ICONIUM NETWORKS | Security Awareness Training
Iconium Networks has partnered with a leading cyber-security firm to offer clients high-level security awareness training, using an easily digestible series of videos, games, and exercises.
Security Awareness Training
This is a high quality, 45-minute web-based interactive training using common traps, live demonstration videos, short tests and the new scenario-based Danger Zone exercise. Security Awareness Training specializes in making sure employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering, and are able to apply this knowledge in their day-to-day job. The training is split in 4 modules that an employee can do over time. This module is available in English, Spanish, German, and British.
This 25-minute module is a shorter version of the full 45-minute training session. It covers the mechanisms of spam, phishing, spear phishing, spooﬁng, malware hidden in ﬁles, with an interactive test at the end, as well as a fresh videos.
This 15-minute module is an advanced, condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spooﬁng, malware hidden in ﬁles, and Advanced Persistent Threats with an interactive “Red Flags” phishing test at the end, including email best practices. This module is now available in 26 languages.
Security Training Modules
Basic Security Awareness Training Course
Our new Basic Security Awareness Training is 30 minutes long. It has the “Your Role” section from our 45 min. course. It also contains the shortened Red Flags section and a new “Common Threats” section that covers the fake Excel/CEO fraud threat as well as ransomware, and has a 10-question assessment at the end.
This course takes an employee through the basics of what ransomware is, how it came to be, and what the risks of ransomware are. It has a lot of the information of the immensely popular Ransomware Hostage Rescue Manual. It’s 25 minutes long and has a 10-question assessment at the end that needs to be passed with an 80% score.
Ransomware For Hospitals
Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient ﬁles with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.
This 15-minute module covers the rules of how to create and use strong passwords in both an oﬃce environment and at the house. Employees learn the 10 important rules for safer passwords, minimum password length, how to remember long passwords, get trained in best practices like using pass phrases and how to use a diﬀerent password for every website.
Handling Sensitive Information Securely
This 15-minute module of the Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identiﬁable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unlimited Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations.
Mobile Device Security
This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.
Financial Institution Physical Security
(for Financial Institutions only)
This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, ﬁre, natural disasters, burglary, and nuclear emergencies.
In this 10-minute module, employees are quickly brought up to speed to inoculate them against what the FBI calls “Business Email Compromise” and what is commonly known as CEO Fraud. Concepts like social engineering, email spooﬁng, and the two ways that CEO Fraud is being perpetrated are covered. There is a short video with a live demo of an infected Excel ﬁle, and a short quiz to test understanding at the end. Downloadable PDF Resources: Social Engineering Red Flags, and Security Awareness: Best Practices.
Basics of Credit Card Security
This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Diﬀerent types of cards are covered, which speciﬁc elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends oﬀ this module.
PCI Compliance Simpliﬁed
This 30-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualiﬁes as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. After the training, you are able to download essential references regarding being or becoming PCI compliant.
Safe Web Browsing
This 10-minute module takes employees through the basics of safe web browsing. They will learn how to avoid common dangers and the “do’s and “don’ts” of safe web browsing. This module is set up to be fully interactive and could be presented as a quiz to take and “see how much you know”.
GLBA Compliance Course
(for Financial Institutions only)
In this module, employees of ﬁnancial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee’s role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.
Credit Card Security (Part 1)
This 5-minute micro-module covers why it’s so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.
Credit Card Security (Part 2)
This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.
Danger Zone Exercise Micro-module
This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner’s responses. There are two versions of this course, one with sound and one without.
This 5-minute micro-module covers the very important topic of email spooﬁng. It deﬁnes social engineering and shows how hackers can inﬁltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spooﬁng can be.
Handling Sensitive Information Securely (Part 1)
This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identiﬁable Information (PII).
Handling Sensitive Information Securely (Part 2)
This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).
This powerful 5-minute micro-module takes an employee through the basics of ransomware, the diﬀerent methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected ﬁles.
Safe Web Browsing
This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the “dos and don’ts” of safe web browsing. This module is fully interactive with a quiz at the end.
This 5-minute micro-module deﬁnes social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.
Social Media Best Practices
This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.
