Now available in our content library!

Why Optiv?

 

No matter how advanced your security technology every organization has risk associated with its workforce. Human risk is difficult to quantify because stakeholders must consider every type of threat, malicious, negligent, and unwitting. Investing in a holistic program to educate and empower everyone who touches your network, inherently reduces the risk by increasing awareness and impacting culture. Optiv offers a comprehensive approach to cybersecurity education through both general end user awareness and role-based training. Meaningful, relevant, current training content establishes a solid foundation for your general user base and simulated phishing campaigns provide insight and create opportunities for risk mitigation.

  • Location Denver, CO
  • Website www.optiv.com
  • Founded 2015
  • Content Focus Phishing Awareness, PCI Compliance, Physical Asset Security
Request a Demo

Learn

We work with your stakeholders to identify appropriate general end user and role-based training providing meaningful business impacts and personal relevance to end users.

Experience

Create an environment of awareness outside of formalized training with reinforcement materials like newsletters, posters, digital images, and simulated phishing campaigns.

Transform

Cybersecurity education programs are more than just content – it’s a strategy. Transform your organization’s culture into one of awareness and ownership through positive behavior change.

Content Lineup

 

Below are training courses that can be assigned to users.

Name Description
CyberBOT Cloud Security The Masterminds have high hopes as they deploy the CyberBOTs into the cloud. Users must ensure they use only safe and approved cloud services, adequately secure data stored in the cloud and comply with their organization’s cloud-based application policies to complete their mission to battle the CyberBOTs in the cloud.
CyberBOT Data Privacy CyberBOTs are targeting the organization’s data and it’s up to users to secure it against compromise. Learners explore the risk factors and best practices related to collecting, processing, storing and disposing of data as they complete missions to defeat each CyberBOT’s attempt to steal sensitive information.
CyberBOT Email Security The CyberBOTs are at it again, this time using the tried-and-true phishing attack. Users must defeat the CyberBOTs’ attempts to phish inboxes by recognizing phishing emails and detecting malicious links and attachments.
CyberBOT Identity Theft The CyberBOTs are seeking a new identity. End users and their customers/clients are at risk. Learners must protect their own personal information, as well as that of customers and clients. If the CyberBOTs are successful at stealing an identity, users must recognize the signs and respond appropriately to prevent further compromises.
CyberBOT Insider Threat The Masterminds are sending CyberBOTs to seek out employees with an interest in harming the organization or those who are negligent for an insider threat attack. The CyberBOTs hope users won’t recognize the signs and take the proper steps to report the threat.
CyberBOT Malicious Downloads When the CyberBOTs begin sharing suspicious email attachments and links, users must learn to defend themselves against malicious downloads. Attacks carried out via phishing emails, malicious websites and malware require learners to raise their awareness of the risks, techniques and intentions of the CyberBOTs to complete each mission successfully.
CyberBOT Mobile Security While the CyberBOTs are on a mission to install malware on mobile devices, SMiSh unsuspecting victims and steal devices left unattended, learners are on their own mission to install safe mobile applications, recognize and respond to SMiShing attacks and keep devices secure along the way.
CyberBOT Password Security As the CyberBOTs attempt to crack passwords and gain unauthorized access to user accounts, learners discover methods for beating CyberBOTs at their own game. As part of the mission, users gain valuable knowledge about creating secure and unique passwords and how to further protect those passwords from the CyberBOTs’ reach.
CyberBOT Social Engineering The Masterminds have designed undercover operations. As the CyberBOTs take on unusual disguises and methods, learners must explore the techniques and intentions of social engineers and defeat the CyberBOTs by detecting their in-person, phone (vishing) and social media attacks.
CyberBOT Social Media Security Nearly everyone has a social media profile today. The CyberBOTs are no exception as they scan social networks for opportunities to attack vulnerable users. Learners must succesfully defend their social media presence to complete their mission against these attacks.
CyberBOT Workplace Security CyberBOTs are attempting to infiltrate the workplace and it’s up to users to keep them at bay. Whether it’s gaining unauthorized physical access, stealing confidential information or installing malicious devices on the organization’s network, the CyberBOTs will keep learners on their toes throughout this mission.

