SlideShare a Scribd company logo
1 of 29
The right knowledge.
Right now.
Essentials Webinar
Meet your
speakers
Emma Waite
Implementation Specialist
Hunter Reed
Moderator
Agenda
1. Overview of Infosec IQ
2. Navigating the Dashboard
3. Managing Learners
4. PhishSim Campaigns
5. AwareEd Campaigns
6. Reporting
7. Other Tools
Overview of Infosec IQ
Infosec IQ provides Security Awareness training through simulated phishing messages,
interactive training videos, and quizzes.
PhishSim: Includes 1,000s of phishing templates in a variety of attack types and
difficulty levels. New templates are added each week, helping your organization stay
ahead of the latest threats.
AwareEd: Our massive library of industry- and role-based training resources is
updated weekly, helping you deliver fresh, relevant training to every member of your
organization no matter the style and tone you need
Navigating the Dashboard
• Core Behavior Compliance Infosec IQ’s training
modules are linked to one of the Core Behaviors
outlined by National Institute of Standards and
Technology (NIST)
• Click Rate This chart shows an overall percentage
of learners who fell for the different email attack
types in all PhishSim campaigns
• What’s New Provides you with updates to features
or new functionality in the platform.
• Subscription Settings Allows you to view your
renewal date, learner seat utilization, and current
plan.
• Join the Community! TechExams Community is a
space for IT professionals to share problems and
find solutions.
Managing Learners
Adding learners to the platform
• Active Directory Sync
• CSV File Import
• Manual
Groups
• Static
• Dynamic
Learner’s Profile
• Letter Grade
• Timeline Events
PhishSim Campaigns
How to configure and deploy PhishSim
campaigns
Simulated Phished Email Templates
Navigating the email template page
Email Template Tabs
• All: This includes all available email templates under each tab
• Personal: These are all the templates that you have cloned or built from scratch
• Contributed: These are templates that other Infosec IQ customers have shared
• System: These are templates that the Infosec IQ Content Team have pre-built
Previewing an email template An admin can preview an email template right in the platform or
or email a preview to themselves.
Cloning an email template This will give the admin the ability to make changes to an existing
template in the platform. Once saved, the email template can be found in the Personal tab.
Customizing Email Templates
From Email: You can change the
from email by selecting the
settings gear
Attack Type: This is where you
can change the attack type of
that specific email
Education: This is where you can
change the education that a
learner views after they get
phished
Tools: This will allow you to
edit/add source code (HTML) to
the email template.
Preview in Browser: This will
allow you to preview as a learner,
as well as send an email preview
to yourself
Email Attack Types
Drive-by: This is where a learner clicks on any link
in the PhishSim email that they receive
Attachment: This will add an attachment to the
PhishSim Email that will track if a learner enables
macros on that document
Data Entry: After a learner clicks on a link in the PhishSim
email, they will be brought to a login page. SecurityIQ
doesn’t track the credentials being entered, as those are
blank key strokes
Business Email Compromise: These templates are requesting
specific information for that learner and tracking to see if the
responded back with sensitive information
To view a complete list of Data
Entry Login Sites, please navigate
to the Data Entry Template
section in SecurityIQ
PhishSim Education
• To view all of the different types of education available for a PhishSim campaign, locate the
Education section under the PhishSim menu. On this page you will notice:
– Five interactive AwareEd training video options
– Pre-built static education pages
• You can build custom education pages by selecting “New Education” in the top right corner.
There are two other education options that you can assign learners to outside of Interactive and
Static education pages
Phishing Indicators
When a leaner gets phished, they will be taken to a
webpage that has a screen shot of the email that they
were just phished on. Included on that screen will be
specific call-outs to what the learner should have
noticed prior to clicking on the link.
External Links
After a learner gets phished, they will be redirected to
an external link. To get this set-up, you will select
“New Education” and insert the external URL that
you will want to bring learners to.
PhishSim Batteries
A Battery is a way to group specific email
templates to point at a campaign. Some
Infosec IQ customers group emails based
on certain commonalities such as method,
education, etc. The Infosec IQ platform
has pre-built batteries that an admin can
use or clone to customize.
PhishSim Campaigns
• After you have your Battery built, you are ready to schedule your campaign. To create and schedule a
PhishSim campaign, navigate to Campaigns under PhishSim. On this page select “New Campaign”:
