Security Awareness Training & Simulated Phishing Platform

Who Should Attend?

All employees in your organization who use a computer, email and internet, from the mail room to the board room.

KnowBe4 is the world’s largest integrated Security Awareness Training and Simulated Phishing platform with over tens of thousands of customers. Based on Kevin Mitnick’s 30+ year unique first-hand hacking experience, you now have a platform to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks. KnowBe4 provides you with the world’s largest library of security awareness training content; including interactive
modules, videos, games, posters and newsletters.

With world-class, user-friendly new-school Security Awareness Training, KnowBe4 gives you self-service enrollment, and both pre-and post-training phishing security tests that show you the percentage of end-users that are Phish-prone. KnowBe4’s highly effective, frequent, random Phishing Security Tests provide several remedial options in case an employee falls for a simulated phishing attack.

Our platform allows you to create a fully mature security awareness program.

You also have the option to complement these phishing emails with monthly “hints and tips” to increase end user security awareness related to a variety of social engineering tactics. Executives get the insight they need to maximize training ROI and track security compliance.

The platform is created “by admins for admins”, designed with an intuitive navigation and easy UI that takes minimal time to deploy and manage. The infrastructure is highly scalable and can handle 100,000+ end users with ease. For organizations with their own LMS, training can be delivered in industry standard formats such as SCORM and AICC. Our system also includes support for single sign-on so that users do not have to log in multiple times, using Security Assertion Markup Language (SAML).

Kevin Mitnick Security Awareness Training (45-min)

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

Kevin Mitnick Security Awareness Training (25-Min)

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email
and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

Kevin Mitnick Security Awareness Training (15-min)
This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 27 language versions.

Common Threats, Part 1 – Miranda’s Story
In this module you’ll learn about strategies and techniques hackers use to trick people. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

Common Threats, Part 2 – Kyle’s Story
We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

PCI Compliance Simplified
This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course.

Ransomware
This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

Ransomware For Hospitals Training
Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

Criminal Justice Information Services Security Series
These four courses, Level 1 through Level 4 are designed to satisfy the FBI/CJIS requirements for training employees based on their access to protecting criminal justice information.

Privileged User Security Series
These four courses cover important aspects of privileged access, secure database administration, secure Windows administration, and secure Linux administration.

GLBA Compliance Course
(for Financial Institutions only)
In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI with best practices for protecting customers’ personal information, and the employee’s role in ensuring protection of NPPI.

Handling Sensitive Information
This 15-minute module specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information.

Mobile Device Security
This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

Safe Web Browsing
In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the “do’s and “don’ts” of safe web browsing.

Social Engineering Red Flags
This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

The Danger Zone
In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make
the right decisions or suffer the consequences.

Your Role, Internet Security and You
Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

Register Now

Drop us your entry if you are interested to join this course.

 


You may like

Kaspersky Interactive Protection Simulation (KIPS)

Kaspersky Interactive Protection Simulation (KIPS)

Kaspersky Interactive Protection (KIPS)IT Security teamKIPS is an exercise that places IT security teams from corporations and government departments into a simulated business environment facing a series of unexpected cyber threats, while trying to maximize profit and...