Start a conversation

Proofpoint: Training Module Description

Training Modules

See attached spreadsheet for additional information including module languages. Download

 

Name Type Description Runtime
60 Seconds to Better Security: Adversary-in-the-Middle Attacks Animated Video This video is part of our “60 Seconds to Better Security” series. It explains adversary-in-the-middle (AiTM) attacks, formerly known as man-in-the-middle (MiTM) attacks. 1 minute(s)
60 Seconds to Better Security: Adversary-in-the-Middle Attacks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to avoiding adversary-in-the-middle (AiTM) attacks. This assessment correlates to our 60 Seconds to Better Security: Adversary-in-the-Middle Attacks training. 3 minute(s)
60 Seconds to Better Security: AI Chatbot Threats Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of AI chatbots. 1 minute(s)
60 Seconds to Better Security: AI Chatbot Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to AI chatbots. This assessment correlates to our 60 Seconds to Better Security: AI Chatbot Threats training. 2 minute(s)
60 Seconds to Better Security: How Attackers Use Email Aliases Animated Video This video is part of our 60 Seconds to Better Security series, and explains how attackers use email aliases. 1 minute(s)
60 Seconds to Better Security: Password Sharing Risks Animated Video This video is part of our “60 Seconds to Better Security” series and explains why sharing passwords creates security risks. 1 minute(s)
60 Seconds to Better Security: Password Sharing Risks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the risks of password sharing. This assessment correlates to our 60 Seconds to Better Security: Password Sharing Risks training. 3 minute(s)
60 Seconds to Better Security: Payment Card Skimming Animated Video This video is part of our “60 Seconds to Better Security” series. It will discuss payment card skimming and how it can affect you. 1 minute(s)
60 Seconds to Better Security: Payment Card Skimming Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to payment card skimming. This assessment correlates to our 60 Seconds to Better Security: Payment Card Skimming training. 2 minute(s)
60 Seconds to Better Security: Phishing or Spam? Animated Video This video is part of our “60 Seconds to Better Security” series and explains the difference between phishing and spam emails. 1 minute(s)
60 Seconds to Better Security: Phishing or Spam? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing and spam. This assessment correlates to our 60 Seconds to Better Security: Phishing or Spam? training. 3 minute(s)
60 Seconds to Better Security: Screen Locking Animated Video This video is part of our “60 Seconds to Better Security” series. It will explain screen locking and how it can positively impact you and your organization. 1 minute(s)
60 Seconds to Better Security: Screen Locking Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to screen locking. This assessment correlates to our 60 Seconds to Better Security: Screen Locking training. 3 minute(s)
60 Seconds to Better Security: The Problem With Common Passwords Animated Video This video is part of our 60 Seconds to Better Security series, and explains why using common passwords can be a major security issue. 1 minute(s)
60 Seconds to Better Security: The Problem With Password Reuse Animated Video This video is part of our 60 Seconds to Better Security series, and explains why reusing passwords is a major security gamble. 1 minute(s)
60 Seconds to Better Security: The Problem With Simple Passwords Animated Video This video is part of our 60 Seconds to Better Security series, and explains why you should avoid using simple passwords. 1 minute(s)
60 Seconds to Better Security: What Are Banking Trojans? Animated Video This video is part of our "60 Seconds to Better Security" Series, and explains banking trojans. 1 minute(s)
60 Seconds to Better Security: What Are Banking Trojans? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to banking trojans. This assessment correlates to our 60 Seconds to Better Security - What Are Banking Trojans? training. 2 minute(s)
60 Seconds to Better Security: What Are Bots and Botnets? Animated Video This video is part of our “60 Seconds to Better Security” Series, and explains what bots and botnets are. 1 minute(s)
60 Seconds to Better Security: What Are Bots and Botnets? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to bots and botnets. This assessment correlates to our 60 Seconds to Better Security: What Are Bots and Botnets? training. 2 minute(s)
60 Seconds to Better Security: What Are Browser Cookies? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of browser cookies. 1 minute(s)
60 Seconds to Better Security: What Are Cryptocurrency Miners? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic definition of cryptocurrency miners. 1 minute(s)
60 Seconds to Better Security: What Are Cryptocurrency Miners? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to cryptocurrency miners. This assessment correlates to our 60 Seconds to Better Security: What Are Cryptocurrency Miners? training. 2 minute(s)
60 Seconds to Better Security: What Are Stealers? Animated Video This video is part of our “60 Seconds to Better Security” series. It provides an introduction to stealer malware and explains its value to attackers. 1 minute(s)
60 Seconds to Better Security: What Are Stealers? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to stealers. This assessment correlates to our 60 Seconds to Better Security: What Are Stealers? training. 3 minute(s)
60 Seconds to Better Security: What Is a Data Breach? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of data breaches. 1 minute(s)
60 Seconds to Better Security: What Is a Data Breach? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data breaches. This assessment correlates to our 60 Seconds to Better Security: What Is a Data Breach? training. 1 minute(s)
60 Seconds to Better Security: What Is a Deepfake? Animated Video Learn what deepfakes are and how they can be created. 1 minute(s)
60 Seconds to Better Security: What Is a Macro? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of macros. 1 minute(s)
60 Seconds to Better Security: What Is a Macro? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to macros. This assessment correlates to our 60 Seconds to Better Security: What Is a Macro? training. 2 minute(s)
60 Seconds to Better Security: What Is a Shortened URL? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of shortened URLs. 1 minute(s)
60 Seconds to Better Security: What Is a Shortened URL? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to shortened URLs. This assessment correlates to our 60 Seconds to Better Security: What Is a Shortened URL? training. 2 minute(s)
60 Seconds to Better Security: What Is a Supply Chain? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of supply chains. 1 minute(s)
60 Seconds to Better Security: What Is a TOAD? Animated Video This video is part of our “60 Seconds to Better Security” Series, and explains what telephone-oriented attack delivery (TOAD) is. 1 minute(s)
60 Seconds to Better Security: What Is a TOAD? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to TOAD attacks. This assessment correlates to our 60 Seconds to Better Security: What Is TOAD? training. 2 minute(s)
60 Seconds to Better Security: What Is a VPN Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of virtual private networks. 1 minute(s)
60 Seconds to Better Security: What Is Ad Fraud? Animated Video This video is part of our “60 Seconds to Better Security” series and explains what ad fraud is. 1 minute(s)
60 Seconds to Better Security: What Is Ad Fraud? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to ad fraud. This assessment correlates to our 60 Seconds to Better Security: What Is Ad Fraud? training. 2 minute(s)
60 Seconds to Better Security: What Is an IP Address? Animated Video This video is part of our 60 Seconds to Better Security series, and explains what IP Addresses are. 1 minute(s)
60 Seconds to Better Security: What Is an IP Address? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to IP addresses. This assessment correlates to our 60 Seconds to Better Security: What Is an IP Address? training. 3 minute(s)
60 Seconds to Better Security: What is BEC? Animated Video Learn the basic definition of Business Email Compromise (BEC). 1 minute(s)
60 Seconds to Better Security: What is Credential Compromise? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic definition of credential compromise. 1 minute(s)