– Campaign Name: This isn’t visible to the learners
– Branding: Your default brand should be automatically selected. If you have multiple branding options, you can
select the specific brand you want shown
– Learners: This is where you can choose if you would want the campaign to go to…
• All Learners
– A Specific Learner Group
– Individual Learners
• Content: In this section you can select a specific template, battery, or category that you would like to send
emails from simply by typing in the name.
• Battery Options: By default, the learner will receive all the templates that are selected. You can also
choose how many templates each learner receives out of the battery by selecting “Send Random Phishing
Templates”. This option is recommended especially if using Categories, as some of our categories have
20+ templates
PhishSim Campaigns Continued
• Phished Actions
– Notification: This is a follow up email that gets sent to a phished learner that you can customize. You can also turn this
follow up email off down in “Schedule”
– Group: Prior to building your campaign, you can create a group that you would like phished learners to be added to
• Learner Replies:
– Used for Business Email Compromise attacks.
– Tracks total number of replies as well as which emails your learners responded to.
– Advance options allow for viewing the reply and for matching strings or patterns in responses.
• Schedule
– Send Phishing Attacks Over Time: This is where you can schedule out the email templates to be delivered to the learners
over a period of time. For example: if you run a campaign for 30 days and you have three email templates going to each
learner – the learner will receive those three email templates at random over the next 30 days
– Send Phishing Attacks at One Time: This option will allow you to send out all the templates at once. This option is great if
you want to quickly test the email templates to see how they look – prior to deploying the campaign to all learners. To
out a quick test campaign, all you will need to do is select any time in the past. Once you schedule the campaign, the
emails will get sent out as soon as our servers queue them up.
AwareEd Campaigns
How to configure and deploy AwareEd
Campaigns
AwareEd Campaigns
What is an AwareEd Campaign? An
AwareEd campaign consists of
interactive training modules and/or
assessments that you can enroll
learners in for a certain period.
In this section, we will cover:
– How to navigate the Content Library
– Build Courses
– Create a Campaign
Navigating the Content Library
This Module is available for SCORM
as a Service Download
Indicates what languages that
module/assessment have been
translated in
Allows you to preview the
module/assessment
Adds module/assessment to Course
Builder
Assessment
Assets: This counts the total number of modules, assessments,
program resources that we have. If the asset is available in
multiple languages, those are counted as individual assets.
Search: Allows you to search for a specific content
Filter: You can filter on different areas to help you select content
Course Builder: This appears on the left-hand side of the screen
when you add a module/assessment to a course (see slide 17)
Course Builder
• The Course Builder will appear in the Content Library
once you have selected the “+” symbol on any of our
modules and assessments.
• Course Name: This is visible to the learner
• Module Order: As you add content, it will be added in the
module order section. You can rearrange the order of the
content by dragging and dropping. You can also remove
any content by clicking the “x” icon.
• Course Statistics: This will give you an overview of the
number of modules in the course, total length, and the
number of exercises included. Please note that the total
length is the total length of the video + how long it takes
the average learner to complete the exercises; it does not
take in to account how long it takes learners to complete
assessments.
• Once you select “Save Course”, you can view and edit
your course by navigating to AwareEd > Courses
Campaign Creation
Once you have your course built with the selected modules and/or assessments, you are now ready to create your campaign. To accomplish this,
please navigate to AwareEd and select “campaigns”. Once on the campaigns page, click “new campaign”.
Campaign Name: This isn’t visible to the learner, but will help you remember what content you deployed
Branding: The branding option you select will be visible in the beginning of an AwareEd Module, on a learner’s course page, and in the
notification emails that they receive
Learners: In this section you can select whether you want the campaign to be pushed out to:
– All Learners
– Learner Groups
– Individual Learners
Courses: In this section, you can locate the course that you would like to use by clicking on the dropdown menu. You can also select a default
language from the dropdown. Please note that all of our modules are not available in every language, as well as the learner has the opportunity
to select their preferred language on their course page
