Are you new to Infosec IQ? Are you feeling lost when navigating the platform? We are here to help! Check out the Infosec IQ Essentials slide deck to help manage your Infosec IQ platform. Check out a live recording to learn more about:
-Deploying simulated phishing and awareness training campaigns
-Managing learners and groups
-Pulling basic campaign reports
Identify risks and hazards that have the potential to harm any process or project. Use content-ready Risk Assessment PowerPoint Presentation Slides to analyse what can go wrong, how likely it is to happen, what potential consequences are, and how tolerable the identified is. With the help of ready-made risk assessment PowerPoint presentation slideshow, use control measures to eliminate or reduce any potential risk related situation. This deck comprises of various templates to control risks such as types of risks, risk categories, identify the risk categories, stakeholder engagement, stakeholders risk appetite, risk tolerance, procedure, risk management plan, risk register, risk identification, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk item tracking, risk impact and probability analysis, risk mitigation strategies, qualitative risk analysis, quantitative risk analysis, risk management process, risk management steps, and more. These templates are completely customizable. You can easily edit the color, text, icon and font size as per your need. Add or remove content, if needed. Grab this easy-to-understand risk assessment PowerPoint templates to figure out what could cause harm to the project, whether the hazards could be eliminated or not, what preventive measures should be taken to control the risks. Download risk assessment PPT slides now to execute the project easily. Behave in a down to earth fashion with our Risk Assessment Powerpoint Presentation Slides. Give them a glimpse of your fact based approach.
Slides for an overview lecture explaining how risk management and controls are the route to explaining why information security matters to business. Plus a bonus discussion of why incident handling is no longer optional.
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
This deck consists of total of thirty three slides. It has PPT slides highlighting important topics of Risk Assessment And Mitigation Plan Powerpoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.
We work with your IT department and internal IT security staff in order to analyze your system from a top-level perspective, looking for patterns to determine what’s driving the vulnerabilities we’ve identified.
Identify risks and hazards that have the potential to harm any process or project. Use content-ready Risk Assessment PowerPoint Presentation Slides to analyse what can go wrong, how likely it is to happen, what potential consequences are, and how tolerable the identified is. With the help of ready-made risk assessment PowerPoint presentation slideshow, use control measures to eliminate or reduce any potential risk related situation. This deck comprises of various templates to control risks such as types of risks, risk categories, identify the risk categories, stakeholder engagement, stakeholders risk appetite, risk tolerance, procedure, risk management plan, risk register, risk identification, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk item tracking, risk impact and probability analysis, risk mitigation strategies, qualitative risk analysis, quantitative risk analysis, risk management process, risk management steps, and more. These templates are completely customizable. You can easily edit the color, text, icon and font size as per your need. Add or remove content, if needed. Grab this easy-to-understand risk assessment PowerPoint templates to figure out what could cause harm to the project, whether the hazards could be eliminated or not, what preventive measures should be taken to control the risks. Download risk assessment PPT slides now to execute the project easily. Behave in a down to earth fashion with our Risk Assessment Powerpoint Presentation Slides. Give them a glimpse of your fact based approach.
Slides for an overview lecture explaining how risk management and controls are the route to explaining why information security matters to business. Plus a bonus discussion of why incident handling is no longer optional.
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
This deck consists of total of thirty three slides. It has PPT slides highlighting important topics of Risk Assessment And Mitigation Plan Powerpoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.
We work with your IT department and internal IT security staff in order to analyze your system from a top-level perspective, looking for patterns to determine what’s driving the vulnerabilities we’ve identified.
Emergency Evacuation Checklist
This checklist has been developed as an aid to the selection, design, development and
maintenance of Emergency Evacuation Plans, Escape Routes and Assembly Areas. It
is an integral component of the Emergency Planning methodology that is the basis of
the Total Continuity range of services and tools aimed at supporting those who are
responsible for the emergency evacuation of staff, customers, visitors and residents
from commercial, residential or public premises.
Enterprise Risk Management provides decision makers with a
realistic picture of likely
outcomes to their strategic initiatives by integrating risk into the cost benefit analysis of
all strategic investments.
Presenting this set of slides with name - Risk Management Module PowerPoint Presentation Slides. The stages in this process are Risk Management Module, Risk Management Framework, Risk Management Structure.
How to protect, detect, and respond to your threats.
This is an MSP centric talk exploring how to detect, protect, and respond to cyber security threats. We first walk through the cyber defense matrix, explore what security intelligence needs to be and emphasize the concepts with two case studies of BlackCat.
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
Showcase planned methods of hazard analysis with our content ready Risk Identification Process PowerPoint Presentation Slides. The hazard awareness process PowerPoint complete deck has forty-five PPT slides like risk management introduction, types of risks, risk categories, stakeholder’s management and engagement, risk appetite and tolerance, procedure, risk management plan, risk identification, risk register, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk items tracking, tools and practices, risk impact & profitability analysis, risk mitigations strategies, plans, qualitative and quantitative risk analysis, etc. All PowerPoint templates of risk assessment steps presentation are fully editable, edit them as per your specific project needs. The same risk management presentation deck can also be used to portray topics such as risk analysis, risk appetite, business continuity, risk-based auditing, hazard analysis, risk analysis, risk assessment and so on. Download this professionally designed risk management plan presentation deck to mitigate the risk. Our Risk Identification Process PowerPoint Presentation Slides are magnetic in nature. They will draw the right people to your cause.
