Click Armor Solutions for the Public Sector
Click Armor’s solution includes a fully functioning learning management system that enables easy employee onboarding, notifications and reminders, as well as automated course content scheduling and reporting.
Click Armor’s foundational training courses provide in-depth coverage of security awareness topics for risk and compliance. The interactive approach uses “learning challenges” such as graphic novel scenarios, quizzes and word puzzles to introduce terminology and reinforce knowledge. This approach builds confidence simply and enjoyably.
After learning challenges are completed, students’ knowledge is typically assessed in interactive quiz form and decision-making skills are exercised in immersive simulations. The immediate feedback from these exercises helps students retain knowledge.
Sample of Off the Shelf Foundational Courses
Below is a sampling of courses and outlines that are currently available. For a full syllabus of content currently available on the Click Armor platform please make a request via the Carahsoft sales team.
-
Security Basics
Each lesson has guidance and immersive learning challenges or simulations.
- Suitable variants available for compliance with SOC 2, ISO 27001, CMMC, and PCI security standards
- The importance of working securely
- Phishing risks and best practices
- Social engineering risks and best practices
- Passwords and authentication risks and best practices
- Physical security risks and best practices
- Mobile security risks and best practices
- Wi-Fi security risks and best practices
- Web surfing risks and best practices
- Social media risks and best practices
- Internet risks and best practices
- Working from home risks and best practices
- Final compliance knowledge assessment quiz
-
Gone Phishin’ (Phishing risks)
Each
lesson uses implicit learning quiz lessons to build knowledge and confidence,
plus immersive “virtual inbox phishing simulations” for baseline and final
assessments.
- Impacts from cyber security breaches and
why security awareness is important
- Suspicious senders – Checking sender
names and email addresses for suspicious domains and accounts
- Suspicious links and attachments –
Checking link targets URLs for suspicious domains; and attachment file
extensions
- Suspicious content – Checking content for
common indicators of deception and manipulation, and how to verify requests
- Immersive phishing inbox simulations –
Common types of impersonation and deceptive email messages, using mixes of
senders, links and content
- Multiple versions of Gone Phishin’ are
available:
- A
“Gone Phishin’ Lite” for compliance and confirmation of knowledge (15-20
minutes)
-
Fakes and Frauds (Social engineering)
This
course has a mix of short, informational guidance, plus immersive exercises or
simulations.
- Attacker motivations – Why people should
assume they can be a target
- Profiling – How attackers collect useful information
for attacks
- Pretexts – How attackers create plausible
scenarios for scams
- Softening up – How attackers make
innocent approaches
- Clues and warning signs – What to look
for as indicators of a scam
- Final assessment with immersive social simulations
– Common scams (e.g., helpdesk, credit card, sales scams, trade shows,
invoicing, etc.)
-
Home Alone (Working securely from home)
This
course has a mix of informational guidance and immersive exercises and
simulations.
- How working from home poses security
risks
- Physical security – Keeping workspace and
devices secure
- Portable devices for business – Using
only authorized devices
- Security software – Using proper business
safeguards
- Cloud storage – Using only approved cloud
services
- Phishing and social engineering at home –
Refresher on phishing
- Final assessment with immersive social
simulations – Example situations (e.g., found USB drive)
-
Operational Security (OPSEC)
This
course has a mix of informational guidance and immersive exercises and
simulations.
- How attackers gather useful information
- Social media exposures - oversharing
- Sharing information with friends – need
to know
- Discussions in public places – avoiding
sensitive discussions
- Travel security risks and best practices
- Exploration of the “Kill Chain Awareness”
method of disrupting an attack
- Knowledge verification quiz
-
Passwords and Authentication
Each
lesson has guidance and immersive learning challenges or simulations.
- The importance of protecting passwords
- Creating strong passwords
- Storing passwords
- Using passwords safely
- The importance of “Two-Step” (or
Multi-Factor) Authentication
- Knowledge verification quiz
-
Privacy for All Employees
Each
lesson has guidance and immersive learning challenges or simulations.
- Introduction to privacy
- Personal information
- Collection of personal information
- Purposes for collection
- Meaningful consent
- Protecting personal information
- Final assessment quiz
-
HIPAA for All Employees (Health information protection)