– Begin Modules upon Page Upload: This will automatically start the videos
– Require learners to retake failed assessments: If you have included an assessment, this will give the learner the opportunity to retake an
assessment
– Restrict access after campaign run completion: By default, learner will still have access to the training after the campaign run is
complete. Select this option if you would like to restrict the learner from taking the training after the campaign has finished
AwareEd Campaign Creation Continued
Notifications: These are emails that get sent out to the learner during the lifespan of the campaign. All of these notifications can be
customized by navigating to the “Notifications” section under AwareEd
– Enrollment Notification: Once you enroll the learners in a campaign, they will all receive an enrollment email. In this email, this will
contain their unique training link that will bring them to the course page. Please note that no username or password is required for
learners to access the training
– Start and Finish Reminders: These emails will get sent out after the number of allotted days have passed
– Completion Notification: A learner will receive this once they have completed their training
o Completion Certificate: This will appear on the learner’s course page once they have completed all of the training. This
certificate cannot be customized at this time
Schedule: In this section you can select what specific date you would like your campaign to start on, and how many days you would like it
to run for.
– Repeat: If you would like to repeat your campaign for additional runs, you can do so here. For example, if you initially scheduled
the campaign for 30 days and had the repeat set to “1” – it would repeat the campaign for one additional 30 day run
Reset Enrollment: This is only applicable if you have set up an EPP Integration
Reset Learner Progress: If you have multiple runs in a campaign, the learners progress will reset once the new campaign run starts. If
you would like to include only those learners who did not complete the training in the first box, you will need make sure the box isn’t
checked.
Reporting
How to utilize the different reporting tools
in Infosec IQ
Campaign Results Report
After you have launched the campaign, you can get real-time campaign information by:
– Hovering over the campaign name and select “Details”
– Then Select the bar graph on the right-hand side
– This page will give you a detailed breakdown of each learner in the campaign and their results
This will generate a
csv report that
contains the
information on this
page
Infosec IQAuto-Reports
Once a campaign is launched, Infosec IQ automatically creates a report
that is specific to that campaign. You can access the auto-report by either
clicking on the status:
Or, navigating to the Reports dropdown menu and select Auto-Reports
Other Tools
Overview of the advance tools and features
in the Infosec IQ platform
Phishing Indicators
Phishing Indicators is a type of education available in a PhishSim campaign. When a
learner is phished, a new webpage will open up that has a screen shot of the email they
were just phished with. On that screen shot, there will be call-outs as to what the
learner should have noticed prior to click on the link.
PhishNotify
PhishNotify is a tool that allows employees to report potentially malicious emails, as
well as simulated phishing messages sent through an Infosec IQ campaign. For more
information, navigate to the PhishSim dropdown menu and select PhishNotify
SCORMas a Service
Infosec IQ allows you to add training modules to your Learning Management System
(LMS) for commonly used training modules by providing downloadable SCORM
packages for a non-interactive version of those modules. To view all of the modules
available for download, navigate to the Content Library and select SCORM as a Service
from the filter menu
Publishing Assistant
Converts any PDF into a training module with professional-grade voice-over
narration. Using Publishing Assistant, you can select from dozens of narrator
voices and languages. To access Publish Assistant, navigate to the AwareEd
drop-down menu and select Publishing Assistant.
Single Sign On(SSO)
SSO for Learner Authentication works by connecting your Infosec IQ
account to any Identity Provider that supports the SAML 2.0 standard. To
begin, Go to Settings (gear icon) and select Learner Authentication from the
menu.
API
Infosec IQ’s REST API allows you to Integrate important security awareness
training metrics into your existing business intelligence systems and
endpoint protection solutions.
Support
If you would like some one-on-one support with any of these tools, or with the platform, please
contact our Support Team:
Phone: 608.620.8838
Email: customer-support@infosecinstitute.com
They will get you in contact with one of our Implementation and Support Specialists to assist you
further.
ACTIONABLE
EDUCATION
INSPIRING
IDEAS
INSIDER
SNEAK PEEKS
PLENTY OF
NETWORKING
LEARN MORE events.infosecinstitute.com/Inspire19
Questions?

