SlideShare a Scribd company logo
1 of 2
Download to read offline
PHISHING TRAINING PROGRAM
www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943
Module ~12 mins
Video Only ~ 8 mins
This course is designed to raise awareness about
phishing and inform trainees about the dangers. It
teaches the warning signs to help trainees better spot
phishing attempts, and it explains what people should
do if they have any suspicions about an email or phone
call.
The full-length course takes approximately 12 minutes
to complete and contains a series of 3 short videos
interspersed with 8 interactive quiz questions. This
course can stand alone or can be snapped together with
other topic segments.
The full-length course is divided into three parts:
(1) What Is Phishing?
Discusses the dangers and types of phishing, including
spear phishing and vishing (phishing via phone).
(2) How Do You Spot a Phishing Attempt?
Discusses the various warning signs to look out for.
(3) What Should You Do When Things Seem Phishy?
Discusses what people should do when they have
questions or suspicions.
Condensed Version
Module ~ 6 mins
Video Only ~ 4 mins
We also offer a condensed version that takes about 6
minutes to complete. It contains 4 interactive quiz
questions.
TeachPrivacy was founded by Professor Daniel J. Solove, the John Marshall Harlan Research
Professor of Law at the George Washington University Law School. He is also a Senior Policy
Advisor at the law firm of Hogan Lovells. One of the world’s leading experts in privacy law,
Solove has authored nine books and more than fifty articles. He is the lead author of the most
widely-used textbook on information privacy law. He has given lectures around the world,
testified before Congress, spoken at the Department of Homeland Security, U.S. Dep’t of
Education, FCC, FTC, the Library of Congress, and countless universities.
Professor Solove has been interviewed and featured in several hundred media
broadcasts and articles, including the New York Times, Wall Street Journal,
Washington Post, Chicago Tribune, USA Today, AP, Time, Reader’s Digest, ABC, CBS,
NBC, CNN, and NPR.
www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943
ABOUT TEACHPRIVACY
The TeachPrivacy Advantage
Topical
We cover more than 50 topics,
including HIPAA, FERPA, GLBA,
phishing, passwords, portable devices,
social media, and much more.
Interactive
SCORM-complaint modules have
interactive quizzes and activities.
Engaging
Your workforce will want to take our
training – and they’ll remember it.
Short and Modular
We have comprehensive courses and
short individual modules on
particular topics.
Customizable
We can customize anything
Expertise
Our training is created by Professor
Daniel Solove, an internationally-
known expert in privacy and security.
“In short, easily understood sessions, Professor Solove personally explains the concepts of
information security and privacy in plain language. The excellent content combined with
Solove’s well-earned reputation make the TeachPrivacy series an essential part of an
effective information security awareness program in any organization.”
– Dennis Devlin, CISO, CPO and Senior VP of Privacy Practice, Savanture

More Related Content

Similar to Phishing Training Program Brochure 01

Global Privacy and Data Protection Training Brochure 01
Global Privacy and Data Protection Training Brochure 01Global Privacy and Data Protection Training Brochure 01
Global Privacy and Data Protection Training Brochure 01Daniel Solove
 
Running Head Preparation outline 1 P.docx
Running Head             Preparation outline 1        P.docxRunning Head             Preparation outline 1        P.docx
Running Head Preparation outline 1 P.docxAbhinav816839
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.Tiffany Surratt
 
Developing Software with Security in Mind
Developing Software with Security in MindDeveloping Software with Security in Mind
Developing Software with Security in Mindsblom
 
Active Shooters- 5 Steps for Protecting Your Business
Active Shooters- 5 Steps for Protecting Your BusinessActive Shooters- 5 Steps for Protecting Your Business
Active Shooters- 5 Steps for Protecting Your BusinessJoe Rosner
 
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxlericacbrocano
 
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxlericacbrocano
 
Department of Defense Service Members TrainingOCONUS.docx
Department of Defense Service Members TrainingOCONUS.docxDepartment of Defense Service Members TrainingOCONUS.docx
Department of Defense Service Members TrainingOCONUS.docxsalmonpybus
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video reportYq Chong
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video reportYq Chong
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video reportLucas ChinSheng
 
Precise ethical issue in regards to autonomy.docx
Precise ethical issue in regards to autonomy.docxPrecise ethical issue in regards to autonomy.docx
Precise ethical issue in regards to autonomy.docxwrite5
 
Stephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveStephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveGlobal Voices
 
MBAprepguide - The Articles thus far!
MBAprepguide - The Articles thus far!MBAprepguide - The Articles thus far!
MBAprepguide - The Articles thus far!mbaprepguide
 
A minute of your time ppt week six
A minute of your time ppt week six A minute of your time ppt week six
A minute of your time ppt week six Alyssa Vega
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
NEWTribolt.INSERT
NEWTribolt.INSERTNEWTribolt.INSERT
NEWTribolt.INSERTChuck Houle
 

Similar to Phishing Training Program Brochure 01 (20)

Global Privacy and Data Protection Training Brochure 01
Global Privacy and Data Protection Training Brochure 01Global Privacy and Data Protection Training Brochure 01
Global Privacy and Data Protection Training Brochure 01
 
Running Head Preparation outline 1 P.docx
Running Head             Preparation outline 1        P.docxRunning Head             Preparation outline 1        P.docx
Running Head Preparation outline 1 P.docx
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.
 