60 Seconds to Better Security: What is Credential Compromise? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to credential compromise. This assessment correlates to our 60 Seconds to Better Security: What is Credential Compromise? training. 3 minute(s)
60 Seconds to Better Security: What Is Doxing? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of doxing. 1 minute(s)
60 Seconds to Better Security: What Is Doxing? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to doxing. This assessment correlates to our 60 Seconds to Better Security: What Is Doxing training. 2 minute(s)
60 Seconds to Better Security: What Is Intellectual Property (IP)? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of intellectual property. 1 minute(s)
60 Seconds to Better Security: What Is Intellectual Property (IP)? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Intellectual Property (IP). This assessment correlates to our 60 Seconds to Better Security: What Is Intellectual Property (IP)? training. 3 minute(s)
60 Seconds to Better Security: What is IoT? Animated Video Learn the basic definition of the Internet of Things (IoT). 1 minute(s)
60 Seconds to Better Security: What Is Malspam? Animated Video This video is part of our “60 Seconds to Better Security” Series, and explains what malspam is. 1 minute(s)
60 Seconds to Better Security: What Is Malspam? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to malspam. This assessment correlates to our 60 Seconds to Better Security: What is Malspam? training. 3 minute(s)
60 Seconds to Better Security: What is Phishing? Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic definition of what phishing is. 1 minute(s)
60 Seconds to Better Security: What is Pirated Content? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic definition of pirated content. 1 minute(s)
60 Seconds to Better Security: What is Ransomware? Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic definition of what ransomware is. 1 minute(s)
60 Seconds to Better Security: What Is SEO Poisoning? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of SEO poisoning. 1 minute(s)
60 Seconds to Better Security: What Is SEO Poisoning? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to SEO poisoning. This assessment correlates to our 60 Seconds to Better Security: What Is SEO Poisoning? traning. 2 minute(s)
60 Seconds to Better Security: What Is Smishing? Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic definition of what smishing is. 1 minute(s)
60 Seconds to Better Security: What Is Social Engineering? Animated Video Learn the basic definition of Social Engineering. 1 minute(s)
60 Seconds to Better Security: What Is Spambot Malware? Animated Video This video is part of our “60 Seconds to Better Security” Series, and explains how attackers use spambot malware. 1 minute(s)
60 Seconds to Better Security: What Is Spambot Malware? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to spambot malware. This assessment correlates to our 60 Seconds to Better Security: What Is Spambot Malware? training. 2 minute(s)
60 Seconds to Better Security: What Is Spoofing? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of spoofing. 1 minute(s)
60 Seconds to Better Security: What is Vishing? Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic definition of what vishing is. 1 minute(s)
60 Seconds to Better Security: What Is Whaling? Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic definition of what whaling is. 1 minute(s)
60 Seconds to Better Security: Why Is Security Awareness Training So Important? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will give a basic explanation of why security awareness training is so important. 1 minute(s)
A Change of Location Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows why you shouldn't let your guard down just because you're working from home. 4 minute(s)
A Change of Location Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows why you shouldn't let your guard down just because you're working from home. 4 minute(s)
A Date to Forget Multi-Path Adventure For this Interactive Episode, the most recent case in This City shows why you should always think twice about calls or text messages asking you to confirm payment details. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
A Guide to Insider Threats Animated Video We're often so focused on our enemies we forgot to watch our friends. In this handy guide we'll teach you what to watch out for when it comes to insider threats. 5 minute(s)
A Guide to Physical Security Animated Video Naughty scammers and hackers do sometimes leave their bedrooms! In this handy guide we'll review some physical security tips that will help you avoid being targeted in real-life. 4 minute(s)
A Guide to Social Engineering Animated Video In this handy guide, you will learn all about social engineering and how prevalent it is in cybercrime. By knowing what to look out for, you can avoid becoming a victim of a scam involving social engineering. 5 minute(s)
A Guide to Social Networking Animated Video As Abraham Lincoln once said, "Social media can be a dangerous and misleading place." In this handy guide we'll review how to stay safe when using social media. 5 minute(s)
A Lesson In Phishing Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch reviews some of the most common tactics scammers use in phishing emails. 4 minute(s)
A Pressing Payment Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows how easily spear phishing can happen and what signs you should be on the lookout for. 4 minute(s)
A Sneaking Suspicion Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch explains what insider threats are and how to spot the warning signs. 5 minute(s)
A Sneaking Suspicion Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explains what insider threats are and how to spot the warning signs. 5 minute(s)
A Step Too Far Multi-Path Adventure Just how far will some companies go when using your personal data? What Now Enterprises are faced with a few internal issues when they’re busy launching a new app that has access to a little too much... 12 minute(s)
Abstract Data Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves what can happen when personal data is not protected. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
Access to Data Nano Learning Live Action Video Use this short nano learning as a helpful reminder about access to data. 1 minute(s)
Advanced Persistent Threats (APTs) Interactive This module explores what an APT attack is and identifies actions you can take to help prevent the malware infections that contribute to an APT attack. 6 minute(s)
Agent Smith Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch explores several security risks to avoid when working outside of the office. 5 minute(s)
Agent Smith Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explores several security risks to avoid when working outside of the office. 5 minute(s)
AI-lien Multi-Path Adventure Join us for Security Awareness at the Movies! Can you help director Steven Bielspurg stay true to his cyber-safe-self and deliver AI-lien with a security conscience? 9 minute(s)
All in a Day's Security: Let's Talk Software Updates Live Action Video When most of us hear the term, we think of fixing glitches or adding cool new features. And that’s true — developers are always fine-tuning programs to eliminate small bugs, roll out new tools, and make everything run smoother. But here’s the kicker: The most important updates? They’re the ones that protect your security. This module discusses the importance of software updates. 2 minute(s)
All in a Day's Security: Remote Work Risks Live Action Video In today’s world of remote and hybrid work, staying productive from anywhere is easier than ever. But with that flexibility comes a big responsibility: keeping your devices — and your company’s organization’s data — secure. This module discusses some of the risks you might face working outside a traditional office and what you can do to avoid them. 3 minute(s)
All in a Day's Security: Spotting Sophisticated Phishing Attacks Live Action Video Can you spot a phishing attack? Maybe. But as people get smarter about fraudulent emails, cybercriminals are stepping up their game.This module discusses sophisticated phishing attacks. 3 minute(s)
All in a Day's Security: VAP Account Compromise Live Action Video Why do cybercriminals target certain employees? It’s not random, despite appearances. Very Attacked Persons (or VAPs) as they are known are targeted because they have something attackers really want: access. This module discusses VAP account compromise. 3 minute(s)