Last Updated 12/7/2021

Name Description
SACT Cybersecurity at Home Security risks are not limited to the workplace. In a technology-driven society, threats within the home are just as relevant and concerning as those in the office. This course examines common security issues within a home environment, including WiFi network security, home networking threats, vishing attacks and safe storage and disposal of personal information.
SACT Data Privacy Protecting organizational data is a shared responsibility among all members of the workforce. The SACT Data Privacy course explores risk factors and best practices related to collecting, processing, storing and disposing of sensitive data. Learners will consider their role in the data lifecycle and how it relates to overall organizational data protection strategies.
SACT Email Security This course examines various types of threats related to phishing emails. Users learn how to recognize and address phishing emails, review messages for potential signs of phishing and comprehend the risks of interacting with malicious email content.
SACT Identity Theft Identity theft affects employees and customers on a personal level, but organizations are also directly affected when an employee’s or customer’s identity is stolen. This course defines identity theft and shares common indicators and what users can do to protect their personal information as well as that of customers.
SACT Insider Threat Security threats from those associated with an organization often carry the greatest risks. Easy access to data by insiders is a significant threat. This course reviews these threats and shares indicators employees should know to prevent, stop and report insider threats.
SACT Malicious Downloads Malicious file downloads are a direct threat to organizational devices and systems. As such, the SACT Malicious Downloads course increases user awareness regarding the risks, techniques and motivations behind attacks using malicious downloads, including email attachments, malware and malicious links and websites.
SACT Mobile Security This course guides users through best practices they can employ to reduce risks related to mobile devices. The course can help learners understand how to identify and use safe mobile applications, recognize text message (SMiShing) attacks, safely use mobile devices in shared spaces and prevent device theft.
SACT Password Security Almost any end user will use some type of work-related account which requires a password. As such, the this course shares practical skills for creating secure passwords, protecting passwords from compromise and securing credentials on multiple accounts.
SACT Social Engineering The SACT Social Engineering course explores the techniques and intentions of social engineers during inperson, phone (vishing) and social media interactions. Since social engineering attacks can occur anywhere, this course examines attack vectors both within and outside the workplace.
SACT Social Media Security While social media can be a valuable communication tool when used appropriately, the risks of overexposure and threats from social engineers and malicious links present on social networks can be troublesome for users and organizations. The SACT Social Media Security course reviews these risks and provides best practices for sharing safely on social media.
SACT Workplace Security The SACT Workplace Security course delves into threats affecting the workplace environment and users’ responsibilities to protect organizational infrastructure and data against compromise. Topics covered include physical access by unauthorized persons, secure workspaces, unauthorized devices and shared responsibility across the workforce.

