trusted source fast turnaround complete support …€¦ · we can also add closed-captioning,...

4
SALES @ ELCINFOSEC.COM ELCINFOSEC.COM +1 (240) 888-0199 INFORMATION SECURITY AWARENESS TRAINING FOR DOMESTIC AND MULTINATIONAL ENTERPRISES Narrative and graphic customization Multi-lingual translation Seamless integration into your intranet Affordable Learning Management System (LMS) hosting SAAS Tracking & Reporting for Audit Compliance FTC, ISO 27000, NIST SP800-16, & HIPPA Compliant ELC Information Security is a leading provider of customized employee security awareness training since 2007. As the cyber security landscape rapidly transforms, we are commited to helping your workforce adapt and meet the challenges of maintaining secure information systems. END TO END SUPPORT. ENTIRE LICENSE PERIOD. FORTUNE 500 COMPANIES TRUST ELC TO TRAIN THEIR EMPLOYEES. CUSTOMIZATION / INTEGRATION IN DAYS,NOT WEEKS COMPLETE SUPPORT TRUSTED SOURCE FAST TURNAROUND LMS HOSTING, TRACKING AND REPORTING. TURN KEY SOLUTIONS

Upload: others

Post on 28-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TRUSTED SOURCE FAST TURNAROUND COMPLETE SUPPORT …€¦ · We can also add closed-captioning, subtitling and translations. Our flexible hosting solutions allow for hosting on either

S A L E S @ E L C I N F O S E C . C O M — E L C I N F O S E C . C O M — + 1 ( 2 4 0 ) 8 8 8 - 0 1 9 9

I N F O R M A T I O N S E C U R I T Y A W A R E N E S S T R A I N I N G F O R D O M E S T I C A N D M U LT I N A T I O N A L E N T E R P R I S E S

• Narrative and graphic customization• Multi-lingual translation

• Seamless integration into your intranet• Affordable Learning Management System (LMS) hosting SAAS

• Tracking & Reporting for Audit Compliance• FTC, ISO 27000, NIST SP800-16, & HIPPA Compliant

ELC Information Security is a leading provider of customized employee security

awareness training since 2007.

As the cyber security landscape rapidly transforms, we are commited to

helping your workforce adapt and meet the challenges of maintaining secure

information systems.

E N D T O E N D S U P P O R T . E N T I R E L I C E N S E P E R I O D .

F O R T U N E 5 0 0 C O M P A N I E S T R U S T E L C T O T R A I N T H E I R E M P L O Y E E S .

C U S T O M I Z A T I O N / I N T E G R A T I O N I N D A Y S , N O T W E E K S

COMPLETE SUPPORT

TRUSTED SOURCE FAST TURNAROUND

L M S H O S T I N G , T R A C K I N G A N D R E P O R T I N G .

TURN KEY SOLUTIONS

Page 2: TRUSTED SOURCE FAST TURNAROUND COMPLETE SUPPORT …€¦ · We can also add closed-captioning, subtitling and translations. Our flexible hosting solutions allow for hosting on either

S A L E S @ E L C I N F O S E C . C O M — E L C I N F O S E C . C O M — + 1 ( 2 4 0 ) 8 8 8 - 0 1 9 9

C U S T O M I Z A T I O N – T A K E C O N T R O L O F Y O U R C O U R S E C O N T E N T

L M S H O S T I N G - Y O U R L M S O R O U R L M S

C L O S E D C A P T I O N I N G - M O R E A C C E S S I B I L I T Y

S U P P O R T - F A S T A N D R E L I A B L E

T R A N S L A T I O N - S E R V E S A M U LT I L I N G U A L W O R K F O R C E

Update your information or make changes any time during the license period.• Logo, Color & Style• Closed Captioning | Subtitling• Narrative, Content Information & Resources• Quiz & Completion Options

Fast and reliable, our Learning Management System (LMS) serves courses anywhere in the world on desktop, laptop and tablet devices. Our courses can also be delivered to you electronically for installation on your LMS.

Our courses optionally provide Closed Captioning | Subtitling for hearing-impaired users.

Included in every license, ELC support is offered during LMS integration and throughout the duration of the license. We offer quick resolution, with most support tickets resolved within four hours. Support for Windows, Mac, and tablet devices.

