SlideShare a Scribd company logo
1 of 7
Download to read offline
Copyright © 2014 Security Compass. All rights reserved. 1
Security Compass Training is the only
eLearning that wants to understand your
teams.
Security that’s fun, smart and context
relevant.
Why choose Security Compass Training?
5 Key Differentiators of Security Compass eLearning
Copyright © 2014 Security Compass. All rights reserved. 2
Security Compass eLearning isn’t like other CBTs
out there. We place emphasis on our proven
methodology of modular, focused content.
Each course is divided into 5-15 minute modules
short enough to learn in one sitting. This allows
people to learn, then get back to the job because
we know your teams are busy.
WE HELP SAVE TIME & MONEY
XSS – Completed!
SQL injection
Parameter manipulation
Open redirects – Completed!
…
1
Copyright © 2014 Security Compass. All rights reserved. 3
We know that one thing that turns people off
with eLearning, is having to go through content
they already understand.
If students know the content, they can jump to
the quiz to test their understanding. This
ensures we help fill in knowledge gaps and
recognize that every student has different
needs.
KEEPING YOUR TEAMS ENGAGED
2
Copyright © 2014 Security Compass. All rights reserved. 4
Our customers rave about how our
methodology enhances learning by helping
people find out on their own what they need
to know.
Many jump to the quiz first, then realize that
they don’t know as much as they thought,
and go back to learn more.
A SMARTER METHODOLOGY
3
Copyright © 2014 Security Compass. All rights reserved. 5
We teach each and every one of our courses
with the goal of reducing business risk.
This isn’t a content dump. These are
actionable scenarios your teams may face in
the real world to see how security concepts
relate to reducing risk in your organization.
RISK BASED APPROACH
4
Copyright © 2014 Security Compass. All rights reserved. 6
Security Compass offers optional pre-
assessments and post-assessments, that
provide you with the ability to baseline and
then measure knowledge growth for your
students.
OPTIONAL METRICS PROGRAM
5
Copyright © 2014 Security Compass. All rights reserved. 7
To see our course curriculum and learn more
about us, visit us at www.securitycompass.com
If you have any questions, please e-mail us at
training@securitycompass.com
We can’t wait to hear from you!
Contact Us

More Related Content

More from Oliver Ng

FAQ - What kind of support do you offer?
FAQ - What kind of support do you offer?FAQ - What kind of support do you offer?
FAQ - What kind of support do you offer?
Oliver Ng
 
FAQ - Please describe the metrics program
FAQ - Please describe the metrics programFAQ - Please describe the metrics program
FAQ - Please describe the metrics program
Oliver Ng
 
FAQ - How often are courses updated?
FAQ - How often are courses updated?FAQ - How often are courses updated?
FAQ - How often are courses updated?
Oliver Ng
 
FAQ - How do I pull reports for my students?
FAQ - How do I pull reports for my students?FAQ - How do I pull reports for my students?
FAQ - How do I pull reports for my students?
Oliver Ng
 
FAQ - How does LMS exporting work if I want to host courses?
FAQ - How does LMS exporting work if I want to host courses?FAQ - How does LMS exporting work if I want to host courses?
FAQ - How does LMS exporting work if I want to host courses?
Oliver Ng
 
FAQ - How do students register to LMS
FAQ - How do students register to LMSFAQ - How do students register to LMS
FAQ - How do students register to LMS
Oliver Ng
 
7 reasons to choose Security Compass
7 reasons to choose Security Compass7 reasons to choose Security Compass
7 reasons to choose Security Compass
Oliver Ng
 

More from Oliver Ng (7)

FAQ - What kind of support do you offer?
FAQ - What kind of support do you offer?FAQ - What kind of support do you offer?
FAQ - What kind of support do you offer?
 
FAQ - Please describe the metrics program
FAQ - Please describe the metrics programFAQ - Please describe the metrics program
FAQ - Please describe the metrics program
 
FAQ - How often are courses updated?
FAQ - How often are courses updated?FAQ - How often are courses updated?
FAQ - How often are courses updated?
 
FAQ - How do I pull reports for my students?
FAQ - How do I pull reports for my students?FAQ - How do I pull reports for my students?
FAQ - How do I pull reports for my students?
 
FAQ - How does LMS exporting work if I want to host courses?
FAQ - How does LMS exporting work if I want to host courses?FAQ - How does LMS exporting work if I want to host courses?
FAQ - How does LMS exporting work if I want to host courses?
 
FAQ - How do students register to LMS
FAQ - How do students register to LMSFAQ - How do students register to LMS
FAQ - How do students register to LMS
 
7 reasons to choose Security Compass
7 reasons to choose Security Compass7 reasons to choose Security Compass
7 reasons to choose Security Compass
 

Recently uploaded

4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
Cara Menggugurkan Kandungan 087776558899
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Abdulsamad Lukman
 

Recently uploaded (20)

Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
 
Crypto Quantum Leap - Digital - membership area
Crypto Quantum Leap -  Digital - membership areaCrypto Quantum Leap -  Digital - membership area
Crypto Quantum Leap - Digital - membership area
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered Prompts
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 

Security Compass eLearning key differentiators

  • 1. Copyright © 2014 Security Compass. All rights reserved. 1 Security Compass Training is the only eLearning that wants to understand your teams. Security that’s fun, smart and context relevant. Why choose Security Compass Training? 5 Key Differentiators of Security Compass eLearning
  • 2. Copyright © 2014 Security Compass. All rights reserved. 2 Security Compass eLearning isn’t like other CBTs out there. We place emphasis on our proven methodology of modular, focused content. Each course is divided into 5-15 minute modules short enough to learn in one sitting. This allows people to learn, then get back to the job because we know your teams are busy. WE HELP SAVE TIME & MONEY XSS – Completed! SQL injection Parameter manipulation Open redirects – Completed! … 1
  • 3. Copyright © 2014 Security Compass. All rights reserved. 3 We know that one thing that turns people off with eLearning, is having to go through content they already understand. If students know the content, they can jump to the quiz to test their understanding. This ensures we help fill in knowledge gaps and recognize that every student has different needs. KEEPING YOUR TEAMS ENGAGED 2
  • 4. Copyright © 2014 Security Compass. All rights reserved. 4 Our customers rave about how our methodology enhances learning by helping people find out on their own what they need to know. Many jump to the quiz first, then realize that they don’t know as much as they thought, and go back to learn more. A SMARTER METHODOLOGY 3
  • 5. Copyright © 2014 Security Compass. All rights reserved. 5 We teach each and every one of our courses with the goal of reducing business risk. This isn’t a content dump. These are actionable scenarios your teams may face in the real world to see how security concepts relate to reducing risk in your organization. RISK BASED APPROACH 4
  • 6. Copyright © 2014 Security Compass. All rights reserved. 6 Security Compass offers optional pre- assessments and post-assessments, that provide you with the ability to baseline and then measure knowledge growth for your students. OPTIONAL METRICS PROGRAM 5
  • 7. Copyright © 2014 Security Compass. All rights reserved. 7 To see our course curriculum and learn more about us, visit us at www.securitycompass.com If you have any questions, please e-mail us at training@securitycompass.com We can’t wait to hear from you! Contact Us