0% found this document useful (0 votes)
81 views2 pages

Wombat Sentinel Training Modules

The Wombat training methodology utilizes research-based Learning Science Principles to enhance cybersecurity education through interactive and gamified modules. These brief, mobile-responsive modules cover various topics such as data protection, email security, and safe web browsing, ensuring accessibility and engagement for users worldwide. The training is designed to change behaviors and reduce risks at all organizational levels while adhering to accessibility standards.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views2 pages

Wombat Sentinel Training Modules

The Wombat training methodology utilizes research-based Learning Science Principles to enhance cybersecurity education through interactive and gamified modules. These brief, mobile-responsive modules cover various topics such as data protection, email security, and safe web browsing, ensuring accessibility and engagement for users worldwide. The training is designed to change behaviors and reduce risks at all organizational levels while adhering to accessibility standards.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

A Unique, Effective Approach to Interactive Training

The Wombat training methodology is based on research-proven Learning Science Principles that help to elevate the effectiveness
of cybersecurity education. The interactive modules have earned kudos from customers and end-users alike, and they can help
change behaviors and reduce risk at every level of your organization:
• Modules are brief and focused. Standard-length modules • Mobile-responsive options allow users to take training
generally take 10 to 15 minutes to complete; mini-modules anytime, anywhere, on any device. These modules also
are designed to be completed in 5 to 7 minutes. conform to the U.S. Section 508 standard and the Web
• Flexible, on-demand format minimizes disruption to daily Content Accessibility Guidelines (WCAG) 2.0 AA standard.
work routines. • All modules (except PHI) are available in bordering 30
• Gamification techniques and interactivity keep end users languages. Professionally translated and localized content
engaged. Employees set the pace and receive feedback delivers high-quality, engaging content for employees around
throughout. the globe.

Data Protection and Destruction – Teaches Email Security or Anti-Phishing Phyllis™ –


employees how to apply best practices Teaches users to identify and avoid
related to secure handling and storage of manipulative content, malicious and disguised
sensitive data throughout its life cycle. links, dangerous attachments, inappropriate
data requests, and other threats. (This game-
based training is available in two formats.)

General Data Protection Regulation: Mobile App Security – Shows users how to
A Practical Overview – Instructs users research applications and the implications of
about their role in GDPR compliance; how to dangerous permissions.
make the right decisions about the data they
create and handle; and the consequences of
non-compliance. (mini-module)

Mobile Device Security – Explains Password Security – Teaches your


important physical and technical safeguards, employees how to create strong passwords,
as well as ways to improve the security of and explains best practices for keeping
mobile communications and connections. passwords safe.

Payment Card Industry Data Security Personally Identifiable Information –


Standard – Helps staff better manage Instructs employees about ways to identify
credit card data; understand PCI DSS PII; best practices for handling, storing, and
requirements; securely handle records and sharing PII; and the fundamental actions to
accounts; and act upon security breaches. take in the event of a PII breach.

Physical Security – Introduces key Protected Health Information – Teaches


components of physical security and helps employees how to safeguard PHI in
employees understand how they can keep accordance with HIPAA guidelines. They
people, areas, and assets more secure. also learn about PHI identifiers and receive
practical guidance for using, disclosing,
transmitting, and storing PHI.

Read full descriptions and demo our modules on our website: [Link]/educate.

© 2008-2017 Wombat Security Technologies, Inc. All rights reserved.


Protecting Against Ransomware – Safe Social Networking – Teaches users
Provides brief but comprehensive training how to safely share and interact on social
about how to recognize and prevent networking sites, and explains common traps
ransomware attacks. The best practices and scams to avoid on these very public
users learn are applicable in fighting other platforms.
phishing and malware-based threats.
(mini-module)

Safer Web Browsing – Shows employees Securing Your Email – Fundamental –


how to avoid common pitfalls and dangers Includes the following four mini-modules,
associated with web browsing and teaches which allow you to deliver brief but actionable
them how to identify potentially dangerous training that targets specific risks to email
URLs, prevent malware and virus downloads, users: Introduction to Phishing; Avoiding
and spot Internet scams. Dangerous Links; Avoiding Dangerous
Attachments; and Data Entry Phishing
(available June 2017).

Security Beyond the Office – Introduces Security Essentials – Introduces users


best practices related to topics such as safe to security issues that are commonly
use of WiFi networks, the dangers of public encountered in day-to-day business and
computers, and practical physical security personal activities. It is an excellent option
measures. for new-hire education and as a yearly
refresher course.

Security Essentials for Executives – Social Engineering – Goes beyond the


Focuses on cybersecurity concerns that are phishing threat to explain dangers associated
unique to senior managers and executives. with smishing, vishing, social media, and in-
The module highlights best practices related person attacks. Users also learn how to spot
to mobile devices, use of non-corporate common social engineering techniques and
networks, physical security, internal and traps.
external meetings, social media, and more.

Travel Security – Teaches users about URL Training or Anti-Phishing Phil™ –


cybersecurity safeguards that can protect Explains how URLs are constructed,
their devices and data while traveling. s common warning signs, and how to identify
(mini-module) and avoid malicious links. (This game-based
training is available in two formats.)

USB Device Safety – Focuses on the


dangers associated with unknown USB
drives and explains how users can protect
their personal and corporate data and
systems when using USB-based devices.
(mini-module)

Read full descriptions and demo our modules on our website: [Link]/educate.

Contact your Sentinel representative for more information

You might also like