InfraGardAwareness

InfraGardAwareness Certification

Our Information Security Awareness course is designed to help businesses and organizations educate employees to reduce risk and protect company resources and information.

$19.95(per seat)   Individual Pricing

 

Buy Now

InfragardAwareness Security Awareness Course

Our Information Security Awareness course is designed to help businesses and organizations educate employees to reduce risk and protect company resources and information.

The InfragardAwareness course includes:

  • 14 lessons
  • 100-question certification exam
  • Certificate upon completion

A passing score of 70% must be obtained to earn the certificate. The exam can be taken until passed and a certificate is earned.   A percentage of every InfragardAwareness certificate fee is provided to the InfraGard National Member Alliance.

$19.95(per seat)   Individual Pricing

 
For Enterprise training options and pricing please see our Enterprise Options section

Course Lessons Overview

Course Welcome and Overview - 4:55 min

Learning even just the basics of information security will help protect you, your workplace, and family from the dangers of cybercrime and identity theft. Start your learning with our welcome lesson.

Lesson 1:  The Impact of Cybercrime and Identity Fraud – 8:32 min

When you see the nearly dozen ways that cybercrime can hurt your workplace, your job security, and even your financial identity, then maybe you'll begin to understand why it's so important for you to do everything you can to minimize the threat.

Lesson 2: Today’s Threats – 7:36 min

There are dozens of different types of potential threats behind this wave of cybercrime, but most fall into one of just five categories. Find out what they are.

Lesson 3:  How Behavior is Exploited – 9:56 min

Hackers spend much of their time studying the predictable behavior of employees like you as a way to find just one vulnerability they can exploit in an attack on your workplace.

Lesson 4:  Strong Passwords Increase Security – 9:23 min

Your password is key to security. Learn how passwords can easily be exploited, what you can do to maximize the security your password can offer, and why following password security policies is so important to overall security.

Lesson 5:  Understanding and Recognizing Social Engineering – 4:05 min

One of the most effective and dangerous techniques hackers use to manipulate employees is called social engineering, and it's critically important that you learn how to recognize this serious threat.

Lesson 6:  Email Best Practices – 6:50 min

Inappropriate or careless use of this valuable resource can not only create significant security and legal risks, it can also have a negative impact on overall business productivity and performance.

Lesson 7:  Protecting Against Viruses, Spyware and Spam – 6:30 min

Your workplace is a target for computer viruses, spyware, keyloggers and other malicious code that are designed to steal confidential information. But there is plenty you can do to stop them.

Lesson 8:  Protecting Your Personal Workspace – 4:48 min

Protecting your physical workspace is an important part of day to day security and is directly connected to information security risk. Knowing how to protect your personal workspace will make your overall physical security better.

Lesson 9:  Security You Can Live With – 9:00 min

Security doesn't end when you leave your workplace. Learn how to protect your workplace even when you're not there - through better laptop protection, telecommuting security, and working securely on the road.

Lesson 10: Safe Web Use – 6:10 min

It's important to make sure that you remain constantly aware of security when using the web at work, and that you always follow security rules and management policies regarding appropriate web use.

Lesson 11: Protecting the Workplace from Identity Fraud – 6:50 min

Identity theft is the nation's fastest growing crime, and prevention can begin in the workplace. Learn how to protect yourself, your family, and your workplace through better awareness.

Lesson 12: Risks and Acceptable Uses of Electronic Resources – 6:08 min

To ensure smooth day-to-day operations, it's important for employees, contractors, and anyone else who uses workplace computers and networks to follow policy guidelines on acceptable systems use and security.

Lesson 13: Secure Use of Networks – 2:32 min

The protection of information handled by computer networks is a key part of a security strategy, and there are a number of important security guidelines that you should make yourself familiar with.

Testimonials

"I felt very engaged in the training. The information was relevant and interesting."

- Tony, Los Angeles

"The online training was straightforward and easy to understand."

-Financial Services Employee

"The online training was pleasantly straightforward and easy to comprehend."

- Steve, Miami

"This training will help me to protect my family at home, and I like that!"

- State Government Employee

"I really enjoyed the fact that this training covered both business and personal practices."

- Mary, Boston

“After taking the training, I have a much better understanding of why these rules are so important.”

- Internet Sales Employee

“The training was actually quite interesting, informative and worthwhile."

- University Services Employee

"Now that I understand why we have these rules, I will be more likely to follow them.”

- Credit Union Employee

Log in