Need Cyber Security Training? Meet OttoSecure!

Most data breaches occur when a hacker tricks an employee to click on a link and open a file. In today's world, cyber security awareness is critical for any business. Are your people trained to be cyber safe?

Take your cyber security training seriously — experience OttoSecure.

Get our OttoSecure content FREE with any paid plan before the end of June 2019 (value of $25/user/month)!
Sign up today

You need cyber security training because people are far easier to hack than computers.

You may do training once a year, but months later what will your employees remember? Prevent successful attacks by arming your people with daily online security training with OttoSecure.

Through cyber security training, your learners will discover:

  • How to prevent a successful attack by understanding how criminals use psychology to their advantage
  • How to create and implement a secure password system
  • Often forgotten safe browsing techniques
  • Ways to avoid malware and, in the case of infection, prevent it from spreading
  • How to align physical security and online security in order to create a stronger defense perimeter

OttoSecure Curriculum

OttoSecure offers a robust program designed to keep your business safe from cyber-attacks by making your team your first line of defense.

Within OttoSecure, you'll have access to:

  • 5 topics
  • Over 80 concepts
  • A total of over 320 activities
You can customize the content to align with your internal security practices (or we can customize it for you).

Included in the OttoSecure Cyber Security Curriculum:

Cyber Security Topic: Computer Security

  • Social Media Risks
  • Personal Risk in Social Media
  • Avoiding Phishing in Social Media
  • Social Media and Work
  • Encryption and Security
  • Using WiFi Securely
  • What is a Firewall?
  • How does a Firewall Work?
  • What Browser Should You Use?
  • Why You Should Avoid Adobe Flash
  • Securing Your Devices
  • Securing Your Mobile Phone
  • Using Mobile Apps Safely
  • Using Public WiFi Securely

Cyber Security Topic: Password Security

  • What is Password Security?
  • Weak Password Risks
  • Secure Password Best Practices
  • Protecting Your Passwords
  • Creating a Secure Password
  • Password Crackers
  • Password Encryption
  • Password Systems
  • What is Two-Factor Authentication (2FA)?
  • Using Two-Factor Authentication (2FA)
  • Password Managers

Cyber Security Topic: Social Engineering Security

  • What is Phishing?
  • What Happens in a Phishing Attack?
  • Who Can Be Targeted With a Phishing Attack?
  • What is the Impact of a Successful Phishing Attack?
  • Recovering from a Successful Attack
  • Phishing Attacks: Baiting
  • Phishing Attacks: Fear of Loss
  • Phishing Attacks: Fear of Missing Out
  • Phishing Attacks: Quid Pro Quo
  • Phishing Attacks: Spear Phishing
  • Phishing Attacks: Watering Hole
  • Phishing Attacks: Spoofing
  • Phishing Attacks: Pretexting
  • Preventing Phishing Attacks
  • Preventing Phishing Attacks: Email (Basic)
  • Preventing Phishing Attacks: Email (Advanced)
  • Preventing Phishing Attacks: Phone Calls
  • Preventing Phishing Attacks: In-Person
  • Preventing Phishing Attacks: Smishing
  • Preventing Phishing Attacks: USB Devices
  • Preventing Phishing Attacks: Websites
  • Preventing Phishing Attacks: Social Media
  • Preventing Phishing Attacks: Vishing
  • What is Social Engineering?
  • How do Criminals Use Social Engineering?
  • How to Prevent a Social Engineering Attack
  • What are the Four Social Engineering Methods?
  • Social Engineering Methods: Helpfulness
  • Social Engineering Methods:  Technical
  • Social Engineering Methods:  Familiarity
  • Social Engineering Methods: Intimidation

Cyber Security Topic: Malware

  • What is Malware?
  • Active vs Passive Infections
  • Types of Malware
  • Types of Malware: Adware
  • Types of Malware: Keylogger
  • Types of Malware: Spyware
  • Types of Malware: Ransomware
  • Types of Malware: Worms and Viruses
  • Types of Malware: Trojan Horse
  • The Impact of Malware
  • How Malware Spreads
  • Preventing Malware from Spreading
  • Preventing a Malware Attack
  • Preventing a Malware Attack: Antivirus Scanning
  • Preventing a Malware Attack: Avoiding Bad Neighborhoods
  • Preventing a Malware Attack: Browser Safety
  • Preventing a Malware Attack: Browser Pop-ups
  • Preventing a Malware Attack: What is a Browser Pop-up?
  • Preventing a Malware Attack: Safely Closing a Browser Pop-up
  • Preventing a Malware Attack: Browser Pop-up On-close Attacks
  • Preventing a Malware Attack: Antivirus Software
  • Preventing a Malware Attack: Fake Antivirus Software

Physical Security

  • Defining Physical Security
  • Defining Physical Security
  • Lost or Stolen Mobile Devices
  • Document Security

Experience OttoSecure

OttoSecure is yours when you sign up for any paid OttoLearn plan. That's a $25/user/month value for FREE when you purchase one of our paid OttoLearn plans:

  • Team Plan
  • Growth Plan
  • Enterprise Plan

Content customization packages are available, to match your exact internal security policies.

Sign up for a paid plan & get OttoSecure FREE