ICONIUM NETWORKS | Security Awareness Training


Iconium Networks has partnered with a leading cyber-security firm to offer clients high-level security awareness training, using an easily digestible series of videos, games, and exercises.

Security Awareness Training

45-minutes
This is a high quality, 45-minute web-based interactive training using common traps, live demonstration videos, short tests and the new scenario-based Danger Zone exercise. Security Awareness Training specializes in making sure employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering, and are able to apply this knowledge in their day-to-day job. The training is split in 4 modules that an employee can do over time. This module is available in English, Spanish, German, and British.

25-minutes
This 25-minute module is a shorter version of the full 45-minute training session. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, with an interactive test at the end, as well as a fresh videos.

15-minutes
This 15-minute module is an advanced, condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and Advanced Persistent Threats with an interactive “Red Flags” phishing test at the end, including email best practices. This module is now available in 26 languages.

Security Training Modules


Basic Security Awareness Training Course
Our new Basic Security Awareness Training is 30 minutes long. It has the “Your Role” section from our 45 min. course. It also contains the shortened Red Flags section and a new “Common Threats” section that covers the fake Excel/CEO fraud threat as well as ransomware, and has a 10-question assessment at the end.

Ransomware
This course takes an employee through the basics of what ransomware is, how it came to be, and what the risks of ransomware are. It has a lot of the information of the immensely popular Ransomware Hostage Rescue Manual. It’s 25 minutes long and has a 10-question assessment at the end that needs to be passed with an 80% score.

Ransomware For Hospitals
Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

Strong Passwords
This 15-minute module covers the rules of how to create and use strong passwords in both an office environment and at the house. Employees learn the 10 important rules for safer passwords, minimum password length, how to remember long passwords, get trained in best practices like using pass phrases and how to use a different password for every website.

Handling Sensitive Information Securely
This 15-minute module of the Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unlimited Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations.

Mobile Device Security
This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

Financial Institution Physical Security
(for Financial Institutions only)
This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

CEO Fraud
In this 10-minute module, employees are quickly brought up to speed to inoculate them against what the FBI calls “Business Email Compromise” and what is commonly known as CEO Fraud. Concepts like social engineering, email spoofing, and the two ways that CEO Fraud is being perpetrated are covered. There is a short video with a live demo of an infected Excel file, and a short quiz to test understanding at the end. Downloadable PDF Resources: Social Engineering Red Flags, and Security Awareness: Best Practices.

Basics of Credit Card Security
This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

PCI Compliance Simplified
This 30-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. After the training, you are able to download essential references regarding being or becoming PCI compliant.

Safe Web Browsing
This 10-minute module takes employees through the basics of safe web browsing. They will learn how to avoid common dangers and the “do’s and “don’ts” of safe web browsing. This module is set up to be fully interactive and could be presented as a quiz to take and “see how much you know”.

GLBA Compliance Course
(for Financial Institutions only)
In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee’s role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

Micro-Training


Credit Card Security (Part 1)
This 5-minute micro-module covers why it’s so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

Credit Card Security (Part 2)
This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

Danger Zone Exercise Micro-module
This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner’s responses. There are two versions of this course, one with sound and one without.

Email Spoofing
This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

Handling Sensitive Information Securely (Part 1)
This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

Handling Sensitive Information Securely (Part 2)
This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

Ransomware
This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

Safe Web Browsing
This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the “dos and don’ts” of safe web browsing. This module is fully interactive with a quiz at the end.

Social Engineering
This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

Social Media Best Practices
This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

Strong Passwords
This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

USB Attack
This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.

