Search
Close this search box.
Training

"Empower Your Team: Comprehensive IT Training Solutions."

The EBGC training course library contains 100+ video lessons on topics such as common cybersecurity threats, phishing, security best practices and compliance regulations. Fresh courses are added on a regular basis to keep up with the changes in the cybersecurity landscape.

Most courses are available in multiple languages and are accompanied by a six-question quiz to measure knowledge retention.

Security Awareness

  • Security for Remote/Hybrid Workforce
  • Internet Safety and Social Media
  • Mobile Security: Introduction
  • Mobile Security: Securing Mobile Devices
  • Mobile Security: Mobile Wi-Fi Security
  • Mobile Security: Mobile Device Management
  • Mobile Security: Mobile Backups
  • Bring Your Own Device (BYOD) Policy
  • Physical Office Security
  • Physical Security: Lock Screens
  • Physical Security: Loose Lips Sink Ships
  • Physical Security: Removable Devices
  • Physical Security: Tailgating
  • Physical Security: Shoulder Surfing
  • Clean Desk Policy
  • Zero-Trust Security: Introduction & Definition
  • Internet of Things (IoT) Awareness

Compliance Regulations Education

  • What Is PHI/ePHI?
  • PHI Policy
  • PHI: Consequences of PHI Release
  • PHI: Physical Security
  • EU GDPR: What Is GDPR?
  • EU GDPR: Consequences of GDPR Release
  • EU GDPR: Important Definitions
  • EU GDPR for Data Processors
  • EU GDPR: GDPR for Data Breach ​Notifications​
  • EU GDPR: Rights of Data Subjects Stored Processed Destroyed
  • Intro to the UK General Data Protection Regulation (GDPR)
  • UK GDPR vs. EU GDPR
  • PCI-DSS: Overview
  • PCI-DSS: Best Practices for Maintaining PCI DSS Compliance
  • Sarbanes-Oxley (SOX) Overview
  • HIPAA: Overview
  • HIPAA: Overview of the Privacy Rule and Security Rule
  • NIST 800-171 Overview
  • NIST 800-871: Who Is Required to Comply & What Information Is Protected
  • NIST CSF Manager: Introduction
  • NIST: Incident Response Overview
  • Introduction to CMMC
  • CMMC: What Information Is Protected and Why
  • CMMC: Understanding the 5 Maturity Levels
  • CMMC: Level One Compliance
  • PIPEDA Overview
  • PIPEDA: 10 Principles
  • PIPEDA and Provincial Privacy Statutes

Data Breach Prevention and Data Handling Best Practices

  • Secure Data Storage
  • Privacy and Data Classification
  • Understanding Common Types of Data Breaches
  • Data Privacy in the U.S.
  • Data Protection: Secure Connections
  • Data Protection: Data Encryption
  • Data Protection: Data Backup

Cyberthreat Education

  • Malware Awareness
  • What Is Account Takeover?
  • What Is an Insider Threat?
  • Insider Risk: Spotting Malicious Insiders
  • Ransomware Basics
  • Ransomware: Downloads and Attachments
  • Ransomware/Malware: Malicious Links & Websites
  • Ransomware for Healthcare
  • Nation-State Cybercrime: How Employees May Encounter Nation-State Threats
  • Nation-State Cybercrime: Industrial and Infrastructure Targets
  • COVID-19 — Government Spoofing
  • Safe Web Browsing: Domain Spoofing, Website Forgery
  • Introduction to Business Email Compromise
  • Business Email Compromise (BEC): Invoice/Urgent Payment Required
  • Business Email Compromise (BEC): Gift Card Scams
  • BEC: Credential & Data Theft Scams
  • BEC: Techniques & Red Flags
  • Avoiding Cryptocurrency Risk — Crypto Mining
  • Social Media Safety
  • Introduction to Social Engineering
  • Pretexting

Phishing

  • Introduction to Phishing
  • Common Attack Types
  • Common Attack Methods
  • Business Email Compromise
  • Spotting & Reporting Phishing
  • How to Avoid Phishing Scams
  • Phishing: CEO Scams
  • Phishing: Dangers of Malicious Attachments
  • Phishing: Brand Fraud and Spoofing
  • Phishing: Whaling/Executive Impersonation
  • Phishing Scams: Cryptocurrency, Military and Romance
  • Social Media Phishing (Angler Phishing)
  • Introduction to Vishing/Smishing

Password Protection and Best Practices

  • Introduction to Phishing
  • Common Attack Types
  • Common Attack Methods
  • Business Email Compromise
  • Spotting & Reporting Phishing
  • How to Avoid Phishing Scams
  • Phishing: CEO Scams
  • Phishing: Dangers of Malicious Attachments
  • Phishing: Brand Fraud and Spoofing
  • Phishing: Whaling/Executive Impersonation
  • Phishing Scams: Cryptocurrency, Military and Romance
  • Social Media Phishing (Angler Phishing)
  • Introduction to Vishing/Smishing