An in-depth look at:
1. Disruptive Technology and its impact on organizations.
2. Need for a Security Operations Center (SOC) for the 21st century businesses
3. Designing and operating an effective SOC - what it takes to run a successful SOC starting from how we should prepare our minds in terms of approach to the actual implementation and operation.
4. Qualities any SOC Analyst should possess
5. Measuring the success of a SOC - We discuss critical factors to consider when determining the success of a SOC.
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
The webinar covers:
• The start of any Enterprise Risk Management Program
• The approach to developing a framework that will assist organizations to integrate RM into their enterprise-wide risk management systems
• The relationship between the foundations of the risk management framework and their objectives
Presenter:
This webinar was presented by M. Youssef K, an executive consultant & trainer with several qualifications. He is an accomplished expert with over 10 years’ experience in the field of risk management, project and program management, PRINCE 2, Agile, EVM, business process analysis and design, as well as operational and organizational excellence.
Link of the recorded session published on YouTube: https://youtu.be/9fO-JqENL0I
This presentation is mainly focused on swift csp framework v22 .I discussed about swift architecture,scope of work components, Assessment method and so on.
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec
Join Implementation Specialist Emma Waite for an implementation webinar designed specifically for Managed Services Providers (MSPs). Choose a date below to join an interactive session covering the following topics:
Navigating the Infosec IQ platform
Creating campaigns specifically for your clients
Whitelisting security appliances
Uploading and managing learners and licenses
And much more!
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4daniatrappit
Running Head: ADDIE Worksheet- HRMN 406 1
ADDIE Worksheet- HRMN 406 2
ADDIE worksheet – HRMN 406
Student Name and Number
Institutional Affiliation
Course Name and Number
Instructor’s Name
Assignment Due Date
1. Analyze
What is the learning need? The main need for this learning is to subject employees to training on how to manage cyber threats within the organization. The rate of cyber threats has increased, and therefore it is important to develop proactive measures to protect the organization (Ross, 2019).
Who are your learners? What are their backgrounds? What do they already know? My learners are the organization’s employees. They understand their responsibilities within the organization. For instance, they know it is their duty to ensure they have achieved the organization's objectives.
What do the learners need to know? Summarize the content of your training program. Employees will get to know dozens of things at the end of this training. First, they will know the main cyber threats the organization is likely to face. Secondly, they will learn how to prevent these threats from occurring (Ross, 2019). For example, they will learn how to examine software and determine whether viruses infect them, install firewalls in the computer system, and store data in the cloud, among others.
Delivery/Resources/Timeline. What is the delivery method? What resources will you need? What is your timeline? There are two strategies I will use to deliver the training. The first method is a physical interview whereby I will interact with the trainees. Secondly, I will use virtual training for those who cannot attend a physical interview. In order to deliver the interview, resources such as internet connection, computers, and writing materials (Ross, 2019). The training program will run for one week.
2. Design
Outcomes. At the end of the training, the learners will be able to: 1) run antivirus software in the computer system to detect whether viruses have infected the system. 2) Develop antivirus software. 3) Install a firewall in the system in order to prevent unauthorized access. 4) Update computer software (Ross, 2019).
Instructional methods. Describe activities and how learners will engage with the material: learners will engage with training resources through practicing using computers. For example, they will use computers to develop firewall software which they will later install in the system to enhance the system's security.
Assessment: What can the learners do/show/present/submit to show they have learned the content? There are several things that learners will do to show they have learned the content. First, they will install software on the computer system 2) Install firewall 3) Penetration testing to determine whether the software developed has weaknesses or not 4) Run antivirus software in th ...
Emergency Evacuation Checklist
This checklist has been developed as an aid to the selection, design, development and
maintenance of Emergency Evacuation Plans, Escape Routes and Assembly Areas. It
is an integral component of the Emergency Planning methodology that is the basis of
the Total Continuity range of services and tools aimed at supporting those who are
responsible for the emergency evacuation of staff, customers, visitors and residents
from commercial, residential or public premises.
Enterprise Risk Management provides decision makers with a
realistic picture of likely
outcomes to their strategic initiatives by integrating risk into the cost benefit analysis of
all strategic investments.
Presenting this set of slides with name - Risk Management Module PowerPoint Presentation Slides. The stages in this process are Risk Management Module, Risk Management Framework, Risk Management Structure.
How to protect, detect, and respond to your threats.
This is an MSP centric talk exploring how to detect, protect, and respond to cyber security threats. We first walk through the cyber defense matrix, explore what security intelligence needs to be and emphasize the concepts with two case studies of BlackCat.