Developing Software with Security in Mind
Developing Software with Security in MindDeveloping Software with Security in Mind
Developing Software with Security in Mind
 
Active Shooters- 5 Steps for Protecting Your Business
Active Shooters- 5 Steps for Protecting Your BusinessActive Shooters- 5 Steps for Protecting Your Business
Active Shooters- 5 Steps for Protecting Your Business
 
Cybersafety
CybersafetyCybersafety
Cybersafety
 
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
 
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptxENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
ENGLISH 9 LESSON 3-8 _VIEWING & mainidea.pptx
 
Department of Defense Service Members TrainingOCONUS.docx
Department of Defense Service Members TrainingOCONUS.docxDepartment of Defense Service Members TrainingOCONUS.docx
Department of Defense Service Members TrainingOCONUS.docx
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video report
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video report
 
Social psychology video report
Social psychology video reportSocial psychology video report
Social psychology video report
 
Precise ethical issue in regards to autonomy.docx
Precise ethical issue in regards to autonomy.docxPrecise ethical issue in regards to autonomy.docx
Precise ethical issue in regards to autonomy.docx
 
Stephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveStephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology Collective
 
MBAprepguide - The Articles thus far!
MBAprepguide - The Articles thus far!MBAprepguide - The Articles thus far!
MBAprepguide - The Articles thus far!
 
A minute of your time ppt week six
A minute of your time ppt week six A minute of your time ppt week six
A minute of your time ppt week six
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
NEWTribolt.INSERT
NEWTribolt.INSERTNEWTribolt.INSERT
NEWTribolt.INSERT
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 

Phishing Training Program Brochure 01

  • 1. PHISHING TRAINING PROGRAM www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943 Module ~12 mins Video Only ~ 8 mins This course is designed to raise awareness about phishing and inform trainees about the dangers. It teaches the warning signs to help trainees better spot phishing attempts, and it explains what people should do if they have any suspicions about an email or phone call. The full-length course takes approximately 12 minutes to complete and contains a series of 3 short videos interspersed with 8 interactive quiz questions. This course can stand alone or can be snapped together with other topic segments. The full-length course is divided into three parts: (1) What Is Phishing? Discusses the dangers and types of phishing, including spear phishing and vishing (phishing via phone). (2) How Do You Spot a Phishing Attempt? Discusses the various warning signs to look out for. (3) What Should You Do When Things Seem Phishy? Discusses what people should do when they have questions or suspicions. Condensed Version Module ~ 6 mins Video Only ~ 4 mins We also offer a condensed version that takes about 6 minutes to complete. It contains 4 interactive quiz questions.
  • 2. TeachPrivacy was founded by Professor Daniel J. Solove, the John Marshall Harlan Research Professor of Law at the George Washington University Law School. He is also a Senior Policy Advisor at the law firm of Hogan Lovells. One of the world’s leading experts in privacy law, Solove has authored nine books and more than fifty articles. He is the lead author of the most widely-used textbook on information privacy law. He has given lectures around the world, testified before Congress, spoken at the Department of Homeland Security, U.S. Dep’t of Education, FCC, FTC, the Library of Congress, and countless universities. Professor Solove has been interviewed and featured in several hundred media broadcasts and articles, including the New York Times, Wall Street Journal, Washington Post, Chicago Tribune, USA Today, AP, Time, Reader’s Digest, ABC, CBS, NBC, CNN, and NPR. www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943 ABOUT TEACHPRIVACY The TeachPrivacy Advantage Topical We cover more than 50 topics, including HIPAA, FERPA, GLBA, phishing, passwords, portable devices, social media, and much more. Interactive SCORM-complaint modules have interactive quizzes and activities. Engaging Your workforce will want to take our training – and they’ll remember it. Short and Modular We have comprehensive courses and short individual modules on particular topics. Customizable We can customize anything Expertise Our training is created by Professor Daniel Solove, an internationally- known expert in privacy and security. “In short, easily understood sessions, Professor Solove personally explains the concepts of information security and privacy in plain language. The excellent content combined with Solove’s well-earned reputation make the TeachPrivacy series an essential part of an effective information security awareness program in any organization.” – Dennis Devlin, CISO, CPO and Senior VP of Privacy Practice, Savanture