Amplify! The Cybersecurity Trivia Game Training Game Welcome to Amplify! This fun and competitive trivia game will test your awareness of various topics, including phishing, remote working, insider threats, ransomware, and physical security. 6 minute(s)
An Education in Reporting Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves what can happen if you fail to report an incident. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
An Unexpected Call Multi-Path Adventure In this Interactive Episode, visit This City and help Frank Cannon in the latest case involving social engineering and phishing. Based on a recent, real-life event, can you help avoid the mistakes that occurred? 12 minute(s)
An Urgent Request Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves the importance acting with caution when receiving urgent requests, especially from someone you don't know. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
Anti-Fraud and Bribery Interactive Understanding the different types of fraud and bribery that can occur is crucial to preventing incidents. This course helps educate users on what fraud and bribery means, as well as how to recognize the key elements and warning signs. End-users will take part in a practicial real-life scenario and be provided with guidance on what to do if they suspect a fraud or bribery incident. 12 minute(s)
Anti-Money Laundering Interactive Money laundering is a really big business for criminals and it is estimated that over one hundred million pounds is laundered through the UK every day! This course will take staff through the different stages of money laundering and why it is a concern, cover the different types of customer due diligence, as well as provide them with some tips to help assess the risks. The course will also touch on the important legal aspects of AML, as well as give guidance to staff on what suspicious activity to look out for, and what responsibilities they have. 12 minute(s)
Anti-Phishing Phil Training Game Help Phil through his undersea cybersecurity adventure and learn how to spot the common ways weblinks are used for phishing. 7 minute(s)
Attack Spotlight: Amazon Phishing Scams Live Action Video Amazon has become a global brand with a huge customer base. Unfortunately, cybercriminals are just as eager to use Amazon-themed phishing attacks to steal personal information. These attacks happen year-round but tend to increase around holidays and events like Amazon Prime Day. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Aviation-Themed BEC Live Action Video Cybercriminals use advanced social engineering methods in business email compromise (BEC) attacks. In some attacks, they target airlines by impersonating aviation entities and trying to charge purported overflight charges. These emails may seem legitimate. However, they aim to trick recipients into sending money. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: BEC Request For Quotation Scams Live Action Video Organizations commonly use email as a primary communication method with customers. Cybercriminals target these dedicated email addresses with request for quotation (RFQ) lures, which are a type of business email compromise (BEC) scam. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Charity Scams Live Action Video Charities and relief programs make it easy for people to give to those in need. A natural disaster or humanitarian crisis can bring out the best in some people. And the worst in others. 3 minute(s)
Attack Spotlight: Conversational Scams Live Action Video Cybercriminals constantly change their tactics to increase the likelihood of a target falling for an attack. One novel method cybercriminals use is to first make contact through SMS messages. SMS phishing, or smishing, often uses conversational lures intended to coax the recipient into a conversation. Learn how to recognize and avoid these attacks. 3 minute(s)
Attack Spotlight: Cryptocurrency Investment Scams Live Action Video Cybercriminals constantly seek innovative ways to profit financially while covering their tracks. Among their many methods are cryptocurrency investment scams. These attacks, which often begin with innocuous messages, start slowly before tricking users into investing significant sums on fake cryptocurrency sites. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Dangerous Invoices Live Action Video Organizations often use email to send and receive invoices. It’s a common business process. They may send PDF or Word attachments, or links to cloud documents or invoicing applications. Cybercriminals mimic these legitimate invoice communications using phishing emails that contain infected files, malicious links, or macro-enabled documents. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Deepfake Job Interviews Live Action Video Cybercriminals are constantly looking for new attack methods. One is using deepfake technology during remote job interviews. Cybercriminals do this to get hired at a target organization. This could then lead to them having access to sensitive data. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: Delivery Smishing Lures Live Action Video The popularity of online shopping and package delivery has led to a wave of cyberattacks using SMS phishing (or “smishing”) lures that appear to be delivery announcements. Cybercriminals know that mobile messages are generally read more quickly and with less scrutiny than email. 3 minute(s)
Attack Spotlight: Docusign Phishing Live Action Video Organizations frequently send and receive electronic forms needing signatures through the DocuSign service. Phishing emails impersonating DocuSign can pose risks to you and your organization. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Error Message Social Engineering Live Action Video While web browsing or opening a document, you have likely encountered an error message at some point. But did you know that cybercriminals can create fake error messages? Cybercriminals use these fake error messages to trick individuals into installing malware on their own devices. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: Extortion Email Fraud Animated Video With most phishing attacks, cybercriminals cast a wide net, sending malicious emails to multiple accounts. But some email-based attacks are far more targeted—and personal. 3 minute(s)
Attack Spotlight: Fake Browser Updates Live Action Video Cybercriminals use a variety of methods to trick users into downloading malware. One tactic cybercriminals use is fake browser updates. These attacks use malicious code injected into otherwise trustworthy websites to produce malicious pop-up windows for alleged browser updates. Downloading this supposed update leads to the installation of malware. Learn how to recognize and avoid these attacks. 3 minute(s)
Attack Spotlight: Fake Voicemail Alerts Live Action Video Common lures like fake delivery, security, and application email notifications are some of cybercriminals’ favorite ways to compromise data and devices. But attacks are constantly evolving, and a new lure has emerged: fake voicemail alerts. 4 minute(s)
Attack Spotlight: Flight Confirmations Scams Live Action Video Scammers take advantage of times of increased travel to carry out flight confirmation scams. Particularly during intense holiday travel seasons, including end-of-year holidays, new year celebrations, and other regional travel times. These scams use phishing lures that mimic flight confirmation messages to steal personal information or credit card details. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Fraudulent Shipping Notifications Live Action Video Phishing attacks often mimic known brands to fool users. Many of these fraudulent emails are disguised to look like messages from shipping organizations, like FedEx and DHL. Cybercriminals use them to take advantage of online purchasing habits, especially during the holiday shopping season, or if they learned that you tend to place a lot of online orders for your organization. 3 minute(s)
Attack Spotlight: Gift Carding Scams Live Action Video Gift carding scams are widely used by attackers, now more than ever. Learn how to recognize when you are in danger of one and how to stay clear of becoming a victim. 3 minute(s)
