This document summarizes a phishing training program from TeachPrivacy.com.
The full training course takes 12 minutes to complete and covers: (1) what phishing is and its dangers, (2) how to spot phishing attempts, and (3) what to do if you suspect phishing. It includes videos and quizzes.
There is also a condensed 6-minute version covering the same topics in less depth with fewer quizzes.
Both versions aim to raise awareness of phishing dangers and teach people to identify warning signs of phishing emails and calls.
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
In this free class, we talked about how to select a VPN that meets your needs, and some other simple steps you can take to create a more secure online experience on your computer and phone, including Signal and other basic uses of encryption. We'll also discuss Wikileaks Vault7 release, and what it means for both activists and everyday computer users.
Computer Security For Activists & Everyone (Oct 2018)Kit O'Connell
In an age of mass surveillance and increasingly commonplace hacking, protecting yourself online can feel overwhelming. This class is designed to help people get a handle on their devices, including computers and smartphones.
Topics include "threat modeling," which helps you understand what steps to take when. Also: concrete solutions for encrypted messaging, secure email, and protecting your passwords & data. Plus some simple protest tips.
This class is designed for experienced activists, newcomers, and anyone who wants to be safer online.
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
In this free class, we talked about how to select a VPN that meets your needs, and some other simple steps you can take to create a more secure online experience on your computer and phone, including Signal and other basic uses of encryption. We'll also discuss Wikileaks Vault7 release, and what it means for both activists and everyday computer users.
Computer Security For Activists & Everyone (Oct 2018)Kit O'Connell
In an age of mass surveillance and increasingly commonplace hacking, protecting yourself online can feel overwhelming. This class is designed to help people get a handle on their devices, including computers and smartphones.
Topics include "threat modeling," which helps you understand what steps to take when. Also: concrete solutions for encrypted messaging, secure email, and protecting your passwords & data. Plus some simple protest tips.
This class is designed for experienced activists, newcomers, and anyone who wants to be safer online.
Use this catalog to browse Trustwave’s security education offerings, including security awareness training for all staff and secure software development courses for technical staff. If you have questions, please contact us.
Department of Defense Service Members TrainingOCONUS.docxsalmonpybus
Department of Defense
Service Members Training
OCONUS Version
Introduction
Slide #‹#›
Antiterrorism Level I Awareness Training
1
Note to Instructors:
This training briefing is provided by the JCS J3 Deputy Director for Antiterrorism/Force Protection (DD AT/FP), as a resource for unit training managers. For questions or comments related to this training, please send an email message to [email protected]
This Antiterrorism Level I training brief was designed to provide you an interactive approach to meeting the training objectives of Antiterrorism Awareness Training for service members in an OCONUS environment. Due to the comprehensive nature of this brief, a thorough discussion of each teaching point will increase the time needed to conduct this training to well over ninety minutes. Suggestions to keep the training session to within one hour include:
Solicit responses to questions posed in the training by asking for a show of hands regarding the choices – or ask if anyone would offer their response to the question.
Selectively discuss responses to questions that you believe are the most relevant to their situation or where trainees express questions or particular interest.
Do not explain why incorrect choices are wrong unless specifically asked. The reason for many of the incorrect answers will be obvious to your students, and you should not go into detail on them unless a question is raised from one of the students.
Use selected items from the list in the section of the briefing on historical examples of terrorist attacks. You may want to ask your audience if they have a particular interest or questions about any event on the list. You should have time to go through several examples.
It is also highly recommended that you thoroughly familiarize yourself with this briefing, both in regards to content and animation/slide layout. The briefing has a number of slide builds to expose training information in sequence. You will want to anticipate these to assure smooth flow of presentation. Also, if you plan to print a copy of the briefing, it is recommended that you unselect the grayscale option on the print menu.
About This Training
Designed by JCS in coordination with OSD and Services
Designed to increase awareness of terrorism and improve ability to apply personal protective measures
Meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16
Complements Web-based and CD-ROM training
Introduction
Slide #‹#›
Antiterrorism Level I Awareness Training
2
The purpose of this training is to increase your awareness of terrorism and to improve your ability to apply personal protective measures. Completion of this training meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16. The training program also provides links to resources you can use in the future, such as TADWeb (a database of previous terrorist acts), the State Department Travel Warnings .
This is a Powerpoint that highlights the usefulness of using short video tutorials as a form of advertising on social media. This is done by analyzing the data that was collected from conducting a twenty question survey.
A Vulnerability analyst detects vulnerabilities in networks and software and then takes the necessary steps to manage security within the system.
https://www.infosectrain.com/courses/ceh-v11-certification-training/
Psychological Safety and Remote Work by Matthew PhilipBosnia Agile
Over the last four years, the world has experienced an unprecedented shift to remote and hybrid work environments. This poses questions for those interested in high-performing teams, because physical distance from our teammates has created challenges to fostering and increasing psychological safety.
This talk presents original research on and explores the relationship of remote environments and psychological safety. Participants will learn about factors that impact safety in a remote environment and ways to promote safety in remote and hybrid teams, as well as implications for leadership, teamwork and generative work across all environments, in-person, hybrid and remote.
Use this catalog to browse Trustwave’s security education offerings, including security awareness training for all staff and secure software development courses for technical staff. If you have questions, please contact us.
