vesuvius.securityeducation.com Open in urlscan Pro
35.174.2.205  Public Scan

URL: https://vesuvius.securityeducation.com/ticketAuth/b1f081ec7eee4e32b81e39db0e85315c
Submission: On April 10 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

DeutschEspañolFrançais日本語
Powered by Localize
English


Skip to main content
 * SECURITY EDUCATION PLATFORM

 * Daniel Edgar
 * My Training

My Training
English
Daniel Edgar DE

 * Reporting
 * All Product Reports


User Sync In Progress...

Any changes made to your users during this time may be overwritten by the sync.
Searching for users may not return accurate results. For more details check the

Sync History
page.




MY TRAINING


ASSIGNMENT DUE APRIL 26, 2024

COMPLETED

Video Module

HOW TO REPORT A PHISH

Runtime: 1 minute(s)

Learn how to use the PhishAlarm button in your email to report suspicious
emails.

COMPLETED

Interactive Module

SOCIAL ENGINEERING: MANY METHODS, MANY MOTIVES

Runtime: 2 minute(s)

Emotional manipulation and deception tactics known as “social engineering” are
common in cyberattacks. This module reviews some common ways social engineers
attack.

Knowledge Assessment

SOCIAL ENGINEERING: MANY METHODS, MANY MOTIVES ASSESSMENT

Runtime: 2 minute(s)

This adaptive learning assessment will evaluate your knowledge related to social
engineering. This assessment correlates to our Social Engineering: Many Methods,
Many Motives training.

Interactive Module

SECURITY BASICS: CLOUD AND INTERNET SECURITY

Runtime: 2 minute(s)

This Security Basics course provides foundational information on concepts
related to cloud and internet security.

Knowledge Assessment

SECURITY BASICS: CLOUD AND INTERNET SECURITY ASSESSMENT

Runtime: 2 minute(s)

This adaptive learning assessment will evaluate your knowledge related to cloud
and internet security. This assessment correlates to our Security Basics: Cloud
and Internet Security training.

Interactive Module

DATA ENTRY PHISHING

Runtime: 8 minute(s)

Learn to identify and avoid scams that request personal or sensitive data

Interactive Module

PHYSICAL SECURITY FUNDAMENTALS

Runtime: 2 minute(s)

Cybersecurity isn’t just about software updates and avoiding fraudulent emails
and websites. To protect your data and devices, you need good physical security
habits that go beyond cyberspace. It's crucial for you to be aware of and adapt
those security habits.

Knowledge Assessment

PHYSICAL SECURITY FUNDAMENTALS ASSESSMENT

Runtime: 2 minute(s)

This adaptive learning assessment will evaluate your knowledge related to
physical security. This assessment correlates to our Physical Security
Fundamentals training.

Interactive Module

SECURITY BEYOND THE OFFICE

Runtime: 15 minute(s)

Avoid common security mistakes while working at home or on the road.

Interactive Module

BEYOND PASSWORDS

Runtime: 11 minute(s)

Go beyond passwords and learn how to use PINs and passphrases to secure your
devices and accounts.

Interactive Module

PASSWORD POLICY

Runtime: 7 minute(s)

Learn how to create passwords compliant with your company’s policy.

Interactive Module

VESUVIUS IT SECURITY POLICIES

Runtime: 1 minute(s)

Overview of the policies

--------------------------------------------------------------------------------

Continue Assignment


ADDITIONAL TRAINING TRAINING MODULES THAT CAN HELP YOU LEARN MORE SECURITY
ESSENTIALS.

Interactive Module


AVOIDING DANGEROUS ATTACHMENTS

Runtime: 8 minute(s)

Identify and avoid dangerous email attachments

Interactive Module


AVOIDING DANGEROUS LINKS

Runtime: 9 minute(s)

Recognize common email traps and avoid dangerous links

Interactive Module


BEYOND PASSWORDS

Runtime: 11 minute(s)

Go beyond passwords and learn how to use PINs and passphrases to secure your
devices and accounts.

Interactive Module


BUSINESS EMAIL COMPROMISE

Runtime: 13 minute(s)

Protect your organization from compromised accounts.

Interactive Module


DATA ENTRY PHISHING

Runtime: 8 minute(s)

Learn to identify and avoid scams that request personal or sensitive data

Interactive Module


EMAIL PROTECTION TOOLS

Runtime: 15 minute(s)

Learn how to protect yourself from phishing scams in combination with email
defense tools.