Attack Spotlight: Holiday Retail Phishing Live Action Video Each year, the holiday shopping season brings with it a surge in related phishing attacks. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Intuit QuickBooks Lures Live Action Video Phishing emails that pose as invoices and requests for payment are common. Researchers have found that Intuit and QuickBooks are among the most-used brands in these phishing attacks—and that the attacks are quite successful at tricking people. 3 minute(s)
Attack Spotlight: Job Offer Scams Live Action Video Scammers are constantly improving their tactics to increase their likelihood of success. One method scammers use is sending recipients tempting job offers to coax them into interacting with the lure. These lures often promise high pay or flexible working arrangements. Interacting with them, though, can lead to credential theft, financial loss, or even identity theft. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: LinkedIn Phishing Attacks Live Action Video If you visit LinkedIn, you know it’s commonly used for professional networking and business-related activities. But did you know that phishing attacks targeting LinkedIn users have significantly increased recently? 3 minute(s)
Attack Spotlight: Malicious Advertising Attacks Live Action Video Conducting online searches through a favorite search engine is a convenient way to find relevant information. Some search engines have ad services, which legitimate organizations can use to push their sites to the top of the search results. Cybercriminals can exploit these digital ad services to promote malicious web sites to the top of search results. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Malicious Browser Extensions Live Action Video You likely have at least one extension active in your browser right now. Browser extensions are very popular and provide a range of helpful, additional functionalities. Many browser extensions also need broad device permissions, potentially including access to sensitive data. Cybercriminals target browser extensions to try to steal passwords, change the content of a webpage, install malware, and more. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Malicious Cloud Applications Live Action Video Many organizations use cloud-based applications to increase efficiency, reduce costs, and mitigate risks. To exploit this, cybercriminals create malicious applications or documents disguised as legitimate tools in these environments. Learn how to recognize and avoid these attacks. 3 minute(s)
Attack Spotlight: Malicious QR Code Reader Applications Animated Video Many people find it convenient to scan a QR code with their smartphones to quickly access more information. Unfortunately, QR codes (a type of barcode) are also convenient for cybercriminals. 3 minute(s)
Attack Spotlight: Malicious Use of ScreenConnect Live Action Video Cybercriminals use whatever methods they can to take control of targeted computers. In some attacks, they use phishing emails to distribute ScreenConnect, a type of remote monitoring and management (RMM) software. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: MFA Fatigue Attacks Live Action Video You may have used multi-factor authentication, also known as MFA. It’s a way to add extra security to your accounts, devices, data, and systems. But attackers can find ways to bypass MFA security. 3 minute(s)
Attack Spotlight: Online Sports Gambling Risks Animated Video Learn to recognize the online sports gambling risks and how to avoid them. 5 minute(s)
Attack Spotlight: Payroll Redirects Live Action Video Cybercriminals are using fraudulent emails to manipulate direct deposit processes—and get their hands on people’s hard-earned money. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Political Phishing Scams Live Action Video Cybercriminals take advantage of heightened emotions and increases in digital communications during election season. Cybercriminals use this to their advantage to craft a range of phishing emails. These emails may impersonate political campaigns, election organizations, or non-profits. Political phishing scams may try to steal credit card information or personal information. Learn how to recognize and avoid these attacks. 3 minute(s)
Attack Spotlight: Popular Event Lures Live Action Video The Olympics. The World Cup. A major baseball game. A world-famous musician going on a global tour. Events like these generate huge amounts of buzz, excitement, and media publicity. Of course, cybercriminals know this, too. Large events—particularly ones that are nationwide or international—provide cybercriminals the perfect cover for sending out phishing emails. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: Remote Support Scams Live Action Video Cybercriminals employ a range of tactics to trick unsuspecting victims. In remote support scams, cybercriminals impersonate technical or customer support call centers. These scams start with a warning of computer issues with the goal of tricking a victim into either giving cybercriminals access to their computer or paying to fix a non-existent problem. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Romance Scams Live Action Video Cybercriminals prey on individuals using any means they can, including attacks aimed at people looking for love and companionship. These romance scams typically occur via messaging apps or dating websites. In either case, the end goal is the same: financial theft. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Tax Authority Impersonation Live Action Video Cybercriminals frequently impersonate other entities in phishing attacks to trick recipients. In some attacks, they impersonate various tax authorities from countries worldwide. These lures are meant to look legitimate and trick recipients into ultimately downloading malicious software (malware). This malware can then be used to conduct espionage or download additional programs. Learn how to recognize and avoid these scams. 4 minute(s)
Attack Spotlight: Tax-Related Phishing Live Action Video Tax season presents a great opportunity for cybercriminals: They know that many people will already be expecting communications related to taxes during this time, such as messages from government tax agencies. Attackers are taking advantage by targeting mailboxes with tax-related phishing emails. 6 minute(s)
Attack Spotlight: Travel-Related Cyber Scams Live Action Video The hospitality industry is always eager to welcome visitors. Unfortunately, cybercriminals are just as eager to lure people into travel-related traps designed to steal money or credit card information. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: Video Conferencing Scams Live Action Video Video teleconferencing services have become essential for meetings and collaboration. Especially for people who work remotely. Their popularity has created opportunities for cybercriminals to target individuals with phishing and sophisticated deepfake technology. Learn how to recognize and avoid these scams. 3 minute(s)
Attack Spotlight: YouTube Malware Live Action Video Watching tutorial videos online can be a great way to quickly learn new skills. But if the videos are about how to access pirated or “cracked” content, they may be intended to trap you—not teach you. And that’s a lesson you don’t want to learn the hard way. Learn how to recognize and avoid these scams. 3 minute(s)
Attacks Targeting Helpdesk Employees Interactive Cybercriminals often target helpdesk employees to compromise an organization. They often impersonate a legitimate employee and use social engineering tactics. This training will help you to learn about attacks that specifically target helpdesk employees. 3 minute(s)
Attacks Targeting Helpdesk Employees Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to attacks that specifically target helpdesk employees. This assessment correlates to our Attacks Targeting Helpdesk Employees training. 3 minute(s)
Attacks Using Spoofed Phone Numbers Interactive Some BEC attacks go beyond email. Sometimes attackers will follow up a BEC email with a call from a spoofed phone number. A call like this can make the malicious email seem more legitimate—and instill a sense of urgency. This training will help you to learn about BEC attacks that use spoofed phone numbers. 3 minute(s)
Attacks Using Spoofed Phone Numbers Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to attacks using spoofed numbers. This assessment correlates to our Attacks Using Spoofed Phone Numbers training. 3 minute(s)
Australia's Privacy Act Interactive This training discusses Australia's Privacy Act and its important differences from the GDPA. <strong><em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em></strong> 15 minute(s)
