Resources

Explore these resources to help you formulate your plan and find the materials you need to meet your training objectives. The materials referred to, and linked to, from this site are free (or were when they were found).


CSO Security Awareness Blogs

McAfee Cyber Security Awareness Blog

Microsoft Security Tips & Talk

SANS Security the Human Blog

TrendLabs Security Intelligence Blog

USF Information Technology Services Blog

Books related to Information Security Awareness.pdf | Books related to Information Security Awareness, as Microsoft Word Document | 219k | v. 2

Awareness and Accountability in Information Security Training.

Case Study on Email Malware

View

Beware of Spyware by From OnGuard Online

Case of the Cyber Criminal by OnGuard Online

Follywood Squares by OnGuard Online

ID Theft FaceOff by OnGuard Online

Mission: Laptop Security by OnGuard Online

OnGuard Online by OnGuard Games Online

Phishing Scams by OnGuard Games

Spam Scam Slam by OnGuard Games

Awareness and Accountability in Information Security Training.

Case Study on Email Malware

View

20 Critical Security Controls

A CEO’s Guide to Cybercrime

View

Avoiding Computer Infections

Avoiding Copyright Infringement

Avoiding Social Engineering and Phishing Attacks

Avoid the Pitfalls of Online Trading

Basics of Cloud Computing

Before You Connect a New Computer to the Internet

Beginners’ Guide to Firewalls

Benefits and Risks of Free Email Services

Benefits of BCC (Blind Carbon Copy) in Email

Building an Information Technology Security Awareness and Training Program

Check Your Password - Is It strong?

Choosing and Protecting Passwords

Cookies: Leaving a Trail on the Web

Create Strong Passwords

Cyber Incident Response Guide: A Non-Technical Guide

Cyber Security Getting Started Guide: A Non-Technical Guide

Cyber Security Guides

Cyber Security Guides and Tip Sheets

Cybersecurity Measures for Businesses

Cyber Threats to Mobile Devices

Daily Cyber Tips

Dealing with Cyberbullies

Debunking Some Common Myths

Defending Cell Phones and PDAs Against Attack

Disposing of Old Computers

eBusiness Now Template Gallery

Free Security Scans

Frequently Asked Questions (FAQ) on Malware

Good Security Habits

Guidelines for Publishing Information Online

Holiday Traveling with Personal Internet-Enabled Devices

Home Network Security

How Anonymous Are You?

Identifying Hoaxes and Urban Legends

Information Security Training Requirements: A Role- and Performance-Based Model (Draft)

Keeping Children Safe Online

Laptop Security

Malware

Microsoft Online Safety Tip Cards

Multi-State Information Sharing & Analysis Center (MS-ISAC) Resources & Publications

Peer-to-Peer (P2P) File-Sharing Risks

Phishing

Preventing and Responding to Identity Theft

Protecting Your Privacy

Real-World Warnings Keep You Safe Online

Recognizing and Avoiding Spyware

Recognizing Fake Antiviruses

Recovering from a Trojan Horse or Virus

Recovering from Viruses, Worms, and Trojan Horses

Reporting Virus Incidents

Reviewing End-User License Agreements

Risk Management: A Non-Technical Guide

Risks of File-Sharing Technology

Securing Wireless Networks

Securing Your Web Browser

Securing Your Wireless Network

Security Awareness Quick Start Guide

Shopping Safely Online

Signs of Identity Theft

Small Biz Cyber Security Planning Guide (Federal Communication Commission)

Small Office/Home Office Router Security

Socializing Securely: Using Social Networking Services

State Cyber Security Awareness, Education, & Training Initiatives

State Cyber Security Resource Guide – Awareness, Education and Training Initiatives

Staying Safe on Social Network Sites

STOP. THINK. CONNECT. MobileTip Sheet

STOP. THINK. CONNECT. Tip Sheet

Supplementing Passwords

Tech Support Scams

Ten Cybersecurity Tips for Small Businesses

Ten Ways to Improve the Security of a New Computer

Tips for Using Public Wi-Fi Networks

Top Tips for Internet Security at Work

Train the Trainer Guide: Malware Awareness Module

Understanding Bluetooth Technology

Understanding Denial-of-Service Attacks

Understanding Digital Signatures

Understanding Encryption

Understanding Firewalls

Understanding Hidden Threats: Corrupted Software Files

Understanding Hidden Threats: Rootkits and Botnets

Understanding Internationalized Domain Names

Understanding ISPs (Internet Service Providers)

Understanding Patches

Understanding Voice over Internet Protocol (VoIP)

Understanding Web Site Certificates

Understanding Your Computer: Email Clients

Understanding Your Computer: Operating Systems

Understanding Your Computer: Web Browsers

Using Instant Messaging and Chat Rooms Safely Using Instant Messaging and Chat Rooms Safely

Virus Basics

Viruses

Why is Cyber Security a Problem?

Alerts

Bulletins

Current Activity Updates

Tips

Movies related to Information Security Awareness.pdf

Cyber Security Tips Newsletter

Losing Your Mobile Device Newsletter

Getting in Front of Social Engineering

Password Protection Policy | From SANS Institute, as Microsoft Word Document

Password Protection Policy | From SANS Institute, link to web site

Password Protection Policy | From SANS Institute, as PDF Document

Acceptable Use Policy

Computer Security Policy Templates

Desktop Security Policy Templates

Email Security Policy

Information Security Policy Templates

Internet and Acceptable Use Policy Template: A Non-Technical Guide

Internet Security Policy Templates

Mobile Security Policy Templates

Network Security Policy Templates

Physical Security Policy Templates

Physical Security Policy Templates

Software Installation Policy

State Cyber and Information Security Policies

Workstation Security Policy

America’s Security is Your Responsibility

A Secure Environment

Computer Security

Courier Only When Necessary

Cyber Security Posters

Don’t be Fooled

Don’t Gamble – Challenge Strangers!