This 5-minute micro-module covers the rules of how to create and use strong passwords in both an oﬃce environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.
This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.
Security Awareness Company Content Library
Cyber Security Awareness Interactive Learning Modules
- Data Classiﬁcation ILM
Human Firewall ILM
Understanding and Protecting PII ILM Computer Security & Data Protection – ILM
- OWASP Top Ten – ILM
Call Center & Help Desk Awareness – ILM Phishing Andrew’s Inbox – ILM Ransomware ILM
Cyber Security Concepts Modules
- Data Classiﬁcation
Identiﬁcation & User Authentication Malware
Mobile Security Basics
Secure Online Behavior
- Social Engineering
The Top 10 Security Awareness Fundamentals Call Center & Help Desk Awareness
Understanding and Protecting PII
Top Ten Security Awareness Issues for New Hires Computer Security & Data Protection
Executive Awareness and Leadership Module Workplace Violence and Safety
Active Shooter & Physical Incident Response
Cyber Security Awareness Compliance Modules
- FERPA (Education)
FFIEC (Financial Compliance) GLBA (Finance)
- PCI-DSS (Retail Compliance) Sarbanes-Oxley (Accounting) Workforce Safety & Security Awareness
Cyber Security Awareness Videos (2-5 minutes)
- A Day of Bad Passwords
Being a Human Firewall
Cyber Crime Starts with You
Data Breaches and You
Data Classiﬁcation Overview
Data Loss and Insider
Examples of Insider Jobs
Examples of Phishing
Human Firewall and Data Classiﬁcation Introduction to the Cloud
Making Strong Passwords
Mobile Cyber Crime
Mobile Security Overview
Non Technical Security Skills
Phishing Contest Winner
Phishing From Facebook
Phishing From Netﬂix
Phishing From Your Bank
Phishing in Action
Physical Security Threats
PII and Compliance
Pretexting 1 (Fake Fraud Protection) Pretexting 2 (Fake Help Desk)
Pretexting: Fake Executive to I.T. Pretexting: From Fake Credit Card Company
- Pretexting: Fake Employee to Help Desk
Pretexting From Fake I.T.
Privacy Vs. Security
Proper Hard Drive Disposal
Safe Surﬁng 1: HTTP vs HTTPS & Online Authentication Security Myths Busted
Deﬁnition of Social Engineering
Social Media Data Mining
The CIA Triad
The Domains Triad
The Many Lives Triad
Types of Social Engineering
What Does a Social Engineer Look Like?
What is I.D. Theft
What is PII?
Why Security Awareness?
Low-Tech Hacks to Steal Your ID
The Many Lives of PII
Social Networking Do’s and Don’t’s
10 Ways to Avoid Phishing Scams
10 Ways to Keep PII Private
10 Ways to Stay Safe on Social Media
Incident Response 101
Your Security Awareness Journey
NonTech and Phys security tips and tricks
Dangers of USBs
Hide your Passwords
Introduction to Ransomware
Data Breach Overview
The Human Firewall’s Top Concerns in All Three Domains
Cyber Security Awareness Games
- Security Awareness 101 Trivia
Security Awareness 102 Trivia
Human Firewall Trivia
Social Engineering Trivia
Phishing Awareness Trivia
Security Awareness 101 Big Business Security Awareness 102 Big Business Game Human Firewall Big Business
Phishing Awareness Big Business
Social Engineering Big Business Game Password Big Business Game
Security Awareness 101 Alpine Skiing Security Awareness 102 Alpine Skiing Human Firewall Alpine Skiing
Phishing Awareness Alpine Skiing
Social Engineering Alpine Skiing Game
- Password Alpine Skiing Game
Social Engineering & Phishing Millionaire Challenge SA101 Casino Challenge
SA101 Card Stack
Security Awareness 101 World Race
Security Awareness 102 World Race
Human Firewall World Race
Phishing Awareness World Race
Social Engineering World Race Game
Password World Race Game
Security Awareness 101 Balloon Pop
Security Awareness 102 Balloon Pop Game Human Firewall Balloon Pop
Phishing Awareness Balloon Pop
Social Engineering Balloon Pop Game
Password Balloon Pop Game