Case in Point Collection
Case in Point
Audience: General End User (All)
Difficulty Level: Foundational
Time: 15 modules, 2-3 minutes each + 5 Questions per module
Availability: Available on Training as individual modules. Do not need to be assigned or watched together, designed to stand independently.
Modules:
- Case in Point: Advanced Financial Social Engineering (3:30 Video)
- Case in Point: Cloud Security Threats (2:36 Video)
- Case in Point: Internet of Things (2:39 Video)
- Case in Point: Mobile Security (1:40 Video)
- Case in Point: Password Management (1:32 Video)
- Case in Point: Physical Security (1:37 Video)
- Case in Point: Point of Sale (PoS) Security (3:56 Video)
- Case in Point: Ransomware (2:25 Video)
- Case in Point: Reporting Suspicious Activity (2:52 Video)
- Case in Point: Synthetic Identity Theft (2:37 Video)
- Case in Point: Themed Phishing (2:30 Video)
- Case in Point: Travel Secure (1:42 Video)
- Case in Point: Vendor Email Compromise (VEC) (2:39 Video)
- Case in Point: Work From Home (2:29 Video)
Sample video: Case in Point - Travel Secure
Marketing Materials: Case in Point Marketing Kit
Major Themes: Case in Point modules use powerful analogies, stories, and metaphors to educate end users on seemingly inaccessible concepts.
Major Learning Concepts:
- Case in Point: Advanced Financial Social Engineering
- Vishing
- Social engineering
- Sensitive data
- Red flags
- Vendor compromise
- Case in Point: Cloud Security Threats
- “The Cloud” definition
- Risks of the cloud
- Securing data in the cloud
- Following policy
- Case in Point: Internet of Things
- Risks of internet-connected devices
- Changing default passwords
- Device updates
- Privacy settings
- Case in Point: Mobile Security
- Apps permissions
- Personal data harvesting
- Data breaches
- Case in Point: Password Management
- Risks of reusing passwords
- Multi-factor authentication
- Credential Stuffing
- Case in Point: Physical Security
- Physical security threats
- Sensitive information in the open
- Policy compliance
- Disposal of sensitive data
- Locking devices
- Case in Point: Point of Sale (PoS) Security
- Physical security threats at Point of Sale
- At-risk devices
- Sensitive data
- Consequences of security incidents
- Securing terminals
- Disposal of old devices
- Case in Point: Ransomware
- Ransomware definition and objective
- Potential losses
- Risks of paying a ransom
- Backups
- Case in Point: Reporting Suspicious Activity
- Warning signs of phishing
- Red flags on social media
- Vishing
- Consequences of ignoring suspicious activity
- Case in Point: Synthetic Identity Theft
- Identity theft vs synthetic identity theft
- Account monitoring
- Consequences of synthetic identity theft
- Securing physical documents
- Secure disposal of sensitive data
- Reporting unusual activity
- Case in Point: Themed Phishing
- Phishing red flags
- Staying safe from phishing
- Phishing on mobile devices
- Case in Point: Travel Secure
- Locking unattended devices
- Doxing
- Avoiding public USB ports
- Case in Point: Vendor Email Compromise (VEC)
- Definition of phishing and third party phishing
- Verifying senders
- Red flags
- Reporting suspicious messages
- Work From Home
- VPNs
- Avoiding public WiFi
- Locking unattended devices
- Work vs personal devices
- Suspicious event invites
🔍 View Case in Point in your Living Security platform catalog here!