Security Awareness Training
Here you can see an example of videos that are included in Enable’s Security Awareness Training suite. With our training suite, after watching a short video you’ll be presented with a short quiz. Enable’s clients can track which staff have and haven’t completed the training and who should undergo further training.
AI and Cybersecurity - Safe AI Tool Usage
Phishing & Ransomware
Phishing and ransomware remain the top cause of incidents, losses, and downtime. In this program, we’ll break down how modern phishing attacks work, what malicious emails look like in real-world scenarios, why attachments are still dangerous, and how ransomware infections typically begin.
Chapter 1 - Introduction to Phishing Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the components of phishing and its various attack types. You'll learn how to identify a phishing attack and the steps to take if you suspect you have received a phishing email.
Chapter 2 - Common Phishing Attack Methods Phishing is the most common attack used by cybercriminals to gain wrongful access to computer systems. In this course, you’ll examine the common phishing attack methods: pretexting, malicious links, and malicious attachments.
Chapter 3 - Phishing: Dangers of Malicious Attachments Learn how to handle suspicious attachments like a pro. In this story-driven microtraining, you’ll practice a simple workflow that prevents a single click from becoming a company-wide incident.
Chapter 4 - Ransomware Basics Learn the basics of ransomware including how it works and the damage it can do to your company.