Risk Identification Process PowerPoint Presentation SlidesSlideTeam
Showcase planned methods of hazard analysis with our content ready Risk Identification Process PowerPoint Presentation Slides. The hazard awareness process PowerPoint complete deck has forty-five PPT slides like risk management introduction, types of risks, risk categories, stakeholder’s management and engagement, risk appetite and tolerance, procedure, risk management plan, risk identification, risk register, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk items tracking, tools and practices, risk impact & profitability analysis, risk mitigations strategies, plans, qualitative and quantitative risk analysis, etc. All PowerPoint templates of risk assessment steps presentation are fully editable, edit them as per your specific project needs. The same risk management presentation deck can also be used to portray topics such as risk analysis, risk appetite, business continuity, risk-based auditing, hazard analysis, risk analysis, risk assessment and so on. Download this professionally designed risk management plan presentation deck to mitigate the risk. Our Risk Identification Process PowerPoint Presentation Slides are magnetic in nature. They will draw the right people to your cause.
An in-depth look at:
1. Disruptive Technology and its impact on organizations.
2. Need for a Security Operations Center (SOC) for the 21st century businesses
3. Designing and operating an effective SOC - what it takes to run a successful SOC starting from how we should prepare our minds in terms of approach to the actual implementation and operation.
4. Qualities any SOC Analyst should possess
5. Measuring the success of a SOC - We discuss critical factors to consider when determining the success of a SOC.
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
The webinar covers:
• The start of any Enterprise Risk Management Program
• The approach to developing a framework that will assist organizations to integrate RM into their enterprise-wide risk management systems
• The relationship between the foundations of the risk management framework and their objectives
Presenter:
This webinar was presented by M. Youssef K, an executive consultant & trainer with several qualifications. He is an accomplished expert with over 10 years’ experience in the field of risk management, project and program management, PRINCE 2, Agile, EVM, business process analysis and design, as well as operational and organizational excellence.
Link of the recorded session published on YouTube: https://youtu.be/9fO-JqENL0I
This presentation is mainly focused on swift csp framework v22 .I discussed about swift architecture,scope of work components, Assessment method and so on.
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec
Join Implementation Specialist Emma Waite for an implementation webinar designed specifically for Managed Services Providers (MSPs). Choose a date below to join an interactive session covering the following topics:
Navigating the Infosec IQ platform
Creating campaigns specifically for your clients
Whitelisting security appliances
Uploading and managing learners and licenses
And much more!
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4daniatrappit
Running Head: ADDIE Worksheet- HRMN 406 1
ADDIE Worksheet- HRMN 406 2
ADDIE worksheet – HRMN 406
Student Name and Number
Institutional Affiliation
Course Name and Number
Instructor’s Name
Assignment Due Date
1. Analyze
What is the learning need? The main need for this learning is to subject employees to training on how to manage cyber threats within the organization. The rate of cyber threats has increased, and therefore it is important to develop proactive measures to protect the organization (Ross, 2019).
Who are your learners? What are their backgrounds? What do they already know? My learners are the organization’s employees. They understand their responsibilities within the organization. For instance, they know it is their duty to ensure they have achieved the organization's objectives.
What do the learners need to know? Summarize the content of your training program. Employees will get to know dozens of things at the end of this training. First, they will know the main cyber threats the organization is likely to face. Secondly, they will learn how to prevent these threats from occurring (Ross, 2019). For example, they will learn how to examine software and determine whether viruses infect them, install firewalls in the computer system, and store data in the cloud, among others.
Delivery/Resources/Timeline. What is the delivery method? What resources will you need? What is your timeline? There are two strategies I will use to deliver the training. The first method is a physical interview whereby I will interact with the trainees. Secondly, I will use virtual training for those who cannot attend a physical interview. In order to deliver the interview, resources such as internet connection, computers, and writing materials (Ross, 2019). The training program will run for one week.
2. Design
Outcomes. At the end of the training, the learners will be able to: 1) run antivirus software in the computer system to detect whether viruses have infected the system. 2) Develop antivirus software. 3) Install a firewall in the system in order to prevent unauthorized access. 4) Update computer software (Ross, 2019).
Instructional methods. Describe activities and how learners will engage with the material: learners will engage with training resources through practicing using computers. For example, they will use computers to develop firewall software which they will later install in the system to enhance the system's security.
Assessment: What can the learners do/show/present/submit to show they have learned the content? There are several things that learners will do to show they have learned the content. First, they will install software on the computer system 2) Install firewall 3) Penetration testing to determine whether the software developed has weaknesses or not 4) Run antivirus software in th ...
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfVinay Londhe
This blog teslls you about the ultimate 6 steps guide to right customer training strategy.
1. Sketch Your Audience in Mind
2. Get in Touch with Your Content Specific Value
3. Create an Exciting Learning Environment (Keep it Simple!)
4. Use the Right Platform to Deliver Distinct Audiences
5. Gain Leverage From Your Ideal LMS Technology
6. Test, test, test your Training Program-Progress
As SaaS solutions continue to revolutionize various facets of business operations, the realm of employee training and onboarding is no exception. A reliable custom software development company makes use of cutting-edge technologies for SaaS-based solutions and provide businesses with unmatched flexibility, scalability, and accessibility.
For successful companies, sales training is not a “once in a year” affair. They recognize that learning needs to happen every day.