ELC provides comprehensive international localization for your IT Security Awareness course. We charge a one-time fixed-rate for translation services and we will post our translated courses in just 3 to 4 weeks for your review and comments in any language. Some of the languages we have delivered include:

E L C I N F O S E C . C O M

WHY CHOOSE ELC?

• German• Portuguese• French

• Spanish• Italian• Japanese

• Chinese• ... and more

Page 3: TRUSTED SOURCE FAST TURNAROUND COMPLETE SUPPORT …€¦ · We can also add closed-captioning, subtitling and translations. Our flexible hosting solutions allow for hosting on either

S A L E S @ E L C I N F O S E C . C O M — E L C I N F O S E C . C O M — + 1 ( 2 4 0 ) 8 8 8 - 0 1 9 9

I N F O R M A T I O N S E C U R I T Y

E N G A G I N G A N D C U S T O M I Z A B L E T R A I N I N G

C O U R S E S

We recognize that different industries face their own distinct security risks.

We optimize our interactive courses to address those specific needs, with engaging content and realistic training scenarios.

We customize things like narrative and course content, responsibility contacts, course duration and branding elements. We can also add closed-captioning, subtitling and translations. Our flexible hosting solutions allow for hosting on either your Learning Management System or our own robust LMS.

“We get many comments from end users who like the look and feel of the training, as well as how nicely tailored it is to our company’s policies and internal lingo.”

Choose the topics that meet your training requirements. Customize the narrative text, audio and graphic to fit your organization.

• 22 topics | 35-minutes• Quiz• Configuration options• Customization options• Host on our LMS or your

LMS

1. Social Engineering

2. Phishing

3. Ransomware

4. Email and Messaging

5. Internet Security and Browsing

6. Protected Information

7. Reporting Incidents

8. Acknowledgment

9. Quiz

10. Social Media

11. Remote Computing / Laptop

Security

12. Personal Use of Company Systems

13. BYOD

14. Securing Information with

Encryption

15. Secure Data Disposal

16. Secure Use of Wi-Fi

17. Physical Security

18. Passwords Past and Present

19. Data Leakage

20. Recognizing a Compromised

Computer

21. Personal Cloud and Storage

Devices

22. Insider Threat

23. Personal Computing

24. Advanced Persistent Threat

E L C I N F O S E C . C O M

SECURITY AWARENESS

— I N F O R M A T I O N S E C U R I T Y D I R E C T O R , S E R V I C E S I N D U S T R Y

Page 4: TRUSTED SOURCE FAST TURNAROUND COMPLETE SUPPORT …€¦ · We can also add closed-captioning, subtitling and translations. Our flexible hosting solutions allow for hosting on either

S A L E S @ E L C I N F O S E C . C O M — E L C I N F O S E C . C O M — + 1 ( 2 4 0 ) 8 8 8 - 0 1 9 9

I N F O R M A T I O N S E C U R I T Y A W A R E N E S S

HEALTHCARE

Hospitals and health care organizations face specific challenges in data protection and

unique security threats. ELC Information Security Awareness for Healthcare training is

designed for all employees and contractors that have access to information systems. We

offer two courses that include general internet security training and an intensive course

that trains users against Ransomware and Phishing hacking.

Security Awareness Training Healthcare

Ransomware and Phishing Healthcare

• 25-minute narrative• 15 question quiz• Customizble narrative• Customizable quiz• Host on our LMS or your

LMS

Dial in your Security Awareness Training with this short, but intensive specialized course from ELC. We focus on the two most common sources of data breaches in hospital and health care settings, ransomware and phishing attacks.

1. Social Engineering2. Phishing3. Ransomware4. Email and Messaging5. Internet Security and Browsing6. Protected Information7. Reporting Incidents8. Acknowledgment9. Quiz10. Social Media11. Remote Computing / Laptop

Security12. Personal Use of Company

Systems13. BYOD14. Securing Information with

Encryption15. Secure Data Disposal16. Secure Use of Wi-Fi17. Physical Security18. Passwords Past and Present

1. Phishing

• Methods of Deception (spear phishing,

whale phishing, cat phishing)

• Examples of Phishing emails

2. Ransomware

• Overview of Ransomware in Healthcare

environments

• Ransomware in the news