Avoiding Compliance Pitfalls Interactive “Compliance” refers to how an organization follows relevant laws and regulations. Different organizations have different compliance requirements. But there are some common mistakes that can put compliance at risk, and it's crucial that you know how to avoid them. 2 minute(s)
Avoiding Compliance Pitfalls Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to preventing compliance pitfalls. 2 minute(s)
Avoiding Compliance Pitfalls Animated Video “Compliance” refers to how an organization follows relevant laws and regulations. Different organizations have different compliance requirements. But there are some common mistakes that can put compliance at risk, and it's crucial that you know how to avoid them. 2 minute(s)
Avoiding Compliance Pitfalls Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to compliance. This assessment correlates to our Avoiding Compliance Pitfalls training. 2 minute(s)
Avoiding Dangerous Attachments Interactive Identify and avoid dangerous email attachments 8 minute(s)
Avoiding Dangerous Attachments Interactive Attackers use methods to entice you to open malicious email attachments through fear, curiosity, and urgency. This module will explain how to identify and avoid dangerous email attachments. 10 minute(s)
Avoiding Dangerous Links Interactive Recognize common email traps and avoid dangerous links 9 minute(s)
Backup Bob Live Action Video This video is part of The Cyber Guys Series. This comedy sketch explains how phishing emails and risky content can lead to ransomware infections. 3 minute(s)
Backup Bob Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explains how phishing emails and risky content can lead to ransomware infections. 3 minute(s)
BEC Attacks: Common Themes Animated Video This video training will help you understand security risks regarding Business Email Compromise (BEC). 3 minute(s)
BEC Attacks: Common Themes Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to business email compromise attacks. This assessment correlates to our BEC Attacks: Common Themes training. 3 minute(s)
BEC Attacks: Invoice Fraud Interactive Business email compromise (BEC) is a widespread, highly damaging type of email fraud. It overshadows most other cybercrimes in terms of monetary loss. In this module, we’ll review invoice fraud, a common BEC attack method. 5 minute(s)
BEC Attacks: Invoice Fraud Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to invoice fraud. This assessment correlates to our BEC Attacks: Invoice Fraud training. 5 minute(s)
BEC Attacks: Protection Techniques Animated Video This video training will help you recognize Business Email Compromise (BEC) attacks and apply methods for avoiding these malicious communications. 3 minute(s)
BEC Attacks: Protection Techniques Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to business email compromise attacks. This assessment correlates to our BEC Attacks: Protection Techniques training. 3 minute(s)
BEC Scams Interactive Business Email Compromise (or BEC) scams are a type of cyber threat that resemble spear phishing emails. This course educates employees on the different types of BEC scams, how to identify and prevent them, and what to do in the event of a suspected attack. 12 minute(s)
Behind Closed Doors Multi-Path Adventure For this Interactive episode, Detective Frank Cannon is back in This City with the latest case involving the risks of Insider Threats and how they can impact upon a workplace. Based on a recent, real-life event, can you avoid what went wrong in this case? 12 minute(s)
Behind Your Back Multi-Path Adventure After hiring a new person to join the What Now Enterprises team, they learn that perhaps all is not as it seems... 12 minute(s)
Being Smart With Social Media Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to using social media. 2 minute(s)
Being Smart With Social Media Animated Video On social media, we’re used to being bombarded with appeals to “connect,” to take part in a survey, or to explore a new website. But we need be cautious with "who" and "what", and know what to do when we spot something suspicious. 2 minute(s)
Being Smart With Social Media Interactive On social media, we’re used to being bombarded with appeals to “connect,” to take part in a survey, or to explore a new website. But we need be cautious with "who" and "what", and know what to do when we spot something suspicious. 2 minute(s)
Being Smart With Social Media Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to social media. This assessment correlates to our Being Smart With Social Media training. 2 minute(s)
Beyond Passwords Interactive Go beyond passwords and learn how to use PINs and passphrases to secure your devices and accounts. 11 minute(s)
Beyond Passwords Interactive This training will help you to learn best practices for creating strong, unique PINs, passwords, and passphrases. 3 minute(s)
Beyond Passwords Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to best practices for creating strong, unique PINs, passwords, and passphrases. This assessment correlates to our Beyond Passwords training. 3 minute(s)
Brazil's LGPD Interactive This training discusses Brazil's LGPD and its similarities and differences to the GDPR. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
Broad-Based Adaptive Learning Assessment Adaptive Learning Assessment This 22-question broad assessment evaluates end users' foundational knowledge of cybersecurity concepts across eight control domains, including: Email &amp; Social Engineering; Mobile Devices; Cloud &amp; Internet Security; Passwords &amp; Authentication; Data Handling &amp; Protection; Physical Security &amp; Remote Working; Insider Threats; and Compliance. 10 minute(s)
Browser Cookies: To Accept or Not Accept Animated Video This video training will help you understand the risks associated with browser cookies. 3 minute(s)
Browser Cookies: To Accept or Not To Accept? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to browser cookies. This assessment correlates to our Browser Cookies: To Accept or Not To Accept? training. 5 minute(s)
Business Email Compromise Interactive Protect your organization from compromised accounts. 13 minute(s)
California Health Privacy Animated Video This video training discusses the California health privacy law and the consequences for not properly protecting health data. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 6 minute(s)
Can QR Codes Be Dangerous? Animated Video This video is part of our "60 Seconds to Better Security" Series, and will discuss how QR codes can be dangerous. 1 minute(s)
Can QR Codes Be Dangerous? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to QR codes. This assessment correlates to our Can QR Codes Be Dangerous? training. 3 minute(s)
Canada’s PIPEDA Interactive This short PIPEDA training course covers Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA). Professor Daniel Solove discusses the basic terminology of the PIPEDA , the 10 Fair Information Principles in incorporates, and the responsibilities of organizations that process personal data. The course has 3 quiz questions. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 8 minute(s)
Catching a Phish... With a Spear Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows some of the clever ways spear phishing emails try to trick you into taking the bait. 4 minute(s)
Catching a Phish… With a Spear Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows some of the clever ways spear phishing emails try to trick you into taking the bait. 4 minute(s)
CCPA Interactive This interactive training will provide you with a short introduction to the California Consumer Privacy Act (CCPA), including key rights and obligations. This module has been recently updated to reflect what the CCPA will require after Jan 1, 2023. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 12 minute(s)
Check, Please! Training Game A strong password can make all the difference when protecting data and sensitive information. Can you correctly follow all the password standards and fulfill the lunch orders? If you don’t meet the requirements, your password might be sent back to the kitchen! 6 minute(s)
Cloud Documents Aren't Always What They Seem Animated Video Cloud services are great for storing and sharing documents and information. Many people and organizations use file-sharing services like Microsoft 365, Google Drive, iCloud, and Dropbox. Unfortunately, cybercriminals know about the cloud, too! 2 minute(s)
Cloud Documents Aren't Always What They Seem Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to interacting with cloud documents. 2 minute(s)