The market evolves. Competitors launch new products. The customer change preferences in a matter of weeks. Products change. New personnel take over.
The companies think: Can we have the extended field team skilling up every week? Can we have them go through a short burst (8 minute) training module every week - covering a product or a service or a critical skill?
Our experience proves that it is possible - under the right conditions.
Teams that have adopted to continuous learning have noticed 17% incremental premium mix and 7% incremental sales over teams that have not adopted the program*.
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignEI Design
The edge that a bespoke or custom developed course has over off-the-shelf course is well established. This article illustrate the power of bespoke eLearning to create sticky learning through 6 examples. Chosen examples address varied training needs like compliance, application simulation, and professional skills.
For more resource on eLearning, mLearning, and Gamification Please Visit - http://bit.ly/learning-blogs-EID
About EI Design
EI Design brings in 14 years of expertise servicing customers across 16 countries catering to their varied eLearning needs. We have delivered more than 6500 hours of eLearning development content (of which over 750 hours is for mobile learning). We also have a strong expertise in localising content in 26 global languages. Please visit - www.eidesign.net to know more.
Learn how to roll out a successful Cybersecurity Awareness Month program that boosts employee engagement all October (and beyond).
Join Infosec’s Emma Waite and Camille Raymond to learn:
- What employee-related risk data is needed to quantify success
- How to communicate your NCSAM plans to stakeholders
- The content and cadence appropriate to drive engagement
- Creative ways organizations are celebrating NCSAM
- How to continue the momentum after October
Witzscope is an intelligent learning management solution from Vanuston Intelligence. This online LMS software is cloud based. The software automates the entire learning and training process. This begins from naming a course and runs through course creation in accordance to your curriculum and can be completed with an evaluation.
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Human Capital Media
The average L&D organization spends $18,000 to produce one hour of content. Within a short time period, the value of this content depreciates as the subject matter becomes inaccurate, designs become dated, or technology advancements make the content completely inaccessible with current tools.
Attend our webinar, “The 5 Steps to Breathing Life Back into Stale Content!”, to learn how to maximize your training ROI and start developing a strategy for revitalizing legacy content and preparing content for future usability.
As a gift for attending the webinar, InfoPro Learning will deliver a free Content Asset Repository Worksheet, which your team can use to easily catalog learning assets (the first step in content modernization).
Attend this webinar to learn how to:
Calculate the total cost of your training portfolio
Catalog your learning assets using a free tool by InfoPro Learning
Extend the shelf-life of your existing content
Develop new content for future re-usability
AWS Certified DevOps Engineer: What it is and how to get certifiedInfosec
Watch the full webinar here: https://www.infosecinstitute.com/webinar/aws-certified-devops-engineer-what-it-is-and-how-to-get-certified/
Cloud infrastructure is the backbone of many organizations and services, and DevOps engineers are the professionals tasked with ensuring those systems are responsive, available, scalable and secure. The AWS Certified DevOps Engineer – Professional certification validates your skills in provisioning, operating and managing distributed AWS cloud systems.
Join us on March 27 at 11 a.m. Central to learn how this AWS certification can benefit your career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified DevOps Engineer exam (DOP-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
- Plus Q&A from live attendees
AWS Cloud Operations Administrator: What it is and how to get certifiedInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/aws-certified-sysops-administrator/
As the AWS cloud market continues to expand, professionals are needed to administer those systems. AWS Certified Cloud Operations Administrator training prepares you to earn your AWS Certified SysOps Administrator certification — and validates your skills in deploying, managing and operating AWS workloads.
Join us to learn how this AWS certification can benefit your IT and cybersecurity career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified Cloud Operations/SysOps Administrator exam (SOA-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
Watch the webinar: https://www.infosecinstitute.com/webinar/aws-certified-security---specialty-what-it-is-and-how-to-get-certified/
Cloud security skills are among the most in-demand in 2024, and if you work in the cloud, there’s a good chance it involves AWS. The AWS Certified Security - Specialty certification validates your skills in creating and implementing AWS cloud security solutions.
Join us on March 13 at 11 a.m. Central to learn how this AWS certification can benefit your cybersecurity career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified Security exam (SCS-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
- Plus Q&A from live attendees
Watch the webinar here: https://www.infosecinstitute.com/webinar/aws-certified-solutions-architect-what-it-is-and-how-to-get-certified/
Amazon Web Services (AWS) is the market leader for cloud infrastructure, and the AWS Certified Solutions Architect – Associate certification validates your knowledge and skills in designing secure, resilient, high-performing and cost-optimized architectures.
Join us to learn how this AWS certification can benefit your career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
What’s on the AWS Certified Solutions Architect exam (SOA-C02)
Career paths AWS certification holders
Ways you can train and get certified
This webcast is part of the Infosec AWS Training Series: https://www.infosecinstitute.com/resources/?q=aws&Type=Webcast+and+video
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec
Watch the webinar: https://www.infosecinstitute.com/webinar/infosec-and-aws-a-new-way-to-train-for-your-aws-certification/
Amazon Web Services (AWS) certifications are some of the most pursued in the IT and cybersecurity industry, by both employers and professionals. And now, there’s a new way to train for them with Infosec.
