vesuvius.securityeducation.com
Open in
urlscan Pro
35.174.2.205
Public Scan
URL:
https://vesuvius.securityeducation.com/ticketAuth/b1f081ec7eee4e32b81e39db0e85315c
Submission: On April 10 via manual from IN — Scanned from DE
Submission: On April 10 via manual from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
DeutschEspañolFrançais日本語 Powered by Localize English Skip to main content * SECURITY EDUCATION PLATFORM * Daniel Edgar * My Training My Training English Daniel Edgar DE * Reporting * All Product Reports User Sync In Progress... Any changes made to your users during this time may be overwritten by the sync. Searching for users may not return accurate results. For more details check the Sync History page. MY TRAINING ASSIGNMENT DUE APRIL 26, 2024 COMPLETED Video Module HOW TO REPORT A PHISH Runtime: 1 minute(s) Learn how to use the PhishAlarm button in your email to report suspicious emails. COMPLETED Interactive Module SOCIAL ENGINEERING: MANY METHODS, MANY MOTIVES Runtime: 2 minute(s) Emotional manipulation and deception tactics known as “social engineering” are common in cyberattacks. This module reviews some common ways social engineers attack. Knowledge Assessment SOCIAL ENGINEERING: MANY METHODS, MANY MOTIVES ASSESSMENT Runtime: 2 minute(s) This adaptive learning assessment will evaluate your knowledge related to social engineering. This assessment correlates to our Social Engineering: Many Methods, Many Motives training. Interactive Module SECURITY BASICS: CLOUD AND INTERNET SECURITY Runtime: 2 minute(s) This Security Basics course provides foundational information on concepts related to cloud and internet security. Knowledge Assessment SECURITY BASICS: CLOUD AND INTERNET SECURITY ASSESSMENT Runtime: 2 minute(s) This adaptive learning assessment will evaluate your knowledge related to cloud and internet security. This assessment correlates to our Security Basics: Cloud and Internet Security training. Interactive Module DATA ENTRY PHISHING Runtime: 8 minute(s) Learn to identify and avoid scams that request personal or sensitive data Interactive Module PHYSICAL SECURITY FUNDAMENTALS Runtime: 2 minute(s) Cybersecurity isn’t just about software updates and avoiding fraudulent emails and websites. To protect your data and devices, you need good physical security habits that go beyond cyberspace. It's crucial for you to be aware of and adapt those security habits. Knowledge Assessment PHYSICAL SECURITY FUNDAMENTALS ASSESSMENT Runtime: 2 minute(s) This adaptive learning assessment will evaluate your knowledge related to physical security. This assessment correlates to our Physical Security Fundamentals training. Interactive Module SECURITY BEYOND THE OFFICE Runtime: 15 minute(s) Avoid common security mistakes while working at home or on the road. Interactive Module BEYOND PASSWORDS Runtime: 11 minute(s) Go beyond passwords and learn how to use PINs and passphrases to secure your devices and accounts. Interactive Module PASSWORD POLICY Runtime: 7 minute(s) Learn how to create passwords compliant with your company’s policy. Interactive Module VESUVIUS IT SECURITY POLICIES Runtime: 1 minute(s) Overview of the policies -------------------------------------------------------------------------------- Continue Assignment ADDITIONAL TRAINING TRAINING MODULES THAT CAN HELP YOU LEARN MORE SECURITY ESSENTIALS. Interactive Module AVOIDING DANGEROUS ATTACHMENTS Runtime: 8 minute(s) Identify and avoid dangerous email attachments Interactive Module AVOIDING DANGEROUS LINKS Runtime: 9 minute(s) Recognize common email traps and avoid dangerous links Interactive Module BEYOND PASSWORDS Runtime: 11 minute(s) Go beyond passwords and learn how to use PINs and passphrases to secure your devices and accounts. Interactive Module BUSINESS EMAIL COMPROMISE Runtime: 13 minute(s) Protect your organization from compromised accounts. Interactive Module DATA ENTRY PHISHING Runtime: 8 minute(s) Learn to identify and avoid scams that request personal or sensitive data Interactive Module EMAIL PROTECTION TOOLS Runtime: 15 minute(s) Learn how to protect yourself from phishing scams in combination