Cloud Documents Aren't Always What They Seem Interactive Cloud services are great for storing and sharing documents and information. Many people and organizations use file-sharing services like Microsoft 365, Google Drive, iCloud, and Dropbox. Unfortunately, cybercriminals know about the cloud, too! 2 minute(s)
Cloud Documents Aren't Always What They Seem Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to cloud documents. This assessment correlates to our Cloud Documents Aren't Always What They Seem training. 2 minute(s)
Common Sense Mobile Device Security Interactive This training will introduce you to the fundamentals of mobile device security. 3 minute(s)
Common Sense Mobile Device Security Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to mobile device security. This assessment correlates to our Common Sense Mobile Device Security training. 3 minute(s)
Confidential Information Live Action Video This video is part of the "Don't Let Thieves In" series. See how walking away from your unlocked computer can let thieves in to your confidential information. 1 minute(s)
Confidential Information Live Action Video This video is part of the "Don't Let Thieves In" series. See how walking away from your unlocked computer can let thieves in to your confidential information. 1 minute(s)
Connecting Safely on the Road: Public Wi-Fi vs. Mobile Networks Animated Video This video training will help you to reduce risks associated with using public Wi-Fi and mobile connections while remote working. 5 minute(s)
Connecting Safely on the Road: Public Wi-Fi vs. Mobile Networks Interactive This training will help you to reduce risks associated with using public Wi-Fi and mobile connections while remote working. 4 minute(s)
Connecting Safely on the Road: Public Wi-Fi vs. Mobile Networks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to using public Wi-Fi and mobile connections while remote working. This assessment correlates to our Connecting Safely on the Road: Public Wi-Fi vs. Mobile Networks training. 4 minute(s)
Controlled Unclassified Information (CUI): An Introduction Interactive This training will introduce you to terms and concepts related to Controlled Unclassified Information (CUI). 4 minute(s)
Controlled Unclassified Information (CUI): An Introduction Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Controlled Unclassified Information (CUI). This assessment correlates to our Controlled Unclassified Information (CUI): An Introduction training. 4 minute(s)
Controlled Unclassified Information (CUI): Marking Basics Interactive This training will introduce you to terms and concepts related to Controlled Unclassified Information (CUI) marking basics. 4 minute(s)
Controlled Unclassified Information (CUI): Marking Basics Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge of terms and concepts related to Controlled Unclassified Information (CUI) marking basics. This assessment correlates to our Controlled Unclassified Information (CUI): Marking Basics training. 4 minute(s)
Cooking With Con! Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch offers tips for avoiding common social engineering scams. 4 minute(s)
Cooking With Con! Live Action Video This video is part of The Cyber Guys Series. This comedy sketch offers tips for avoiding common social engineering scams. 4 minute(s)
Creating Strong, Memorable Passwords: Strategies and Tips Animated Video This video training will help you understand best practices regarding password creation. 3 minute(s)
Creating Strong, Memorable Passwords: Strategies and Tips Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to strong passwords. This assessment correlates to our Creating Strong, Memorable Passwords: Strategies and Tips training. 3 minute(s)
Crossword Puzzle: Insider Threats - Version 1 Training Game This crossword puzzle is a fun way to help reinforce common terms related to insider threats. 5 minute(s)
Crossword Puzzle: Insider Threats - Version 2 Training Game This crossword puzzle is a fun way to help reinforce common insider threat concepts. 5 minute(s)
Crossword Puzzle: Malware - Version 1 Training Game This crossword puzzle is a fun way to help reinforce common malware concepts. 5 minute(s)
Crossword Puzzle: Malware - Version 2 Training Game This crossword puzzle is a fun way to help reinforce common malware concepts. 5 minute(s)
Crossword Puzzle: Password  Security - Version 1 Training Game This crossword puzzle is a fun way to help reinforce common password security concepts. 5 minute(s)
Crossword Puzzle: Password  Security - Version 2 Training Game This crossword puzzle is a fun way to help reinforce common password security concepts. 5 minute(s)
Crossword Puzzle: Social Engineering - Version 1 Training Game This crossword puzzle is a fun way to help reinforce common social engineering concepts. 5 minute(s)
Crossword Puzzle: Social Engineering - Version 2 Training Game This crossword puzzle is a fun way to help reinforce common social engineering concepts. 5 minute(s)
Crypto Fraud Job Scams Live Action Video Cybercriminals have been using fake job recruitment messages to hook victims. After a brief job training period, victims are encouraged to send a cryptocurrency payment. This training will help you learn how to recognize and avoid these scams. 2 minute(s)
Customer Service: Phishing Attacks Interactive Your role in customer service can be a prime target for phishing attacks.The level of access you hold to sensitive data from both customers and your organization is coveted by criminals. This interactive training will help you learn to recognize phishing threats and how to avoid them. 7 minute(s)
Customer Service: Vishing Interactive Customer service is a prime target for vishing attacks because of their access to sensitive data. Learn to recognize vishing attacks threats and how to avoid them. 10 minute(s)
Cyber Fails and How to Avoid Them: Cybersecurity for Teens Ages 14+ Interactive This is an interactive cybersecurity essentials module, intended for teens ages 14 and above. It explores several cybersecurity risks that teens could encounter, and teaches skills that will help them to identify and avoid these risks. 8 minute(s)
Cyber Rhymez Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch gives the basic definition of Business Email Compromise (BEC) scams and warning signs to look out for. 4 minute(s)
Cyber Rhymez Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch gives the basic definition of Business Email Compromise (BEC) scams and warning signs to look out for. 4 minute(s)
Cybersecurity Awareness Overview Interactive Strong cybersecurity practices protect both personal and professional data. This module focuses on managing cybersecurity awareness. 4 minute(s)
Cybersecurity Awareness Overview Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to managing cybersecurity awareness. This assessment correlates to our Cybersecurity Awareness Overview training. 4 minute(s)
Cybersecurity Culture Survey Culture Assessment We define cybersecurity culture as the beliefs, values, and attitudes that drive employee behaviors to protect and defend your organization from cyber attacks. The purpose of this cybersecurity culture survey is to estimate the likelihood an employee will take the appropriate action, assuming they have the right knowledge, motivation, and tools. 5 minute(s)
Cybersecurity: An Introduction Interactive There is a lot to learn and know when it comes to cybersecurity. This training will provide an overview of some of the main topics. 18 minute(s)
Data Entry Phishing Interactive Learn to identify and avoid scams that request personal or sensitive data 8 minute(s)
Data Entry Phishing Interactive While data entry phishing attacks are executed by impostors, the danger is very real. One may not even know a scam has taken place. So it’s important to know what they are and how to guard against them. 4 minute(s)
Data Entry Phishing Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data entry phishing. This assessment correlates to our Data Entry Phishing training. 3 minute(s)
Data Protection and Destruction Interactive Use portable storage safely and properly discard sensitive data 16 minute(s)
Data Protection and Destruction Interactive There can be serious consequences if you don’t protect organizational data throughout its lifecycle, from collection to destruction. This training will introduce you to common safeguards for handling, sharing, and storing sensitive data. 5 minute(s)