Join us to learn about the new partnership between AWS and Infosec, making Infosec an authorized live boot camp training provider for AWS certifications. You’ll learn:
- How AWS certification can boost your career
- Which AWS certification is right for you
- How the new AWS live boot camps will work
- Plus Q&A from live attendees
This webcast is part of the Infosec AWS Training Series: https://www.infosecinstitute.com/resources/?q=aws&Type=Webcast+and+video
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
Watch the full webinar (and demo) here: https://www.infosecinstitute.com/webinar/how-chatgpt-and-ai-are-changing-cybersecurity-forever/
Artificial intelligence (AI) technologies are reshaping both how cybersecurity is done and how people learn cybersecurity. In this live demonstration, Infosec’s Keatron Evans will demonstrate how you can use ChatGPT to perform cybersecurity functions and teach yourself new skills — right now.
Join us on February 23 at 11 a.m. Central to get a practical, hands-on approach around how to use AI for your cybersecurity needs. You’ll learn:
- How malicious actors use AI tools like ChatGPT
- Ways for cybersecurity professionals to get started with AI
- How AI tools can help you learn quicker and better
- Plus Q&A from live attendees
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/comptia-security-everything-you-need-to-know-about-the-sy0-701-update/
CompTIA’s Security+, the most popular cybersecurity certification in the world, is getting an overhaul! The updated exam (from SY0-601 to SY0-701) re-aligns the certification to match the most in-demand entry-level cybersecurity skills and trends heading into 2024.
Join Patrick Lane, Director of Certification Product Management at CompTIA, to learn how the Security+ certification is evolving so it remains the “go-to” certification for anyone trying to break into cybersecurity. You’ll learn about:
- Evolving Security+ domain areas and job skills
- Common job roles for Security+ holders
- SY0-601 and SY0-701 exam timelines
- Tips to pass the updated Security+ exam
- Plus Security+ questions from live viewers
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/comptia-cysa-certification-changes-everything-you-need-to-know/
Information security analyst is one of the fastest-growing job categories in the U.S., with 35 percent overall growth expected by 2031. CompTIA’s Cybersecurity Analyst+ (CySA+) is one of the most popular certifications related to the role — and it’s getting an update in 2023 to align with the most in-demand knowledge and skills requested by employers.
Join Patrick Lane, Director of Certification Product Management at CompTIA, to learn everything you need to know about the latest CySA+ certification and exam (CS0-003) updates, including:
- Evolving security analyst job skills
- Common job roles for CySA+ holders
- What’s changed from CS0-002 to CS0-003
- Tips to pass the updated CySA+ exam
- Plus CySA+ questions from live viewers
Skills training value: How to differentiate your staff and your organization ...Infosec
Watch the full webinar here: https://event.on24.com/wcc/r/4125122/E0E3F3F43BABD48134E3909C4577F5EA
Hiring skilled people is hard. Once you get them, you want to retain them — and increase their value to your customers. Save your spot to learn more about:
- Challenges with getting and retaining internal talent
- How better skillsets affect margin/profitability
- Using Infosec Skills to attract highest-quality hires
- Using Infosec Skills to upskill your internal team
- Reselling Infosec Skills to your end-user
Learning ≠ Education: How people really learn and what it means for security ...Infosec
Emotion and passion are the two most essential elements in understanding how people learn. Often, the initial response to security threats is throwing technology at the problem. But as we know, you can’t fix all of your security issues without understanding the role humans play in the process.
Join Nick Shackleton-Jones — 30-year learning and development vet, Former CLO at Deloitte UK and CEO and Founder of Shackleton Consulting — to better understand:
- The difference between learning and education
- What really drives how employees learn
- How to develop a growth mindset that truly changes employee behavior
Watch the full webcast here: https://www.infosecinstitute.com/webinar/adult-learning-security/
Security awareness training - 4 topics that matter mostInfosec
National Cybersecurity Awareness Month (NCSAM) is right around the corner. Now’s the time to level up your security awareness training program — and instill best practices in employees that will help keep them (and your organization) secure year-round.
Join us to learn about the four key employee behaviors for NCSAM 2022. All registrants will receive a free Cybersecurity Awareness Month Toolkit, which includes:
1 training module & assessment
5 posters & infographics
1 employee presentation
4 email templates
And more
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
As threat hunters, you already know staying ahead of the adversary demands a proactive approach to threat detection and response. Don your virtual threat hunting gear and join Infosec Principal Security Researcher Keatron Evans as he goes sleuthing for cyber threats.
Join us for practical threat hunting insights and career recommendations, including:
Threat hunting knowledge and skills to accelerate your career
How to help clients navigate the threat hunting toolbox and prioritize technology investments
Live demos of notoriously hard-to-detect adversarial behavior like memory-only malware and living-off-the-land techniques
One lucky attendee will win a free year of Infosec Skills. Complete the form to save your seat!
P.S. Don’t miss our novice-level threat hunting session: Threat hunting foundations: People, process and technology.
Threat hunting foundations: People, process and technology.pptxInfosec
Ever wonder what threat hunting is all about? Join Infosec Principal Security Researcher Keatron Evans as he breaks down the basics of what it’s like to have a career hunting down potential cyber threats.