Security Awareness Company Content Library


Cyber Security Awareness Interactive Learning Modules

  • Data Classification ILM
    Human Firewall ILM
    Understanding and Protecting PII ILM Computer Security & Data Protection – ILM
  • OWASP Top Ten – ILM
    Call Center & Help Desk Awareness – ILM Phishing Andrew’s Inbox – ILM Ransomware ILM

Cyber Security Concepts Modules

  • Data Classification
    Human Firewall
    Identification & User Authentication Malware
    Mobile Security Basics
    Non-Technical Security
    Password Basics
    Privacy
    Secure Online Behavior
    Security Triads
  • Social Engineering
    The Top 10 Security Awareness Fundamentals Call Center & Help Desk Awareness
    Phishing Awareness
    Understanding and Protecting PII
    Top Ten Security Awareness Issues for New Hires Computer Security & Data Protection
    Executive Awareness and Leadership Module Workplace Violence and Safety
    Active Shooter & Physical Incident Response

Cyber Security Awareness Compliance Modules

  • FERPA (Education)
    FFIEC (Financial Compliance) GLBA (Finance)
    HIPAA (Healthcare)
  • PCI-DSS (Retail Compliance) Sarbanes-Oxley (Accounting) Workforce Safety & Security Awareness

Cyber Security Awareness Videos (2-5 minutes)

  • A Day of Bad Passwords
    APTs
    Back Up
    Being a Human Firewall
    Beyond Phishing
    Cyber Crime Starts with You
    Data Breaches and You
    Data Classification Overview
    Data Loss and Insider
    Dumpster Diving
    Email Spoofing
    Examples of Insider Jobs
    Examples of Phishing
    Firewalls
    Free Wifi
    Human Firewall and Data Classification Introduction to the Cloud
    Making Strong Passwords
    Mobile Cyber Crime
    Mobile Security Overview
    Mouse Overs
    Non Technical Security Skills
    Password Security
    Phishing Contest Winner
    Phishing From Facebook
    Phishing From Netflix
    Phishing From Your Bank
    Phishing in Action
    Physical Security Threats
    PII and Compliance
    Pretexting 1 (Fake Fraud Protection) Pretexting 2 (Fake Help Desk)
    Pretexting: Fake Executive to I.T. Pretexting: From Fake Credit Card Company
  • Pretexting: Fake Employee to Help Desk
    Pretexting From Fake I.T.
    Privacy Vs. Security
    Proper Hard Drive Disposal
    Safe Surfing 1: HTTP vs HTTPS & Online Authentication Security Myths Busted
    Definition of Social Engineering
    Social Media Data Mining
    Spam
    The CIA Triad
    The Domains Triad
    The Many Lives Triad
    Types of Social Engineering
    What Does a Social Engineer Look Like?
    What is I.D. Theft
    What is PII?
    Why Security Awareness?
    Low-Tech Hacks to Steal Your ID
    The Many Lives of PII
    Social Networking Do’s and Don’t’s
    Social Media
    Understanding Encryption
    10 Ways to Avoid Phishing Scams
    10 Ways to Keep PII Private
    10 Ways to Stay Safe on Social Media
    Incident Response 101
    Your Security Awareness Journey
    NonTech and Phys security tips and tricks
    Dangers of USBs
    Catching Malware
    Hide your Passwords
    Introduction to Ransomware
    Data Breach Overview
    The Human Firewall’s Top Concerns in All Three Domains

Cyber Security Awareness Games

  • Security Awareness 101 Trivia
    Security Awareness 102 Trivia
    Human Firewall Trivia
    Social Engineering Trivia
    Password Trivia
    Phishing Awareness Trivia
    Security Awareness 101 Big Business Security Awareness 102 Big Business Game Human Firewall Big Business
    Phishing Awareness Big Business
    Social Engineering Big Business Game Password Big Business Game
    Security Awareness 101 Alpine Skiing Security Awareness 102 Alpine Skiing Human Firewall Alpine Skiing
    Phishing Awareness Alpine Skiing
    Social Engineering Alpine Skiing Game
  • Password Alpine Skiing Game
    Social Engineering & Phishing Millionaire Challenge SA101 Casino Challenge
    SA101 Card Stack
    Security Awareness 101 World Race
    Security Awareness 102 World Race
    Human Firewall World Race
    Phishing Awareness World Race
    Social Engineering World Race Game
    Password World Race Game
    Security Awareness 101 Balloon Pop
    Security Awareness 102 Balloon Pop Game Human Firewall Balloon Pop
    Phishing Awareness Balloon Pop
    Social Engineering Balloon Pop Game
    Password Balloon Pop Game