More Related Content

What's hot

User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...Schellman & Company
 
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptxSentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptxssuser951f851
 
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...Claudia Melo
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsSalesforce Admins
 
Security and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasySecurity and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasyHelpSystems
 
TLS, SPF, DKIM, DMARC, authenticated email
TLS, SPF, DKIM, DMARC, authenticated emailTLS, SPF, DKIM, DMARC, authenticated email
TLS, SPF, DKIM, DMARC, authenticated emailrinnocente
 
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdfSOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdfinfosecTrain
 
Salesforce Release Management - Best Practices and Tools for Deployment
Salesforce Release Management - Best Practices and Tools for DeploymentSalesforce Release Management - Best Practices and Tools for Deployment
Salesforce Release Management - Best Practices and Tools for DeploymentSalesforce Developers
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security BenchmarkRahul Khengare
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Salesforce Service Cloud automatons
Salesforce Service Cloud automatonsSalesforce Service Cloud automatons
Salesforce Service Cloud automatonsRAMNARAYAN R
 

What's hot (20)

Iso 22301 Checklist
Iso 22301 ChecklistIso 22301 Checklist
Iso 22301 Checklist
 
CMMC 2.0 Explained: Impact for SMBs
CMMC 2.0 Explained:  Impact for SMBsCMMC 2.0 Explained:  Impact for SMBs
CMMC 2.0 Explained: Impact for SMBs
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
 
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptxSentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...
PRODUCTIVITY OF AGILE TEAMS: AN EMPIRICAL EVALUATION OF FACTORS AND MONITORIN...
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & Permissions
 
Security and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasySecurity and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made Easy
 
TLS, SPF, DKIM, DMARC, authenticated email
TLS, SPF, DKIM, DMARC, authenticated emailTLS, SPF, DKIM, DMARC, authenticated email
TLS, SPF, DKIM, DMARC, authenticated email
 
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdfSOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
 
Salesforce Release Management - Best Practices and Tools for Deployment
Salesforce Release Management - Best Practices and Tools for DeploymentSalesforce Release Management - Best Practices and Tools for Deployment
Salesforce Release Management - Best Practices and Tools for Deployment
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Salesforce Service Cloud automatons
Salesforce Service Cloud automatonsSalesforce Service Cloud automatons
Salesforce Service Cloud automatons
 

Similar to Infosec IQ Essentials

Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec
 
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4daniatrappit
 
Talent_lms introduction
Talent_lms introductionTalent_lms introduction
Talent_lms introductionAnjan Kumar
 
Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)Edu4Sure
 
Visionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus GroupVisionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus GroupVisionsLive
 
How to use LinkedIn Learning
How to use LinkedIn LearningHow to use LinkedIn Learning
How to use LinkedIn LearningRebecca Ferriday
 
Brightspace Business Student Guide v3
Brightspace Business Student Guide v3 Brightspace Business Student Guide v3
Brightspace Business Student Guide v3 Mark Kor
 
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfThe Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfVinay Londhe
 
Creatingcontent
CreatingcontentCreatingcontent
CreatingcontentSat Án
 
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...RobertThorson2
 
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignWhat Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignEI Design
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxInfosec
 
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Human Capital Media
 
Bridge Learning Solutions
Bridge Learning SolutionsBridge Learning Solutions
Bridge Learning SolutionsGlenn Chiles
 
E learning business roadmap
E learning business roadmapE learning business roadmap
E learning business roadmapPP R
 
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...dytajym
 
Shelterland Services V2.1
Shelterland Services V2.1Shelterland Services V2.1
Shelterland Services V2.1Boesit
 

Similar to Infosec IQ Essentials (20)

Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08
 
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
 
Talent_lms introduction
Talent_lms introductionTalent_lms introduction
Talent_lms introduction
 
Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)
 
Visionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus GroupVisionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus Group
 
How to use LinkedIn Learning
How to use LinkedIn LearningHow to use LinkedIn Learning
How to use LinkedIn Learning
 
Brightspace Business Student Guide v3
Brightspace Business Student Guide v3 Brightspace Business Student Guide v3
Brightspace Business Student Guide v3
 
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfThe Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
 