Join us on for an inside look at a day in the life of a threat hunter, including:
Why threat hunters are more critical today than ever before
Knowledge and skills needed to drive threat hunting success
Live demos of essential threat hunting skills and tools used to detect and mitigate adversarial behavior
One lucky attendee will win a free year of Infosec Skills. Complete the form to save your seat!
P.S. Want to go even deeper into threat hunting? Don’t miss our advanced threat hunting session on June 28, Join the hunt: Threat hunting for proactive cyber defense.
It’s been more than a decade since Marc Andreessen popularized the idea that “every company needs to become a software company.” But in 2022, just being a software company isn’t enough; you need to become a secure software company.
That’s why Ted Harrington created a new Infosec Skills learning path based on his best-selling book, “Hackable: How to Do Application Security Right.” Whether you create code, secure systems or manage organizational risk, understanding application security has become a must-have skill. Join us to learn how to:
Avoid common application security mistakes
Implement best practices to secure software systems
Create the business case for security as a competitive edge
Plus, get your live questions answered by Ted
Every registrant will get a free copy of Ted’s new ebook, “How to secure your software faster and better.”
A public discussion about privacy careers: Training, certification and experi...Infosec
The word privacy can have so many meanings. Whether personal, professional or procedural, privacy can be a state of being, an action that requires compliance or a created space of safety.
Join Infosec Skills authors Chris Stevens, John Bandler and Ralph O’Brien as they discuss the intersection of privacy and cybersecurity. They’ll help you walk a path that will lead to an engaging career as a privacy specialist — a job role that grows with more opportunities year after year!
The panel will discuss:
Privacy as it relates to cybersecurity
Privacy certifications that align with your career path
Best practices for studying for IAPP certification exams
Tips for getting experience in the field of privacy
Interviewing for the privacy position you’ve been searching for
Plus your live questions on privacy as a career
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
Intrusion detection is a foundational skill for many cybersecurity careers. Learn how intrusion detection works in action in this live webcast. Then take these free intrusion detection system (IDS) tools and start building your skills.
Join Infosec Skills author Mark Viglione on March 8 at 11 a.m. CST to learn all about:
What is intrusion detection?
How intrusion detection fits into different career paths
Live demo of Zeek for log analysis
Live demo of Elastic SIEM for incident response
Plus your live intrusion detection and career questions
There are 4.19 million cybersecurity professionals worldwide, but another 2.7 million are needed for organizations to adequately defend their critical assets, according to (ISC)². Learn how you can get started in cybersecurity and build a career in this lucrative and rewarding field.
CompTIA PenTest+: Everything you need to know about the examInfosec
Penetration testers find and report vulnerabilities before they can be exploited. CompTIA’s PenTest+ is one of the best certifications to validate those skills, and it’s being updated to align with the most up-to-date hacking and pentesting skills requested by employers in 2021.
CompTIA CASP+ | Everything you need to know about the new examInfosec
Want to be an advanced cybersecurity practitioner? Then CompTIA’s CASP+ certification may be the perfect fit for you. The popular certification is getting an overhaul heading into 2022 to ensure it validates the most relevant and in-demand skills — from security architecture and operations to engineering and governance.
CompTIA network+ | Everything you need to know about the new examInfosec
CompTIA’s Network+ is one of the most popular entry-level IT and cybersecurity certifications available, and it’s got an update in September 2021. The new exam (from N10-007 to N10-008) will align the certification with the most in-demand job trends to ensure Network+ holders have the skills necessary to succeed in 2022 and beyond.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
3. Agenda
1. Overview of Infosec IQ
2. Navigating the Dashboard
3. Managing Learners
4. PhishSim Campaigns
5. AwareEd Campaigns
6. Reporting
7. Other Tools
4. Overview of Infosec IQ
Infosec IQ provides Security Awareness training through simulated phishing messages,
interactive training videos, and quizzes.
PhishSim: Includes 1,000s of phishing templates in a variety of attack types and
difficulty levels. New templates are added each week, helping your organization stay
ahead of the latest threats.
AwareEd: Our massive library of industry- and role-based training resources is
updated weekly, helping you deliver fresh, relevant training to every member of your
organization no matter the style and tone you need
5. Navigating the Dashboard
• Core Behavior Compliance Infosec IQ’s training
modules are linked to one of the Core Behaviors
outlined by National Institute of Standards and
Technology (NIST)
• Click Rate This chart shows an overall percentage
of learners who fell for the different email attack
types in all PhishSim campaigns
• What’s New Provides you with updates to features
or new functionality in the platform.
• Subscription Settings Allows you to view your
renewal date, learner seat utilization, and current
plan.
• Join the Community! TechExams Community is a
space for IT professionals to share problems and
find solutions.
