Keep your company’s confidential information safe with our employee identity theft training.

Empower yourself with our identity theft training: Learn to guard against thieves from stealing and misusing your identity.

Security Awareness

Our Client

What is Identity theft Training

Our identity theft training can help you to safeguard yourself and your business from identity thieves. First, we’ll help you understand why learning about identity theft is so important. We’ll help you to understand the risks that you face. Identity theft is a serious crime. Not only can it cause financial and reputational losses, you can end up with other serious problems that can persist for years after the original offense.

As you go through the identity theft training course, you’ll learn to identify the danger signs, and how to react to them. We’ll give you some practical advice on protecting yourself. You’ll learn about the steps to help you ensure that your identity hasn’t been stolen.

We’ll also introduce you to the common myths about ‘preventing identity theft’ that don’t help at all. By the end of this training, we aim to equip you with tools to safeguard yourself from identity thieves, and how to react if you realize that your identity has been stolen.

Course Description

CategoryInformation Security
Course NameAvoiding Identity theft
Duration30 mins
Certificate IncludedYes
Languages English
Course TypeInteractive online training
FormatLM-light, SCORM 1.2
Supported DevicesDesktop/Laptop, Tablet, Phone
Last UpdatedJune 30, 2021

What you’ll learn

  • What is identity theft, who it affects, and what problems it can cause
  • What is GLBA, and how it applies to banks
  • How identity theft happens
  • How to prevent identity theft
  • What are red flags
  • How to identify a red flag, and respond to it.


  1. Avoiding identity theft
  2. Structure of avoiding identity theft training
  3. What is identity theft?
  4. Potential impact of identity theft
  5. Identity theft and computer crime
  6. How identity theft happens
  7. Identity theft via Mail theft
  8. Identity theft via Dumpster diving
  9. Identity theft via Burglary and Car prowl
  10. Identity theft via Fake websites and emails
  11. Identity theft via Bribery and Corrupt employees
  12. Identity theft via Password cracking
  13. Other examples of Identity theft
  14. What is Mail redirection
  15. What happens after identity theft?
  16. Preventing identity theft
  17. Basic principles of identity protection
  18. Can I refuse to supply information?
  19. Dealing with paper documents
  20. Paper documents identity thieves look for
  21. Taking care of your personal information online
  22. Check to see if SSL is enabled
  23. Check the address pan
  24. Check the lock icon
  25. Driver’s license and other cards
  26. Other threats and countermeasures
  27. Spotting and reacting to identity theft

Who Should Attend?

  • IT security staff who need to expand their understanding of their attack surface
  • System and network administrators who want to defend their systems against social engineering attacks
  • Staff members that use PCs, laptops, and mobile devices to connect with office network

Why emPower

100s of customers

  • 14+ Years of experience in working with small to large businesses from different industries
  • 95% customer retention

Customer Experience

  • 24x7 dedicated support and toll free number
  • 99%+ guaranteed uptime

Extremely Cost-effective

  • As low as $0.99/user/yr
  • We will match or better the price of your current LMS

Effective Courses

  • Each course is 20-40 min long to ensure engagement with quizzes and certificate
  • SCORM 1.2 Compliant


  • No setup costs
  • We deploy your customized solution in less than 48 hours

Our Achievements

Here you can review some statistics about our Education Center

Individual Users

Start Your Certification Course Today

The most effective way to avoid identity theft is to minimize the personal information you share with others. This applies especially to the Internet. Be cautious with the information that you share online. This includes the personal information you expose in your social media profiles.

  1. Never share your personal information unless it’s absolutely necessary.
  2. Keep your tax returns, bank statements, and other sensitive documents safe
  3. Destroy paper documents properly. 
  4. When sharing personal information online, check if the website has a valid SSL certificate
  5. Use safe surfing practices. For more information, look at our safe surfing course.

The most basic strategy to guard yourself from identity theft is to use the 3 Ds. Deter, Detect, and defend. To deter identity theft, be careful with your personal information. 

To detect, be vigilant with your bills and keep an eye on your credit reports. To defend yourself, activate fraud alerts and go to law enforcement as soon as you see signs of a compromise.

If you have spotted signs of identity theft, go to law enforcement immediately. File a report. The police report is vital in re-establishing your credit. It’s the most critical step. Without a police report, many companies and organizations will not be able to help you.

Invest in basic physical and electronic security devices such as lockable file cabinets, antivirus software and computer firewalls for your computers, mobile phones and tablets. Never dispose of sensitive documents without shredding them properly.