Employee Training and Development
Cybersecurity Training Videos
Your employees serve as your front line to protect your company's data. Think about the cost in time and resources with just one breach. Learn how to surf the internet safely, create effective passwords, avoid phishing scams and protect your data with our cybersecurity training videos.
View sample courses below. Or sign up for a free trial and watch all of our cybersecurity training videos.Connect with Us Start Free Trial
Why HSI for Cybersecurity Training Courses?
Training your employees on cybersecurity is critical in this age of online everything. All employees access various online systems and applications to handle their daily tasks. Customer service, order entry, inventory management, accounting, payroll and content management systems, just to name a few.
In addition, employees may surf the web for personal use, exposing their work computer to additional risks. If they click on a phishing email link from their personal email, they may be exposed to malware risks and identity theft.
Additional Cybersecurity Topics
Our comprehensive library includes other topics such as:
- Defining cybersecurity
- Protecting your mobile device
- Cybersecurity while traveling
- Types of malware
- Email phishing
- Identity theft
- Social engineering
- Creating a cybersecurity training program
- Minimizing insider threats
- Protecting intellectual property
- Protecting your PC: Daily precautions
The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this program, we’ll cover a system that helps you set unique passwords for each site. We’ll also discuss some additional tips for making your passwords more creative.
Types of Malware
To help prevent a cyber attack, it’s good to have an understanding of what’s out there and how they get into your system. This course will walk viewers through the many types of malware including adware, bots, ransomware, rootkits, spyware, Trojan malware, computer viruses, and worms.
It’s hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this course we’re going to break down some common cybersecurity terms. We’ll define cyberspace, cybersecurity, cybercrime, cyberterrorism, and other familiar terms.
You’ve likely received phishing emails. They’re the emails that bait you to click on them. In this course, we’ll discuss why phishing emails are so successful, what you should do if you suspect you’ve received a phishing email, and the steps to take if you inadvertently click on a link.