Department of Defense Service Members TrainingOCONUS.docxsalmonpybus
Department of Defense
Service Members Training
OCONUS Version
Introduction
Slide #‹#›
Antiterrorism Level I Awareness Training
1
Note to Instructors:
This training briefing is provided by the JCS J3 Deputy Director for Antiterrorism/Force Protection (DD AT/FP), as a resource for unit training managers. For questions or comments related to this training, please send an email message to [email protected]
This Antiterrorism Level I training brief was designed to provide you an interactive approach to meeting the training objectives of Antiterrorism Awareness Training for service members in an OCONUS environment. Due to the comprehensive nature of this brief, a thorough discussion of each teaching point will increase the time needed to conduct this training to well over ninety minutes. Suggestions to keep the training session to within one hour include:
Solicit responses to questions posed in the training by asking for a show of hands regarding the choices – or ask if anyone would offer their response to the question.
Selectively discuss responses to questions that you believe are the most relevant to their situation or where trainees express questions or particular interest.
Do not explain why incorrect choices are wrong unless specifically asked. The reason for many of the incorrect answers will be obvious to your students, and you should not go into detail on them unless a question is raised from one of the students.
Use selected items from the list in the section of the briefing on historical examples of terrorist attacks. You may want to ask your audience if they have a particular interest or questions about any event on the list. You should have time to go through several examples.
It is also highly recommended that you thoroughly familiarize yourself with this briefing, both in regards to content and animation/slide layout. The briefing has a number of slide builds to expose training information in sequence. You will want to anticipate these to assure smooth flow of presentation. Also, if you plan to print a copy of the briefing, it is recommended that you unselect the grayscale option on the print menu.
About This Training
Designed by JCS in coordination with OSD and Services
Designed to increase awareness of terrorism and improve ability to apply personal protective measures
Meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16
Complements Web-based and CD-ROM training
Introduction
Slide #‹#›
Antiterrorism Level I Awareness Training
2
The purpose of this training is to increase your awareness of terrorism and to improve your ability to apply personal protective measures. Completion of this training meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16. The training program also provides links to resources you can use in the future, such as TADWeb (a database of previous terrorist acts), the State Department Travel Warnings .
This is a Powerpoint that highlights the usefulness of using short video tutorials as a form of advertising on social media. This is done by analyzing the data that was collected from conducting a twenty question survey.
A Vulnerability analyst detects vulnerabilities in networks and software and then takes the necessary steps to manage security within the system.
https://www.infosectrain.com/courses/ceh-v11-certification-training/
Psychological Safety and Remote Work by Matthew PhilipBosnia Agile
Over the last four years, the world has experienced an unprecedented shift to remote and hybrid work environments. This poses questions for those interested in high-performing teams, because physical distance from our teammates has created challenges to fostering and increasing psychological safety.
This talk presents original research on and explores the relationship of remote environments and psychological safety. Participants will learn about factors that impact safety in a remote environment and ways to promote safety in remote and hybrid teams, as well as implications for leadership, teamwork and generative work across all environments, in-person, hybrid and remote.
Similar to Phishing Training Program Brochure 01 (20)
Psychological Safety and Remote Work by Matthew Philip
Phishing Training Program Brochure 01
1. PHISHING TRAINING PROGRAM
www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943
Module ~12 mins
Video Only ~ 8 mins
This course is designed to raise awareness about
phishing and inform trainees about the dangers. It
teaches the warning signs to help trainees better spot
phishing attempts, and it explains what people should
do if they have any suspicions about an email or phone
call.
The full-length course takes approximately 12 minutes
to complete and contains a series of 3 short videos
interspersed with 8 interactive quiz questions. This
course can stand alone or can be snapped together with
other topic segments.
The full-length course is divided into three parts:
(1) What Is Phishing?
Discusses the dangers and types of phishing, including
spear phishing and vishing (phishing via phone).
(2) How Do You Spot a Phishing Attempt?
Discusses the various warning signs to look out for.
(3) What Should You Do When Things Seem Phishy?
Discusses what people should do when they have
questions or suspicions.
Condensed Version
Module ~ 6 mins
Video Only ~ 4 mins
We also offer a condensed version that takes about 6
minutes to complete. It contains 4 interactive quiz
questions.
2. TeachPrivacy was founded by Professor Daniel J. Solove, the John Marshall Harlan Research
Professor of Law at the George Washington University Law School. He is also a Senior Policy
Advisor at the law firm of Hogan Lovells. One of the world’s leading experts in privacy law,
Solove has authored nine books and more than fifty articles. He is the lead author of the most
widely-used textbook on information privacy law. He has given lectures around the world,
testified before Congress, spoken at the Department of Homeland Security, U.S. Dep’t of
Education, FCC, FTC, the Library of Congress, and countless universities.
Professor Solove has been interviewed and featured in several hundred media
broadcasts and articles, including the New York Times, Wall Street Journal,
Washington Post, Chicago Tribune, USA Today, AP, Time, Reader’s Digest, ABC, CBS,
NBC, CNN, and NPR.
www.teachprivacy.com inquiry@teachprivacy.com(215) 886-1943
ABOUT TEACHPRIVACY
The TeachPrivacy Advantage
Topical
We cover more than 50 topics,
including HIPAA, FERPA, GLBA,
phishing, passwords, portable devices,
social media, and much more.
Interactive
SCORM-complaint modules have
interactive quizzes and activities.
Engaging
Your workforce will want to take our
training – and they’ll remember it.
Short and Modular
We have comprehensive courses and
short individual modules on
particular topics.
Customizable
We can customize anything
Expertise
Our training is created by Professor
Daniel Solove, an internationally-
known expert in privacy and security.
“In short, easily understood sessions, Professor Solove personally explains the concepts of
information security and privacy in plain language. The excellent content combined with
Solove’s well-earned reputation make the TeachPrivacy series an essential part of an
effective information security awareness program in any organization.”
– Dennis Devlin, CISO, CPO and Senior VP of Privacy Practice, Savanture