article thumbnail

10 Security Awareness Training Topics

Ed App

With the increasing risks of cybercrimes today, it’s no longer enough simply to invest in security software. Malware refers to any malicious software, like viruses and ransomware, engineered to infect devices, aiming to extract and steal information, or damage an organization’s system. Read on to learn more. . Payment Security.

article thumbnail

Words of Wisdom*

Clark Quinn

We got a full fledged authoring suite and asked our trainers to develop courses. They’ve become very good at taking those PDFs and PowerPoints and putting them up online with quiz questions. We strictly firewall off access to the outside, as we don’t want people getting information that hasn’t been vetted internally.

Wiki 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Day 4. Getting to grips with SCORM API

LearnUpon

On day three , we learned that the packaging aspect, or Content Aggregation Model (CAM), defines how an authoring tool or eLearning developer should package their course into a zip file. But given the scrutiny both technologies are under, and their love/hate relationship with firewalls , JavaScript APIs represent a sensible approach.

SCORM 40
article thumbnail

Day 4. How SCORM tracks course content

LearnUpon

On day three , we learned that the packaging aspect, or Content Aggregation Model (CAM), defines how an authoring tool or eLearning developer should package their course into a zip file. But given the scrutiny both technologies are under, and their love/hate relationship with firewalls , JavaScript APIs represent a sensible approach.

SCORM 40