Don’t Leave Security Out of Your Planning

If There’s One Word for Security

Internet Security Begins with You

Malware Poster

Multi-State Information Sharing & Analysis Center (MS-ISAC) Posters

Need to Know

Practice Security (Christmas)

Protecting Proprietary Information

Security… Companion of Liberty

Security in a Nutshell

Security Incidents

Security is a State of Mind

Security is Everybody’s Bag (Christmas)

Security is Everyone’s Responsibility

Security is the Best Course to Follow

Security Too Requires Thought

Snooper Bowl

Telephone Security Begins Here

Trade Secrets

Weather or Not… Security

Microsoft Internet Security at Work Presentation

Microsoft Safety Event Presentations

Presentation on Malware

Security our eCity

Information Security

Malware

Cyber Security Quizzes

Malware Awareness Quiz

Malware Awareness Survey

Malware Awareness Test

Microsoft Internet Security Quiz: Test Your Internet Security IQ

A Tried and True Weapon: Social Engineering

Cybercrime Executive Briefing

Microsoft Security Intelligence Report

NIST Small Business Information Security: The Fundamentals NISTIR 7621

Web 2.0 Security for Businesses and Employees

White Papers and Reports

Alerts

Bulletins

CERT

Current Activity

Tips

AOL Computer Checkup

Audit My PC

Bitdefender

ESET Online Scanner

Free Security Check-Ups

Kaspersky Virus Scanner

McAfee Security Scan

Microsoft Safety Scanner

Microsoft Security Essentials

nCircle PureCloud Vulnerability Scanner

Norton Security Scan

Panda Security Antivirus Scan

Qualys Browser Check

QualysGuard Malware Protection

Secunia PSI

Sophos Free Security Tools

StopTheHacker Free Application Vulnerability Scan

Symantec Security Check

Trend Micro HouseCall Virus Scan

Trend Micro Security Assessment

Malware Awareness Stickers

Malware Bookmarks

Cyber Security Awareness Month and Toolkits

MS-ISAC Cyber Security Toolkit

National Cyber Security Awareness Month (NCSAM ) Resource Kit

DoD Information Systems Security Awareness Course | Department of Defense, interactive, 29-lesson course with military and government focus. Works best with Internet Explorer | Duration: 1.5 hours.

InfraGard Awareness Information Security Awareness Training | 14-lesson, non-interactive presentation. 100-question assessment available separately for $25 per person | Duration: 1.5 Hours.

Microsoft Digital Literacy Security and Privacy Course | 5-lesson interactive course with free 30 question assessment. Works with Internet Explorer | Duration: 2 to 3 Hours.

NIH Information Security Awareness Course | National Institute of Health, training for employees in healthcare fields | Duration: 30 to 60 Minutes.

NIH Privacy Awareness Course | National Institute of Health, training for employees in healthcare fields | Duration: 30 – 60 Minutes.

Backup Your Data - SOeC & FBI Cybersecurity Tips

Computer Security

Creating a Secure Password - SOeC & FBI Cybersecurity Tips

Cyber Security Awareness Free Training and Webcasts

Cyber Security Training Videos

Information Technology Security for Small Business

Keep Your Data Safe

Microsoft Internet Security at Work Toolkit

Microsoft Video: Stay Sharp on Internet Safety at Work

Multi-State Information Sharing & Analysis Center (MS-ISAC) Training & Videos

Phishing Scams - SOeC & FBI Cybersecurity Tips

Phishy Home

Phishy Office

Phishy Store

Protect Your Computer from Malware

Public Wi-Fi Networks

Sharing Information: A Day in Your Life

Tips for on the Go

Video Newsletter Series

Wireless Security

Current Activity in Cyber Security

Cybersecurity for Small Business

Home PC Firewall Guide

Looks too Good to be True (Fraud)

Michigan Cyber Initiative

Microsoft Malware Protection Center

Microsoft Safety Scanner

Microsoft Safety & Security Center

Microsoft Virus and Security Solution Center

Microsoft Windows Update

OnGuard Online

OnGuard Online Computer Security

Security Tips

Stay Safe Online

Virus Basics

Apple Airport: Change the Default Admin Password

Apple Airport Wireless Network: Restrict Access by MAC Address

Apple Airport Wireless Network: Set a WPA Password

Department of Defense (DOD) Information Systems Security Awareness Course

Department of Defense (DOD) Training Catalog

InfraGard Awareness Security Awareness Course

Linksys Router: Change the Default Admin Password

Linksys Wireless Network: Restrict Access by MAC Address

Linksys Wireless Network: Set a WPA Password

Microsoft Digital Literacy Computer Security and Privacy Course

National Institute of Health Entire NIH Information Security Awareness Course

Netgear Router: Change the Default Admin Password

Netgear Wireless Network: Restrict Access by MAC Address

Netgear Wireless Network: Set a WPA Password

OnGuardOnline.gov

Password Protect Your Computer in Windows XP

Passwords: The First Step to Safety

Start the Built-in Firewall in Mac OS X

Start the Built-in Firewall in Windows XP

National Webcast Initiative

e-Business Now

NIST Small Business Community (SBC) Computer Security Workshops

Courses

Browse free training courses.

View details »

Topics

Some training topics to help you get started.

View details »

Resources

View sample policies, tip sheets, and more.

View details »

Announcements

See what's new since you last visited.

View details »

Forms

Need help keeping track of your training? Browse our free forms.

View details »

Contact

Send me an email, share your thoughts.

View details »