Data Protection and Destruction Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data protection and destruction. This assessment correlates to our Data Protection and Destruction training. 5 minute(s)
Data Protection and Destruction: Paper Records Animated Video Managing and protecting paper records is crucial to prevent data breaches or loss. Compared to electronic copies, paper records are more difficult to track and retrieve if they go missing. And they’re harder to restore if destroyed. This video training will help you to recall best practices for discarding sensitive physical data. 4 minute(s)
Data Protection and Destruction: Paper Records Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data protection and destruction of paper records. This assessment correlates to our Data Protection and Destruction: Paper Records training. 4 minute(s)
Data Protection: Digital Signatures & Digital Certificates Interactive This training will introduce you to digital signatures and digital certificates, which are essential tools used in data protection. 5 minute(s)
Data Protection: Digital Signatures & Digital Certificates Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to digital signatures and digital certificates, which are essential tools used in data protection. This assessment correlates to our Data Protection: Digital Signatures & Digital Certificates training. 3 minute(s)
Data Protection: The Musical Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch reviews what data protection is and what to do if a breach occurs. 5 minute(s)
Data Security: What Is Blockchain? Animated Video This video training will help you understand what a blockchain is. 3 minute(s)
Dave's Special Username and Password Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows what can happen if you misuse your privileged access. 3 minute(s)
Dave's Special Username and Password Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows what can happen if you misuse your privileged access. 3 minute(s)
Deadline Demands Multi-Path Adventure In this Interactive Episode, the most recent case in This City demonstrates the importance of security outside of the office and what can happen if physical security is neglected. Inspired by a recent real-life case, can you work alongside Frank Cannon to avoid what went wrong? 12 minute(s)
Device Disaster Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves the importance of using mobile devices responsibly and being extremely careful when using these in both professional and personal life. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
Don't Bet On It Multi-Path Adventure What Now Enterprises start a betting company. What can possibly go wrong? Join the team as they face some data protection disasters that cause mayhem. 12 minute(s)
Double 'Oh... No' Multi-Path Adventure Mistakes happen. But, can you help the What Now Enterprises team avoid a data disaster when dealing with personal data after they’re tasked with recruiting for the secret service? 12 minute(s)
Email Attack Methods: Business Email Compromise Animated Video This video training will help you understand security risks regarding Business Email Compromise (BEC). 3 minute(s)
Email Attack Methods: Business Email Compromise Live Action Video This tongue-in-cheek training will help you understand security risks regarding Business Email Compromise (BEC). 4 minute(s)
Email Attack Methods: Conversation Hijacking Animated Video This video training will help you understand a type of social engineering attack known as conversation hijacking. 3 minute(s)
Email Attack Methods: Conversation Hijacking Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to conversation hijacking. This assessment correlates to our Email Attack Methods: Conversation Hijacking training. 3 minute(s)
Email Attack Methods: Credential Compromise Interactive Credential compromise is one of the most common types of email attack. This module will explain how credential compromise attacks work and what to do if you receive an email that asks for credentials. 2 minute(s)
Email Attack Methods: Credential Compromise Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to credential compromise attacks. 2 minute(s)
Email Attack Methods: Credential Compromise Animated Video Credential compromise is one of the most common types of email attack. This module will explain how credential compromise attacks work and what to do if you receive an email that asks for credentials. 2 minute(s)
Email Attack Methods: Credential Compromise Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to email attack methods. This assessment correlates to our Email Attack Methods: Credential Compromise training. 2 minute(s)
Email Attack Methods: Disguised Links Animated Video Many emails we receive contain links. Some may be safe to click, but others? Not so much. In fact, attackers disguise malicious links in many ways. So, you need to know how to determine a dangerous link from a safe one—and be vigilant with your work and personal emails. This module will explain some tricks to look out for. 2 minute(s)
Email Attack Methods: Disguised Links Live Action Video This tongue-in-cheek training will help you understand security risks regarding malicious disguised links. 3 minute(s)
Email Attack Methods: Malicious Attachments Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to malicious attachments. 2 minute(s)
Email Attack Methods: Malicious Attachments Interactive It’s common to receive an email containing an attachment, but they aren’t always harmless. This module will explain how these type of attacks work and how to spot a malicious attachment. 2 minute(s)
Email Attack Methods: Malicious Attachments Animated Video It’s common to receive an email containing an attachment, but they aren’t always harmless. This module will explain how these type of attacks work and how to spot a malicious attachment. 2 minute(s)
Email Attack Methods: Malicious Attachments Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to malicious attachments. This assessment correlates to our Email Attack Methods: Malicious Attachments training. 2 minute(s)
Email Attack Methods: Malicious Cloud Documents Animated Video Many organizations and individuals use cloud services to store and share documents. Attackers take advantage of people’s familiarity with these tools by using—and abusing—legitimate services to spread dangerous content. This module will explain how to avoid becoming a victim of these sneaky attacks. 2 minute(s)
Email Attack Methods: Malicious Cloud Documents Live Action Video This tongue-in-cheek training will help you understand security risks regarding malicious cloud documents. 3 minute(s)
Email Attack Methods: Malicious Links Interactive While a lot of the links we receive in emails are safe to click, we must be vigilant, both at work and at home. This module will explain how these type of attacks work and how to spot a malicious link. 2 minute(s)
Email Attack Methods: Malicious Links Animated Video While a lot of the links we receive in emails are safe to click, we must be vigilant, both at work and at home. This module will explain how these type of attacks work and how to spot a malicious link. 2 minute(s)
Email Attack Methods: Malicious Links Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to malicious links. 2 minute(s)
Email Attack Methods: Malicious Links Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to malicious links. This assessment correlates to our Email Attack Methods: Malicious Links training. 2 minute(s)
Email Protection Tools Interactive Learn how to protect yourself from phishing scams in combination with email defense tools. 15 minute(s)
Email Protection Tools Interactive This training will introduce you to how email protection tools help keep you and your organization safe. 6 minute(s)
Email Protection Tools Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to email protection tools. This assessment correlates to our Email Protection Tools training. 6 minute(s)
Email Security Training Game Learn to identify phishing emails, dangerous attachments, and other email scams 20 minute(s)
Email Security on Mobile Devices Interactive Identify and avoid phishing emails on mobile devices. 10 minute(s)
Emotional Tactics Live Action Video This tongue-in-cheek training video will introduce you to beginner-level security concepts related to social engineering. 2 minute(s)
Essentials of GLBA Compliance Interactive The Gramm-Leach-Bliley Act, or GLBA, is a federal law in the U.S. that regulates how financial services collect, process, and safeguard their customers’ personal information. 8 minute(s)