Last Updated 12/7/2021

Name Description
Rapid Awareness Attacks on Smart Phones Smart phones are a growing target for cyberattackers as their features, operating systems and data storage capabilities evolve. The Rapid Awareness Attacks on Smart Phones course explores mobile devices and how they are targeted by cybercriminals through vishing phone calls, SMiShing messages and malicious apps.
Rapid Awareness Business Email Compromise Business email compromise is a highly-sophisticated phishing threat that cost organizations in the United States more than $12 billion in the last decade. The Rapid Awareness Business Email Compromise course reveals common warning signs of these attacks, potential data and financial targets and tips for identifying and responding to potential attacks.
Rapid Awareness Coordinated Phishing and Vishing Attacks While phishing emails and vishing calls are separate distinct threats, they are increasingly combined into coordinated attacks that appear more legitimate and enticing to end users. This course examines how cybercriminals utilize these combined techniques and how users can protect themselves before, during and after a combined phishing and vishing attack attempt.
Rapid Awareness Cybersecurity at Home The Rapid Awareness Cybersecurity at Home course highlights the common threats and prevention strategies that affect users on home wireless networks, personal devices and phishing, vishing and SMiShing attacks at home. Users will learn how to protect against cyber threats outside the office.
Rapid Awareness Data Privacy The Rapid Awareness Data Privacy course assists users in properly handling and storing data containing personal information, responding appropriately to data privacy incidents and securely handling organizational and customer data as they complete daily job functions.
Rapid Awareness Digital Hygiene Digital hygiene is comparable to physical hygiene. In the same way that poor personal hygiene habits can lead to poor health, the health of devices, networks and data is put at risk with poor security habits. This course provides an overview of security habits to implement as part of a regular digital hygiene routine.
Rapid Awareness Email Security With a focus on phishing threats, the Rapid Awareness Email Security course can help defend organizational email against phishing attacks. Learners will explore methods used in phishing attempts, understand why it is important to report suspected phishing emails and review common indicators of phishing emails.
Rapid Awareness Malicious Downloads The Rapid Awareness Malicious Downloads course provides a quick, concise overview of threats stemming from malicious file downloads. Learners quickly review types of malware, safe browsing practices and how to identify common sources of malicious downloads.
Rapid Awareness Phishing Attachments Phishing emails don’t always contain malicious links. Many have malicious attachments a user may open, installing malware or running malicious macro code. This course highlights the most common types of malicious attachments and how they can install keyloggers, ransomware, botnets and macro malware.
Rapid Awareness Phishing Links The Rapid Awareness Phishing Links course uses a dual approach to help users avoid phishing scams. A review of phishing email characteristics is followed by an overview of best practices for examining the links within them for unsafe destinations.
Rapid Awareness Phishing Notifications The sense of urgency and resulting panic from false email notifications can entice users to turn over login credentials or financial account information and open malicious attachments or links. With the information in this course, users will learn how these notifications elicit an emotional response and how to research and evaluate messages before reacting.
Rapid Awareness Ransomware Basics Providing an introductory overview of ransomware threats inside and outside the office, this basics course explains sources of ransomware infections on mobile and non-mobile devices. Threats from malicious websites, phishing emails, social media posts, portable storage devices and mobile applications are identified.
Rapid Awareness Ransomware in the Workplace The Rapid Awareness Ransomware in the Workplace course examines ransomware-related threats to organizational devices, networks and data. Two common types, locker and crypto ransomware, are identified and users review how ransomware infections can spread across company networks.
Rapid Awareness Ransomware Basics Providing an introductory overview of ransomware threats inside and outside the office, this basics course explains sources of ransomware infections on mobile and non-mobile devices. Threats from malicious websites, phishing emails, social media posts, portable storage devices and mobile applications are identified.
Rapid Awareness Remote Worker Security As the world shifts from on-premise to remote workforces, it is imperative that individual contributors practice secure behaviors relevant to work-from-home environments. This course provides users with general awareness for maintaining an organization’s security when its workplace is everywhere.
Rapid Awareness Safe Data Handling Organizations and their employees process significant amounts of internatl and external data each day. The Rapid Awareness Safe Data Handling course examines methods for protecting sensitive customer/client and organizational data. In addition to instructional content, users apply concepts in engaging practice scenarios.
Rapid Awareness Social Engineering As a concise introduction to social engineering methods, this course provides users with a high-level overview of tactics involved in this type of attack. Users gain knowledge regarding social engineering targets, the psychological manipulation employed and steps to identify and report social engineering attempts.
Rapid Awareness Social Media Security The Rapid Awareness Social Media Security course covers the basics of using social media platforms securely, including safe sharing, best practices for privacy and security settings and identifying malicious links in posts and notifications.
Rapid Awareness Safe Data Handling Organizations and their employees process significant amounts of internatl and external data each day. The Rapid Awareness Safe Data Handling course examines methods for protecting sensitive customer/client and organizational data. In addition to instructional content, users apply concepts in engaging practice scenarios.
Rapid Awareness Spear Phishing Spoofed emails are a specific types of phishing attack and appear to be sent by a familiar contact or source. The Rapid Awareness Spoofed Phishing Emails course reviews how email addresses are spoofed, signs a received message might be spoofed and how to respond if the user’s email address is spoofed by another party.
Rapid Awareness Wire Transfer Fraud Wire transfer fraud and phishing emails often go handin-hand. This course reviews how a simple phishing email can result in significant financial loss to an organization. Users learn how email wire transfer fraud schemes are carried out, consequences of successful attacks and how to verify the legitimacy of requests.
Rapid Awareness Workplace Security Unauthorized workplace visitors, workspaces that reveal too much information and company network vulnerabilities threaten almost all workplaces. The Rapid Awareness Workplace Security course examines these risks and quick and easy methods to protect against them.

Last Updated 12/7/2021

Sample Training Pages

 

After a user clicks on a phishing campaign they will be shown a training page. Below are a few training pages using Optiv content.

Frequently Asked Questions

 

Yes. The Rapid Awareness courses are less than five minutes in length.