6. Managing Learners
Adding learners to the platform
• Active Directory Sync
• CSV File Import
• Manual
Groups
• Static
• Dynamic
Learner’s Profile
• Letter Grade
• Timeline Events
8. Simulated Phished Email Templates
Navigating the email template page
Email Template Tabs
• All: This includes all available email templates under each tab
• Personal: These are all the templates that you have cloned or built from scratch
• Contributed: These are templates that other Infosec IQ customers have shared
• System: These are templates that the Infosec IQ Content Team have pre-built
Previewing an email template An admin can preview an email template right in the platform or
or email a preview to themselves.
Cloning an email template This will give the admin the ability to make changes to an existing
template in the platform. Once saved, the email template can be found in the Personal tab.
9. Customizing Email Templates
From Email: You can change the
from email by selecting the
settings gear
Attack Type: This is where you
can change the attack type of
that specific email
Education: This is where you can
change the education that a
learner views after they get
phished
Tools: This will allow you to
edit/add source code (HTML) to
the email template.
Preview in Browser: This will
allow you to preview as a learner,
as well as send an email preview
to yourself
10. Email Attack Types
Drive-by: This is where a learner clicks on any link
in the PhishSim email that they receive
Attachment: This will add an attachment to the
PhishSim Email that will track if a learner enables
macros on that document
Data Entry: After a learner clicks on a link in the PhishSim
email, they will be brought to a login page. SecurityIQ
doesn’t track the credentials being entered, as those are
blank key strokes
Business Email Compromise: These templates are requesting
specific information for that learner and tracking to see if the
responded back with sensitive information
To view a complete list of Data
Entry Login Sites, please navigate
to the Data Entry Template
section in SecurityIQ
11. PhishSim Education
• To view all of the different types of education available for a PhishSim campaign, locate the
Education section under the PhishSim menu. On this page you will notice:
– Five interactive AwareEd training video options
– Pre-built static education pages
• You can build custom education pages by selecting “New Education” in the top right corner.
There are two other education options that you can assign learners to outside of Interactive and
Static education pages
Phishing Indicators
When a leaner gets phished, they will be taken to a
webpage that has a screen shot of the email that they
were just phished on. Included on that screen will be
specific call-outs to what the learner should have
noticed prior to clicking on the link.
External Links
After a learner gets phished, they will be redirected to
an external link. To get this set-up, you will select
“New Education” and insert the external URL that
you will want to bring learners to.
12. PhishSim Batteries
A Battery is a way to group specific email
templates to point at a campaign. Some
Infosec IQ customers group emails based
on certain commonalities such as method,
education, etc. The Infosec IQ platform
has pre-built batteries that an admin can
use or clone to customize.
13. PhishSim Campaigns
• After you have your Battery built, you are ready to schedule your campaign. To create and schedule a
PhishSim campaign, navigate to Campaigns under PhishSim. On this page select “New Campaign”:
– Campaign Name: This isn’t visible to the learners
– Branding: Your default brand should be automatically selected. If you have multiple branding options, you can
select the specific brand you want shown
– Learners: This is where you can choose if you would want the campaign to go to…
• All Learners
– A Specific Learner Group
– Individual Learners
• Content: In this section you can select a specific template, battery, or category that you would like to send
emails from simply by typing in the name.
• Battery Options: By default, the learner will receive all the templates that are selected. You can also
choose how many templates each learner receives out of the battery by selecting “Send Random Phishing
Templates”. This option is recommended especially if using Categories, as some of our categories have
20+ templates
14. PhishSim Campaigns Continued
• Phished Actions
– Notification: This is a follow up email that gets sent to a phished learner that you can customize. You can also turn this
follow up email off down in “Schedule”
– Group: Prior to building your campaign, you can create a group that you would like phished learners to be added to
• Learner Replies:
– Used for Business Email Compromise attacks.
– Tracks total number of replies as well as which emails your learners responded to.
– Advance options allow for viewing the reply and for matching strings or patterns in responses.
• Schedule
– Send Phishing Attacks Over Time: This is where you can schedule out the email templates to be delivered to the learners
over a period of time. For example: if you run a campaign for 30 days and you have three email templates going to each
learner – the learner will receive those three email templates at random over the next 30 days
– Send Phishing Attacks at One Time: This option will allow you to send out all the templates at once. This option is great if
you want to quickly test the email templates to see how they look – prior to deploying the campaign to all learners. To
out a quick test campaign, all you will need to do is select any time in the past. Once you schedule the campaign, the
emails will get sent out as soon as our servers queue them up.
16. AwareEd Campaigns
What is an AwareEd Campaign? An
AwareEd campaign consists of
interactive training modules and/or
assessments that you can enroll
learners in for a certain period.
In this section, we will cover:
– How to navigate the Content Library
– Build Courses
– Create a Campaign
17. Navigating the Content Library
This Module is available for SCORM
as a Service Download
Indicates what languages that
module/assessment have been
translated in
Allows you to preview the
module/assessment
Adds module/assessment to Course
Builder
Assessment
Assets: This counts the total number of modules, assessments,
program resources that we have. If the asset is available in
multiple languages, those are counted as individual assets.
Search: Allows you to search for a specific content
Filter: You can filter on different areas to help you select content
Course Builder: This appears on the left-hand side of the screen
when you add a module/assessment to a course (see slide 17)
18. Course Builder
• The Course Builder will appear in the Content Library
once you have selected the “+” symbol on any of our
modules and assessments.