Creatingcontent
CreatingcontentCreatingcontent
Creatingcontent
 
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
 
Learning oxygen
Learning oxygenLearning oxygen
Learning oxygen
 
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignWhat Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training
 
e learning management software - Witzscope
e learning management software - Witzscope e learning management software - Witzscope
e learning management software - Witzscope
 
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
 
Bridge Learning Solutions
Bridge Learning SolutionsBridge Learning Solutions
Bridge Learning Solutions
 
E learning business roadmap
E learning business roadmapE learning business roadmap
E learning business roadmap
 
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
 
Shelterland Services V2.1
Shelterland Services V2.1Shelterland Services V2.1
Shelterland Services V2.1
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedInfosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedInfosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxInfosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxInfosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security rightInfosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examInfosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Infosec IQ Essentials

  • 1. The right knowledge. Right now. Essentials Webinar
  • 2. Meet your speakers Emma Waite Implementation Specialist Hunter Reed Moderator
  • 3. Agenda 1. Overview of Infosec IQ 2. Navigating the Dashboard 3. Managing Learners 4. PhishSim Campaigns 5. AwareEd Campaigns 6. Reporting 7. Other Tools
  • 4. Overview of Infosec IQ Infosec IQ provides Security Awareness training through simulated phishing messages, interactive training videos, and quizzes. PhishSim: Includes 1,000s of phishing templates in a variety of attack types and difficulty levels. New templates are added each week, helping your organization stay ahead of the latest threats. AwareEd: Our massive library of industry- and role-based training resources is updated weekly, helping you deliver fresh, relevant training to every member of your organization no matter the style and tone you need
  • 5. Navigating the Dashboard • Core Behavior Compliance Infosec IQ’s training modules are linked to one of the Core Behaviors outlined by National Institute of Standards and Technology (NIST) • Click Rate This chart shows an overall percentage of learners who fell for the different email attack types in all PhishSim campaigns • What’s New Provides you with updates to features or new functionality in the platform. • Subscription Settings Allows you to view your renewal date, learner seat utilization, and current plan. • Join the Community! TechExams Community is a space for IT professionals to share problems and find solutions.
  • 6. Managing Learners Adding learners to the platform • Active Directory Sync • CSV File Import • Manual Groups • Static • Dynamic Learner’s Profile • Letter Grade • Timeline Events
  • 7. PhishSim Campaigns How to configure and deploy PhishSim campaigns
  • 8. Simulated Phished Email Templates Navigating the email template page Email Template Tabs • All: This includes all available email templates under each tab • Personal: These are all the templates that you have cloned or built from scratch • Contributed: These are templates that other Infosec IQ customers have shared • System: These are templates that the Infosec IQ Content Team have pre-built Previewing an email template An admin can preview an email template right in the platform or or email a preview to themselves. Cloning an email template This will give the admin the ability to make changes to an existing template in the platform. Once saved, the email template can be found in the Personal tab.
  • 9. Customizing Email Templates From Email: You can change the from email by selecting the settings gear Attack Type: This is where you can change the attack type of that specific email Education: This is where you can change the education that a learner views after they get phished Tools: This will allow you to edit/add source code (HTML) to the email template. Preview in Browser: This will allow you to preview as a learner, as well as send an email preview to yourself
  • 10. Email Attack Types Drive-by: This is where a learner clicks on any link in the PhishSim email that they receive Attachment: This will add an attachment to the PhishSim Email that will track if a learner enables macros on that document Data Entry: After a learner clicks on a link in the PhishSim email, they will be brought to a login page. SecurityIQ doesn’t track the credentials being entered, as those are blank key strokes Business Email Compromise: These templates are requesting specific information for that learner and tracking to see if the responded back with sensitive information To view a complete list of Data Entry Login Sites, please navigate to the Data Entry Template section in SecurityIQ
  • 11. PhishSim Education • To view all of the different types of education available for a PhishSim campaign, locate the Education section under the PhishSim menu. On this page you will notice: – Five interactive AwareEd training video options – Pre-built static education pages • You can build custom education pages by selecting “New Education” in the top right corner. There are two other education options that you can assign learners to outside of Interactive and Static education pages Phishing Indicators When a leaner gets phished, they will be taken to a webpage that has a screen shot of the email that they were just phished on. Included on that screen will be specific call-outs to what the learner should have noticed prior to clicking on the link. External Links After a learner gets phished, they will be redirected to an external link. To get this set-up, you will select “New Education” and insert the external URL that you will want to bring learners to.
