Cyber Wise

Cyber Wise Education

Learn to protect your digital devices, network, and data from a security breach
caused by phishing scams, malware, and baiting / hacking.

Malware is malicious software that you will find in several forms such as adware, spyware, viruses, botnets, trojans, worms, rootkits, and ransomware. Malware infects your computer or electronic device by willingly downloading a program either thinking it is of value to you or by clicking a link without knowing you are triggering a software download.
Phishing attacks are fraudulent communications or websites that are designed to collect your online accounts and personal data. For example, you may receive an email from what you think is your bank asking you to check a transaction. You click the link in the email, You will land on a website that looks like your banks website; however, it is a copy of the actual website. When you enter your login information, the scammer now has your username and password.
Social engineering is when you are contacted by a scammer where the interaction is designed to trick you into revealing information that they can use to carry out an attack. Although malware is not installed onto a specific system, often the information is used to carry out an attack. Often spoofing caller ID information is utilized to further legitimize the conversation. For example, the caller ID may show the caller is from a specific company that you do business with.

Start with the three core courses in the subject area of Cyber Security.

Identify Malware Threats

Identify Malware Threats

The Identify Malware Threats course covers an understanding of the threats that computer users face from cyber criminals. How to recognize a scam email, an understanding of the dangers of downloading software from the internet, and the means that malicious code enters a computer. Lastly, the course discusses the types of malware, phishing, and social engineering threats.

Incident Response

Respond to an Incident

The process that follows infection, incident response is crucial to protecting company assets. This course discusses best practices following a cyber incident. Once your employees have completed this course, they will have knowledge to minimize damage, help stop the spread of malicious code to other devices, and the information to gather to report the incident.

Social Engineering

Social Engineering Prevention

This course covers the use of email, phone calls, and messaging to trick a victim into revealing sensitive information. The topics include how to validate if an email is from the true source that it states. How scammers spoof caller ID phone numbers, then use carefully crafted tactics to gain information. Lastly, many of the false sense of urgency scams.

The Corporation Associates Guide to Employee Skill Development and Education
Your employees are your greatest asset. Our education programs helps them develop skills for success.
Learn More

Find a local Associate to help you

To get started call Corporation Associates toll-free at
(866) 234-7287.

For information about Corporation Associates call our corporate office toll-free at
(844) 262-7762.

Find a local Corporation Associates office

Corporation Associates operates offices throughout the United States. You can locate an office by clicking here.