• Course Name: This is visible to the learner
• Module Order: As you add content, it will be added in the
module order section. You can rearrange the order of the
content by dragging and dropping. You can also remove
any content by clicking the “x” icon.
• Course Statistics: This will give you an overview of the
number of modules in the course, total length, and the
number of exercises included. Please note that the total
length is the total length of the video + how long it takes
the average learner to complete the exercises; it does not
take in to account how long it takes learners to complete
assessments.
• Once you select “Save Course”, you can view and edit
your course by navigating to AwareEd > Courses
19. Campaign Creation
Once you have your course built with the selected modules and/or assessments, you are now ready to create your campaign. To accomplish this,
please navigate to AwareEd and select “campaigns”. Once on the campaigns page, click “new campaign”.
Campaign Name: This isn’t visible to the learner, but will help you remember what content you deployed
Branding: The branding option you select will be visible in the beginning of an AwareEd Module, on a learner’s course page, and in the
notification emails that they receive
Learners: In this section you can select whether you want the campaign to be pushed out to:
– All Learners
– Learner Groups
– Individual Learners
Courses: In this section, you can locate the course that you would like to use by clicking on the dropdown menu. You can also select a default
language from the dropdown. Please note that all of our modules are not available in every language, as well as the learner has the opportunity
to select their preferred language on their course page
– Begin Modules upon Page Upload: This will automatically start the videos
– Require learners to retake failed assessments: If you have included an assessment, this will give the learner the opportunity to retake an
assessment
– Restrict access after campaign run completion: By default, learner will still have access to the training after the campaign run is
complete. Select this option if you would like to restrict the learner from taking the training after the campaign has finished
20. AwareEd Campaign Creation Continued
Notifications: These are emails that get sent out to the learner during the lifespan of the campaign. All of these notifications can be
customized by navigating to the “Notifications” section under AwareEd
– Enrollment Notification: Once you enroll the learners in a campaign, they will all receive an enrollment email. In this email, this will
contain their unique training link that will bring them to the course page. Please note that no username or password is required for
learners to access the training
– Start and Finish Reminders: These emails will get sent out after the number of allotted days have passed
– Completion Notification: A learner will receive this once they have completed their training
o Completion Certificate: This will appear on the learner’s course page once they have completed all of the training. This
certificate cannot be customized at this time
Schedule: In this section you can select what specific date you would like your campaign to start on, and how many days you would like it
to run for.
– Repeat: If you would like to repeat your campaign for additional runs, you can do so here. For example, if you initially scheduled
the campaign for 30 days and had the repeat set to “1” – it would repeat the campaign for one additional 30 day run
Reset Enrollment: This is only applicable if you have set up an EPP Integration
Reset Learner Progress: If you have multiple runs in a campaign, the learners progress will reset once the new campaign run starts. If
you would like to include only those learners who did not complete the training in the first box, you will need make sure the box isn’t
checked.
22. Campaign Results Report
After you have launched the campaign, you can get real-time campaign information by:
– Hovering over the campaign name and select “Details”
– Then Select the bar graph on the right-hand side
– This page will give you a detailed breakdown of each learner in the campaign and their results
This will generate a
csv report that
contains the
information on this
page
23. Infosec IQAuto-Reports
Once a campaign is launched, Infosec IQ automatically creates a report
that is specific to that campaign. You can access the auto-report by either
clicking on the status:
Or, navigating to the Reports dropdown menu and select Auto-Reports
25. Phishing Indicators
Phishing Indicators is a type of education available in a PhishSim campaign. When a
learner is phished, a new webpage will open up that has a screen shot of the email they
were just phished with. On that screen shot, there will be call-outs as to what the
learner should have noticed prior to click on the link.
PhishNotify
PhishNotify is a tool that allows employees to report potentially malicious emails, as
well as simulated phishing messages sent through an Infosec IQ campaign. For more
information, navigate to the PhishSim dropdown menu and select PhishNotify
SCORMas a Service
Infosec IQ allows you to add training modules to your Learning Management System
(LMS) for commonly used training modules by providing downloadable SCORM
packages for a non-interactive version of those modules. To view all of the modules
available for download, navigate to the Content Library and select SCORM as a Service
from the filter menu
26. Publishing Assistant
Converts any PDF into a training module with professional-grade voice-over
narration. Using Publishing Assistant, you can select from dozens of narrator
voices and languages. To access Publish Assistant, navigate to the AwareEd
drop-down menu and select Publishing Assistant.
Single Sign On(SSO)
SSO for Learner Authentication works by connecting your Infosec IQ
account to any Identity Provider that supports the SAML 2.0 standard. To
begin, Go to Settings (gear icon) and select Learner Authentication from the
menu.
API
Infosec IQ’s REST API allows you to Integrate important security awareness
training metrics into your existing business intelligence systems and
endpoint protection solutions.
27. Support
If you would like some one-on-one support with any of these tools, or with the platform, please
contact our Support Team:
Phone: 608.620.8838
Email: customer-support@infosecinstitute.com
They will get you in contact with one of our Implementation and Support Specialists to assist you
further.