with email defense tools. Gaming Module EMAIL SECURITY Runtime: 20 minute(s) Learn to identify phishing emails, dangerous attachments, and other email scams Interactive Module EMAIL SECURITY ON MOBILE DEVICES Runtime: 10 minute(s) Identify and avoid phishing emails on mobile devices. Interactive Module INSIDER THREAT OVERVIEW Runtime: 12 minute(s) Recognize insider threats and learn basic best practices to protect against them. Interactive Module INTRODUCTION TO PHISHING Runtime: 19 minute(s) Recognize email traps and avoid phishing scams Interactive Module MALICIOUS INSIDER THREAT Runtime: 9 minute(s) Learn through real-world examples and discover actions that help mitigate malicious threats. Interactive Module MITIGATING COMPROMISED DEVICES Runtime: 12 minute(s) Protect your organization from compromised devices. Interactive Module MOBILE APP SECURITY Runtime: 14 minute(s) Learn how to judge the safety of mobile apps. Interactive Module MOBILE DEVICE SECURITY Runtime: 22 minute(s) Use important physical and technical safeguards to protect your devices and your data. Interactive Module MULTI-FACTOR AUTHENTICATION Runtime: 6 minute(s) Learn best practices for using multi-factor authentication (MFA) to add an extra level of security to your accounts. Interactive Module PASSWORD MANAGEMENT Runtime: 13 minute(s) Learn best practices for safely managing passwords. Interactive Module PASSWORD POLICY Runtime: 7 minute(s) Learn how to create passwords compliant with your company’s policy. Interactive Module PHYSICAL SECURITY Runtime: 14 minute(s) Learn how to use physical security measures to keep your data and assets safe. Interactive Module PII FUNDAMENTALS Runtime: 16 minute(s) Protect confidential information about yourself, your employer, and your customers. Interactive Module PII IN ACTION Runtime: 11 minute(s) An opportunity to work through a set of scenarios. See how the best practices learned in PII Fundamentals affect real world decisions. Interactive Module PROTECTED HEALTH INFORMATION Runtime: 11 minute(s) Learn why and how you should safeguard Protected Health Information (PHI). Interactive Module PROTECTING AGAINST RANSOMWARE Runtime: 12 minute(s) Learn to recognize and prevent ransomware attacks. Interactive Module SAFE SOCIAL NETWORKS Runtime: 16 minute(s) Learn how to use social networks safely and responsibly. Interactive Module SECURITY BEYOND THE OFFICE Runtime: 15 minute(s) Avoid common security mistakes while working at home or on the road. Interactive Module SECURITY ESSENTIALS Runtime: 17 minute(s) Recognize security issues commonly encountered in daily business and personal activities. Interactive Module SOCIAL ENGINEERING Runtime: 19 minute(s) Recognize and avoid social engineering scams Interactive Module SPEAR PHISHING THREATS Runtime: 12 minute(s) Recognize and avoid targeted phishing attacks. Interactive Module TRAVEL SECURITY Runtime: 19 minute(s) Explore how to keep data and devices safe when working in airports, in hotels, at conferences, and in other public spaces Interactive Module UNDERSTANDING PCI DSS Runtime: 15 minute(s) Recognize warning signs and improve security of credit card data Interactive Module UNINTENTIONAL INSIDER THREAT Runtime: 10 minute(s) Walk through scenarios that highlight everyday actions employees take that cause, prevent, or mitigate unintended threats. Gaming Module URL TRAINING Runtime: 20 minute(s) Learn how to spot fraudulent URLs Interactive Module USB DEVICE SAFETY Runtime: 9 minute(s) Protect yourself, data, and systems when using USB devices Interactive Module WORKPLACE SECURITY IN ACTION Runtime: 14 minute(s) Practice applying office security best practices in real-world scenarios, including social engineering, insider threats, and shoulder surfing. Gaming Module ANTI-PHISHING PHIL Runtime: 20 minute(s) Learn how to spot phishing attacks by identifying fraudulent URLs Gaming Module ANTI-PHISHING PHYLLIS Runtime: 20 minute(s) Learn how to recognize phishing emails by identifying red flags. -------------------------------------------------------------------------------- Confidential and Proprietary - Privacy Policy