  • 12. PhishSim Batteries A Battery is a way to group specific email templates to point at a campaign. Some Infosec IQ customers group emails based on certain commonalities such as method, education, etc. The Infosec IQ platform has pre-built batteries that an admin can use or clone to customize.
  • 13. PhishSim Campaigns • After you have your Battery built, you are ready to schedule your campaign. To create and schedule a PhishSim campaign, navigate to Campaigns under PhishSim. On this page select “New Campaign”: – Campaign Name: This isn’t visible to the learners – Branding: Your default brand should be automatically selected. If you have multiple branding options, you can select the specific brand you want shown – Learners: This is where you can choose if you would want the campaign to go to… • All Learners – A Specific Learner Group – Individual Learners • Content: In this section you can select a specific template, battery, or category that you would like to send emails from simply by typing in the name. • Battery Options: By default, the learner will receive all the templates that are selected. You can also choose how many templates each learner receives out of the battery by selecting “Send Random Phishing Templates”. This option is recommended especially if using Categories, as some of our categories have 20+ templates
  • 14. PhishSim Campaigns Continued • Phished Actions – Notification: This is a follow up email that gets sent to a phished learner that you can customize. You can also turn this follow up email off down in “Schedule” – Group: Prior to building your campaign, you can create a group that you would like phished learners to be added to • Learner Replies: – Used for Business Email Compromise attacks. – Tracks total number of replies as well as which emails your learners responded to. – Advance options allow for viewing the reply and for matching strings or patterns in responses. • Schedule – Send Phishing Attacks Over Time: This is where you can schedule out the email templates to be delivered to the learners over a period of time. For example: if you run a campaign for 30 days and you have three email templates going to each learner – the learner will receive those three email templates at random over the next 30 days – Send Phishing Attacks at One Time: This option will allow you to send out all the templates at once. This option is great if you want to quickly test the email templates to see how they look – prior to deploying the campaign to all learners. To out a quick test campaign, all you will need to do is select any time in the past. Once you schedule the campaign, the emails will get sent out as soon as our servers queue them up.
  • 15. AwareEd Campaigns How to configure and deploy AwareEd Campaigns
  • 16. AwareEd Campaigns What is an AwareEd Campaign? An AwareEd campaign consists of interactive training modules and/or assessments that you can enroll learners in for a certain period. In this section, we will cover: – How to navigate the Content Library – Build Courses – Create a Campaign
  • 17. Navigating the Content Library This Module is available for SCORM as a Service Download Indicates what languages that module/assessment have been translated in Allows you to preview the module/assessment Adds module/assessment to Course Builder Assessment Assets: This counts the total number of modules, assessments, program resources that we have. If the asset is available in multiple languages, those are counted as individual assets. Search: Allows you to search for a specific content Filter: You can filter on different areas to help you select content Course Builder: This appears on the left-hand side of the screen when you add a module/assessment to a course (see slide 17)
  • 18. Course Builder • The Course Builder will appear in the Content Library once you have selected the “+” symbol on any of our modules and assessments. • Course Name: This is visible to the learner • Module Order: As you add content, it will be added in the module order section. You can rearrange the order of the content by dragging and dropping. You can also remove any content by clicking the “x” icon. • Course Statistics: This will give you an overview of the number of modules in the course, total length, and the number of exercises included. Please note that the total length is the total length of the video + how long it takes the average learner to complete the exercises; it does not take in to account how long it takes learners to complete assessments. • Once you select “Save Course”, you can view and edit your course by navigating to AwareEd > Courses