Gaming Module


EMAIL SECURITY

Runtime: 20 minute(s)

Learn to identify phishing emails, dangerous attachments, and other email scams

Interactive Module


EMAIL SECURITY ON MOBILE DEVICES

Runtime: 10 minute(s)

Identify and avoid phishing emails on mobile devices.

Interactive Module


INSIDER THREAT OVERVIEW

Runtime: 12 minute(s)

Recognize insider threats and learn basic best practices to protect against
them.

Interactive Module


INTRODUCTION TO PHISHING

Runtime: 19 minute(s)

Recognize email traps and avoid phishing scams

Interactive Module


MALICIOUS INSIDER THREAT

Runtime: 9 minute(s)

Learn through real-world examples and discover actions that help mitigate
malicious threats.

Interactive Module


MITIGATING COMPROMISED DEVICES

Runtime: 12 minute(s)

Protect your organization from compromised devices.

Interactive Module


MOBILE APP SECURITY

Runtime: 14 minute(s)

Learn how to judge the safety of mobile apps.

Interactive Module


MOBILE DEVICE SECURITY

Runtime: 22 minute(s)

Use important physical and technical safeguards to protect your devices and your
data.

Interactive Module


MULTI-FACTOR AUTHENTICATION

Runtime: 6 minute(s)

Learn best practices for using multi-factor authentication (MFA) to add an extra
level of security to your accounts.

Interactive Module


PASSWORD MANAGEMENT

Runtime: 13 minute(s)

Learn best practices for safely managing passwords.

Interactive Module


PASSWORD POLICY

Runtime: 7 minute(s)

Learn how to create passwords compliant with your company’s policy.

Interactive Module


PHYSICAL SECURITY

Runtime: 14 minute(s)

Learn how to use physical security measures to keep your data and assets safe.

Interactive Module


PII FUNDAMENTALS

Runtime: 16 minute(s)

Protect confidential information about yourself, your employer, and your
customers.

Interactive Module


PII IN ACTION

Runtime: 11 minute(s)

An opportunity to work through a set of scenarios. See how the best practices
learned in PII Fundamentals affect real world decisions.

Interactive Module


PROTECTED HEALTH INFORMATION

Runtime: 11 minute(s)

Learn why and how you should safeguard Protected Health Information (PHI).

Interactive Module


PROTECTING AGAINST RANSOMWARE

Runtime: 12 minute(s)

Learn to recognize and prevent ransomware attacks.

Interactive Module


SAFE SOCIAL NETWORKS

Runtime: 16 minute(s)

Learn how to use social networks safely and responsibly.

Interactive Module


SECURITY BEYOND THE OFFICE

Runtime: 15 minute(s)

Avoid common security mistakes while working at home or on the road.

Interactive Module


SECURITY ESSENTIALS

Runtime: 17 minute(s)

Recognize security issues commonly encountered in daily business and personal
activities.

Interactive Module


SOCIAL ENGINEERING

Runtime: 19 minute(s)

Recognize and avoid social engineering scams

Interactive Module


SPEAR PHISHING THREATS

Runtime: 12 minute(s)

Recognize and avoid targeted phishing attacks.

Interactive Module


TRAVEL SECURITY

Runtime: 19 minute(s)

Explore how to keep data and devices safe when working in airports, in hotels,
at conferences, and in other public spaces

Interactive Module


UNDERSTANDING PCI DSS

Runtime: 15 minute(s)

Recognize warning signs and improve security of credit card data

Interactive Module


UNINTENTIONAL INSIDER THREAT

Runtime: 10 minute(s)

Walk through scenarios that highlight everyday actions employees take that
cause, prevent, or mitigate unintended threats.

Gaming Module


URL TRAINING

Runtime: 20 minute(s)

Learn how to spot fraudulent URLs

Interactive Module


USB DEVICE SAFETY

Runtime: 9 minute(s)

Protect yourself, data, and systems when using USB devices

Interactive Module


WORKPLACE SECURITY IN ACTION

Runtime: 14 minute(s)

Practice applying office security best practices in real-world scenarios,
including social engineering, insider threats, and shoulder surfing.

Gaming Module


ANTI-PHISHING PHIL

Runtime: 20 minute(s)

Learn how to spot phishing attacks by identifying fraudulent URLs

Gaming Module


ANTI-PHISHING PHYLLIS

Runtime: 20 minute(s)

Learn how to recognize phishing emails by identifying red flags.

--------------------------------------------------------------------------------



Confidential and Proprietary - Privacy Policy