE:

Gain a greater understanding of the risks associated with utilizing vulnerable machines including, phishing attacks and unintentionally installing malware.

[/item][item id=”1519826841341-0-9″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH WEBSITES:

Understand the risks associated with utilizing vulnerable websites not protected with TLS.

[/item][item id=”1519826876892-0-2″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH SENSITIVE DATA:

Gain a greater understanding of the risks associated with handling private company data on shared servers.

[/item][item id=”1519826918124-0-5″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH PEOPLE:

Learn how to spot and mitigate social engineering attacks in the workplace.

[/item][item id=”1519826947133-0-8″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH FOREIGN NETWORKS:

Understand the risks associated with utilizing insecure networks while handling company data.

[/item][item id=”1519826977497-0-4″ tab_id=”1519820788619-3″ title=”Item”]
INTERACTING WITH FOREIGN DEVICES:

Gain a greater understanding of the risks associated with utilizing unknown devices such as mobile phones and thumb drives in the workplace.

[/item][item id=”1519827005630-0-0″ tab_id=”1519820788619-3″ title=”Item”]
WORKING REMOTELY:

Understand the risks associated with utilizing personal devices to handle company data outside of the workplace.

[/item][/carousel]
[nectar_btn size=”jumbo” button_style=”see-through-3d” color_override=”#ffffff” url=”http://webhost.testing.kmionline.com/contact-us/” text=”Contact Us Now”]