  • 19. Campaign Creation Once you have your course built with the selected modules and/or assessments, you are now ready to create your campaign. To accomplish this, please navigate to AwareEd and select “campaigns”. Once on the campaigns page, click “new campaign”. Campaign Name: This isn’t visible to the learner, but will help you remember what content you deployed Branding: The branding option you select will be visible in the beginning of an AwareEd Module, on a learner’s course page, and in the notification emails that they receive Learners: In this section you can select whether you want the campaign to be pushed out to: – All Learners – Learner Groups – Individual Learners Courses: In this section, you can locate the course that you would like to use by clicking on the dropdown menu. You can also select a default language from the dropdown. Please note that all of our modules are not available in every language, as well as the learner has the opportunity to select their preferred language on their course page – Begin Modules upon Page Upload: This will automatically start the videos – Require learners to retake failed assessments: If you have included an assessment, this will give the learner the opportunity to retake an assessment – Restrict access after campaign run completion: By default, learner will still have access to the training after the campaign run is complete. Select this option if you would like to restrict the learner from taking the training after the campaign has finished
  • 20. AwareEd Campaign Creation Continued Notifications: These are emails that get sent out to the learner during the lifespan of the campaign. All of these notifications can be customized by navigating to the “Notifications” section under AwareEd – Enrollment Notification: Once you enroll the learners in a campaign, they will all receive an enrollment email. In this email, this will contain their unique training link that will bring them to the course page. Please note that no username or password is required for learners to access the training – Start and Finish Reminders: These emails will get sent out after the number of allotted days have passed – Completion Notification: A learner will receive this once they have completed their training o Completion Certificate: This will appear on the learner’s course page once they have completed all of the training. This certificate cannot be customized at this time Schedule: In this section you can select what specific date you would like your campaign to start on, and how many days you would like it to run for. – Repeat: If you would like to repeat your campaign for additional runs, you can do so here. For example, if you initially scheduled the campaign for 30 days and had the repeat set to “1” – it would repeat the campaign for one additional 30 day run Reset Enrollment: This is only applicable if you have set up an EPP Integration Reset Learner Progress: If you have multiple runs in a campaign, the learners progress will reset once the new campaign run starts. If you would like to include only those learners who did not complete the training in the first box, you will need make sure the box isn’t checked.
  • 21. Reporting How to utilize the different reporting tools in Infosec IQ
  • 22. Campaign Results Report After you have launched the campaign, you can get real-time campaign information by: – Hovering over the campaign name and select “Details” – Then Select the bar graph on the right-hand side – This page will give you a detailed breakdown of each learner in the campaign and their results This will generate a csv report that contains the information on this page
  • 23. Infosec IQAuto-Reports Once a campaign is launched, Infosec IQ automatically creates a report that is specific to that campaign. You can access the auto-report by either clicking on the status: Or, navigating to the Reports dropdown menu and select Auto-Reports
  • 24. Other Tools Overview of the advance tools and features in the Infosec IQ platform
  • 25. Phishing Indicators Phishing Indicators is a type of education available in a PhishSim campaign. When a learner is phished, a new webpage will open up that has a screen shot of the email they were just phished with. On that screen shot, there will be call-outs as to what the learner should have noticed prior to click on the link. PhishNotify PhishNotify is a tool that allows employees to report potentially malicious emails, as well as simulated phishing messages sent through an Infosec IQ campaign. For more information, navigate to the PhishSim dropdown menu and select PhishNotify SCORMas a Service Infosec IQ allows you to add training modules to your Learning Management System (LMS) for commonly used training modules by providing downloadable SCORM packages for a non-interactive version of those modules. To view all of the modules available for download, navigate to the Content Library and select SCORM as a Service from the filter menu
  • 26. Publishing Assistant Converts any PDF into a training module with professional-grade voice-over narration. Using Publishing Assistant, you can select from dozens of narrator voices and languages. To access Publish Assistant, navigate to the AwareEd drop-down menu and select Publishing Assistant. Single Sign On(SSO) SSO for Learner Authentication works by connecting your Infosec IQ account to any Identity Provider that supports the SAML 2.0 standard. To begin, Go to Settings (gear icon) and select Learner Authentication from the menu. API Infosec IQ’s REST API allows you to Integrate important security awareness training metrics into your existing business intelligence systems and endpoint protection solutions.
  • 27. Support If you would like some one-on-one support with any of these tools, or with the platform, please contact our Support Team: Phone: 608.620.8838 Email: customer-support@infosecinstitute.com They will get you in contact with one of our Implementation and Support Specialists to assist you further.