This AI Information Security online training course is designed for all employees. Since the field of generative AI is relatively new, it is logical to assume that some of the risks that come with it are unfamiliar as well. By taking this online training course, you will be able to prepare yourself and your organization to face any cybersecurity challenges that arise out of using generative AI. The biggest concerns surrounding the misuse of generative AI are around data privacy, data security, and intellectual property. In this course, you will learn some best practices that will enable you to mitigate these risks.
This Best Practices for Creating Prompts online training course is designed for all employees. Think about it—if you spend 2 hours trying to communicate with your generative AI tool to get the optimum result for a task that you could have completed manually in under 90 minutes, is it even worth it? A prompt is the mode of communication between you and your generative AI tool. Like any human interaction, if you don’t know effective ways to communicate, the outcome may be unfruitful and sometimes, downright disappointing. By learning the best practices of designing a prompt, you can get the most out of it in the least amount of time and with the least amount of energy.
This Introduction to Generative AI online training course is designed for all employees. This course will take you through the basics of generative artificial intelligence (AI) technology. Generative AI is here to stay, so it is important to understand where it came from and where it’s going. It enables you to visualize your own professional future and what you can do with this technology in a year, or five years. It allows you to expand your skills or your personnel’s skills, giving you an edge in your field.
This Overview of Basic Tools online training course is designed for all employees. This course offers a synoptic view of the most popular generative AI tools in the market in diverse applications. Learning about ChatGPT for text, DALL-E for images, GitHub Copilot for code, Synthesia for videos, and AIVA for music enables you to explore cutting-edge technologies that automate content creation and streamline workflows.
This AI and Ethics online training course is designed for all employers and employees (including supervisors) who use or are considering using artificial intelligence (AI) in their workplace. This course will encourage learners to reflect on the ethical questions presented by using AI for different job tasks. The objective is to help you use AI ethically.
This AI-Powered Cybersecurity Threats: For Workers online training course is designed for all employees who use computers or other devices to access their organization’s systems. For many years, cybersecurity has been a concern in the workplace, but the rise of AI introduces new challenges. Learn to recognize and respond to AI-powered attacks, and to reduce the risks to yourself and your organization.
This Cloud Computing: An Introduction online training course introduces learners to the exciting world of cloud computing and will learn to define cloud computing. The learner will explore how cloud computing evolved, describe how businesses can benefit from cloud computing, draw attention to the risks of cloud computing, and conclude with the practicalities of its implementation.
This Information Security online training course will identify the safeguards needed to ensure the confidentiality, integrity, and security of the information that employees work with. Organizations are increasingly concerned about the security of electronic information. This course will introduce key concepts and terms, identify security threats, and outline best practices for information protection.
This IT Disaster Recovery Planning: An Overview online training course is designed for employees with IT systems responsibilities. Learn about Disaster Recovery Planning (DRP) - the development and implementation of strategies, processes, and procedures designed to prevent and anticipate disruptions to an organization’s critical IT systems and infrastructure, and to restore them as quickly and completely as possible after a disruptive event or disaster.
This IT Security: Corporate Account Takeover online training course is designed for all employees who use computers and other electronic devices in the course of their work. Corporate Account Takeover (CATO) is a type of cybercrime where cybercriminals gain access to employees’ account credentials on corporate systems. In this course, employees will learn to recognize Corporate Account Takeover (CATO) attacks and take action to defend against them.
This IT Security: Credential Stuffing online training course is designed for all employees in all industries. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into another, unrelated service. Learn what credential stuffing is, the potential negative effects of a credential stuffing attack, and best practices for IT Departments and employees to prevent credential stuffing attacks.
This IT Security – It Begins with You online training course is designed for all employees who use computers and other devices to access their organizations’ systems. Learn about the main ways that cybercriminals use people to compromise systems, and what we can all do to avoid becoming victims.
This IT Security: Mobile Phone Security Awareness online training course is designed for employees who use smartphones in the course of their work. In this course, you will learn to identify smartphone security threats, how to configure your smartphone to mitigate the risks and use your smartphone in a secure way.
This IT Security: Ransomware online training course is designed for employees in all industries who work on computers. In this course, you will learn about ransomware, best practices for IT staff and other employees to prevent ransomware attacks, and recovery options in the event that your organization becomes a ransomware victim.
This Security Awareness online training course will introduce key concepts in security, and provide you with a basic understanding of the security function. This course will outline the five primary responsibilities of the security function, and review common security-related events, including crimes involving security. This course will also look at the monetary and non-monetary costs of crime.
This Social Engineering Awareness online training course is designed for all employees. The techniques that cybercriminals use have been evolving over the years. As companies become better at securing their systems, cybercriminals are increasingly turning to social engineering – manipulating people into performing actions that either compromise their computers and devices or expose personal or sensitive information. Learn to recognize the ways that criminals try to manipulate people into performing actions that either compromise their computers and devices or expose personal or sensitive information.
This Supply Chain Cybersecurity online training course is designed for Chief Information Security Officers (CISOs) and IT security employees. Learn about the two types of supply chain attacks: island hopping and third-party software attacks, and how to mitigate the risks for both types of attacks within your organization and your supply chain.
This Synthetic Identity Fraud online training course is designed for employees of banks and other lending institutions. In this course, you will learn what Synthetic Identity Fraud is, how fraudsters create and use synthetic identities, and what you can do to reduce the risk of loss from this type of fraud.
Employees have an important role to play in protecting the organization's assets. Keeping individual work areas secure is a key aspect of this responsibility. This Workstation Security online training course will provide an explanation of why workstation security is important and will review best practices for workstation security for individual employees.