RSPA Staff Cybersecurity Training

Product not yet rated

Security courses for all RSPA staff member to complete by  October 31, 2025.

  • Contains 3 Component(s), Includes Credits

    It's hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this course we're going to break down some common cybersecurity terms. We'll define cyberspace, cybersecurity, cybercrime, and cyberterrorism. We'll also go over other familiar terms including malware, phishing attacks and emails, and identity theft.

    It's hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this course we're going to break down some common cybersecurity terms. We'll define cyberspace, cybersecurity, cybercrime, and cyberterrorism. We'll also go over other familiar terms including malware, phishing attacks and emails, and identity theft.

  • Contains 2 Component(s), Includes Credits

    The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this program, we're going go over a system that helps you set unique passwords for each site. We'll also discuss some additional tips for making your passwords more creative.​

    No matter how many times we're told to create strong passwords, or to use different passwords on every site, we just don't do it. It's not convenient. We know the risk, but we think "it won't happen to us." But the minute your information is compromised, and you're on the phone with your bank trying to determine when and how your identity was stolen, and how long it'll take to get access to your money, you'll regret being lazy about passwords. The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this program, we're going go over a system that helps you set unique passwords for each site. We'll also discuss some additional tips for making your passwords more creative.

  • Product not yet rated Contains 3 Component(s), Includes Credits

    If you use the internet, phones, text messages, or social media - so, basically everyone - you need to know about one of the most prominent criminal threats out there: phishing. Phishing is a crime in which the victim is contacted through various platforms with fake messages intending to lure them into clicking a link, downloading a message, or giving out personal information to the criminal. This is an extremely common criminal endeavor and something nearly everyone will encounter in their lives. So, it's important to know what platforms it occurs on, what types of phishing are out there, and how to avoid these attacks in general. That's what we'll cover in this course.

    If you use the internet, phones, text messages, or social media - so, basically everyone - you need to know about one of the most prominent criminal threats out there: phishing. Phishing is a crime in which the victim is contacted through various platforms with fake messages intending to lure them into clicking a link, downloading a message, or giving out personal information to the criminal. This is an extremely common criminal endeavor and something nearly everyone will encounter in their lives. So, it's important to know what platforms it occurs on, what types of phishing are out there, and how to avoid these attacks in general. That's what we'll cover in this course.

  • Contains 2 Component(s), Includes Credits

    This course will address common phone scams, common text scams, and warning signs to be on the lookout for. We'll also talk about how to respond to scammers.

    Perhaps you've received a voicemail claiming that you owe the IRS thousands of dollars. Or a text pops up stating that you're the winner of a random lottery you didn't enter. "Just click the link to receive your winnings..." How do you know if these are factual or if they're scams? What should you do if you suspect a text or call IS a scam? That's what this course is all about. We'll discuss common phone scams, common text scams, and warning signs to be on the lookout for. We'll also talk about how to respond to scammers.

  • Product not yet rated Contains 2 Component(s), Includes Credits

    In this course, we'll discuss why phishing emails are so successful, what you should do if you suspect you've received a phishing email, and the steps to take if you inadvertently click on a link.​​

    You've likely received phishing emails. They're the emails that bait you to click on them. They show up in all forms, from blatantly fake emails, to confusing emails coming from your actual contacts, to emails disguised to look just like your bank or Netflix, or some other trusted provider. They almost always contain a link that they want you to click, or prompt you to fill out a form, or pay money, or otherwise ask you to reveal personal information in some way. In this course, we'll discuss why phishing emails are so successful, what you should do if you suspect you've received a phishing email, and the steps to take if you inadvertently click on a link.

  • Product not yet rated Contains 2 Component(s), Includes Credits

    Cybercriminals use social engineering as a non-technical strategy, relying on human mistakes. What does that all of that really mean? That's what this course is all about.​

    Social engineering is a huge part of your daily cyber threat, and it's important to have an understanding of what it is, how it's used, and what to look for to protect yourself and your company. Social engineering is the use of deception to manipulate individuals into revealing confidential or personal information that may be used for fraudulent purposes. Cybercriminals use social engineering as a non-technical strategy, relying on human mistakes. What does that all of that really mean? That's what this course is all about.

  • Contains 2 Component(s), Includes Credits

    Most of us don't even think about the dangers of constantly navigating the internet. We're connected through our phones, computers, watches, televisions, cars, and even through little speakers at home that are listening to everything we say! In this course, we'll go over the risks and your responsibility, at least in the workplace, to protect yourself and your organization.

    Most of us don't even think about the dangers of constantly navigating the internet. We're connected through our phones, computers, watches, televisions, cars, and even through little speakers at home that are listening to everything we say! In this course, we'll go over the risks and your responsibility, at least in the workplace, to protect yourself and your organization.

  • Product not yet rated Contains 2 Component(s), Includes Credits

    You are responsible for keeping your computer and your personal information safe. That means at home, at work, and anywhere else you happen to be in the world. This course is in place to provide tips on how you should protect yourself and your information.

    You are responsible for keeping your computer and your personal information safe. That means at home, at work, and anywhere else you happen to be in the world. This course is in place to provide tips on how you should protect yourself and your information.

  • Contains 2 Component(s), Includes Credits

    While GDPR is not in effect in the United States, it still affects you, your data, and your company. If you're an EU citizen traveling in the United States, you are still protected by GDPR. This program is intended to give you helpful advice on what GDPR is. This is not, however, a definitive statement of law.​

    Protecting your personal data online is important, especially in this day and age. In this program, we are going to talk about the General Data Protection Regulation, also known as GDPR. While GDPR is not in effect in the United States, it still affects you, your data, and your company. If you're an EU citizen traveling in the United States, you are still protected by GDPR. This program is intended to give you helpful advice on what GDPR is. This is not, however, a definitive statement of law.

  • Product not yet rated Contains 2 Component(s), Includes Credits

    ​The goal of cybersecurity is to protect your devices and your data. How does that work when you're traveling? What are the precautions that you need to take to keep your information safe? What happens if one of your devices gets stolen? What about unsecure Wi-Fi networks? What do you need to be aware of when using public networks? We'll answer these questions and more. We'll also discuss what you should do before you travel, while you're away, and what to do once you're back home.​

    The goal of cybersecurity is to protect your devices and your data. How does that work when you're traveling? What are the precautions that you need to take to keep your information safe? What happens if one of your devices gets stolen? What about unsecure Wi-Fi networks? What do you need to be aware of when using public networks? We'll answer these questions and more. We'll also discuss what you should do before you travel, while you're away, and what to do once you're back home.