Essentials of GLBA Compliance Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Gramm-Leach-Bliley Act, or GLBA. This assessment correlates to our Essentials of GLBA Compliance training. 2 minute(s)
Fake It 'Til You Make It Multi-Path Adventure Join the What Now Enterprises team in this Interactive Episode, based on a recent real-life event. Cyber-criminals are becoming ever more sophisticated. In this latest Episode, your employees will interact with a true-story around deepfake (voice imitation) and sophisticated spear phishing techniques, where their actions will have real consequences. 12 minute(s)
Fake News Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows some of the ways you can avoid falling for fake news. 4 minute(s)
Fake News Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows some of the ways you can avoid falling for fake news. 4 minute(s)
FERPA for Higher Ed Interactive This training will teach the main components of the Family Educational Rights and Privacy Act (FERPA) for colleges and universities. These components include: rights, consent, disclosure, and enforcement. 16 minute(s)
FERPA for Higher Education Interactive Students in the United States are entitled to certain privacy rights regarding their records and information. Learn more about the Federal law that grants and protects these privileges. 3 minute(s)
FERPA for Higher Education Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to FERPA. This assessment correlates to our FERPA for Higher Education training. 3 minute(s)
File Extensions Nano Learning Live Action Video Use this short nano learning as a helpful reminder about file extensions. 1 minute(s)
Finance Professionals: Social Networking Interactive Your role in finance can make you a target for scammers on social networks. The level of access you have to financial systems and important information is coveted by criminals. This interactive training will help you learn to see the risks and dangers of professional social media networks. 7 minute(s)
Freedom of Information Interactive The Freedom of Information Act plays a key role in ensuring transparency and accountability of public funds – whether that be for public bodies, such as council, the NHS, local authorities, etc., but it can also include private organisations who receive grants of public money or where they might be performing public duties. This course considers why Freedom of Information is so important, what types of information is covered and how people should deal with FOIA requests, including when a request can be denied. 12 minute(s)
GDPR: In Action Interactive This training will help you to analyze scenarios and identify opportunities to more effectively meet compliance requirements. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice. </em> 6 minute(s)
GDPR: In Action Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to GDPR. This assessment correlates to our GDPR: In Action training. 6 minute(s)
General Data Protection Regulation (GDPR): Overview Interactive This training will introduce you to the General Data Protection Regulation (GDPR). <em>The content on this site is intended for informational purposes only and should not be construed as legal advice. </em> 8 minute(s)
General Data Protection Regulation (GDPR): Overview Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the GDPR. This assessment correlates to our General Data Protection Regulation (GDPR): Overview training. 3 minute(s)
Generative AI and Data Governance Risks Interactive Using generative AI (GenAI) tools can be a double-edged sword, introducing both opportunities and risks for organizations. Considering the growing use of these technologies, data governance strategies should address how people use AI in various contexts, including GenAI chatbots. This training will help you to learn about generative AI and data governance risks. 4 minute(s)
Generative AI and Data Governance Risks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to generative AI and data governance risks. This assessment correlates to our Generative AI and Data Governance Risks training. 3 minute(s)
Generative AI Tools and Phishing Lures Interactive This interactive training will help you to learn about generative AI tools and phishing lures. 3 minute(s)
Generative AI Tools and Phishing Lures Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to AI tools and phishing. This assessment correlates to our Generative AI Tools and Phishing Lures training. 4 minute(s)
Generative AI: Fake Profiles and Posts Interactive Cybercriminals are using GenAI’s functionalities to launch larger-scale attacks. One approach is to create malicious profiles and content on social media and other sites. This training will introduce you to the security risks posed by AI-generated online profiles. 4 minute(s)
Generative vs. Retrieval Chatbots Interactive This training will help you to learn about AI chatbots and how to protect yourself from risks associated with them. 3 minute(s)
Generative vs. Retrieval Chatbots Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to AI chatbot types. This assessment correlates to our Generative Vs. Retrieval Chatbots training. 4 minute(s)
Generico: A Ransomware Scare Animated Video “The Office” meets “Parks & Recreation,” where we follow the adventures of a typical office that is fraught with all the security risks that every business faces in today’s climate. Based on real-life stories, this episode is centered around ransomware. 4 minute(s)
Gladys Richwoman Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows the risks of oversharing on social media and offers tips for avoiding scams. 5 minute(s)
Gladys Richwoman Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows the risks of oversharing on social media and offers tips for avoiding scams. 5 minute(s)
Global Privacy and Data Protection Interactive This interactive training will provide your global workforce with basic privacy awareness across international jurisdictions. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 25 minute(s)
Gray Areas: Actions That Could Make You Look Like a Malicious Insider Animated Video This video training will help you understand a variety of potential insider threats. 4 minute(s)
Gray Areas: Actions That Could Make You Look Like a Malicious Insider Interactive This training will help you understand a variety of potential insider threats. 5 minute(s)
Gray Areas: Actions That Could Make You Look Like a Malicious Insider Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to a variety of potential insider threats. This assessment correlates to our Gray Areas: Actions That Could Make You Look Like a Malicious Insider training. 4 minute(s)
Guide to URL Isolation Interactive This training module will introduce you to URL isolation. 2 minute(s)
Guide to URL Isolation Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to URL isolation. This assessment correlates to our Guide to URL Isolation training. 3 minute(s)
Hacking 101 Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explains that most hackers are not just teenagers locked away in their bedrooms and how you can avoid becoming their victim. 3 minute(s)
Hazards of Hacking Interactive There’s a huge misconception that hackers are teenagers locked away in their bedroom, but in reality, hacking is now a big business and often used by serious and organised crime gangs. This course will educate staff on the different forms of hacking, how it occurs, and some of the basic prevention measures to help prevent a hack - both personally and within the organisation. 12 minute(s)
Healthcare Data Overview Interactive At the conclusion of this module, employees in the healthcare field will be able to demonstrate a basic understanding of personal data in accordance with local privacy laws. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 7 minute(s)
Healthcare Data Overview Interactive Protecting personal data is crucial in healthcare. There are multiple data collection points between medical procedures, service providers, and insurance companies. These points provide detailed views of healthcare systems. However, personal data in multiple locations creates opportunities for scammers and attackers. 5 minute(s)
Healthcare Data Protection Interactive At the conclusion of this module, you will be able to safeguard personal data in accordance with privacy laws. 8 minute(s)
Healthcare Data Protection Interactive Healthcare workers have access to personal data in both physical and digital forms, including charts, databases, files, and email systems. This module teaches employees in the healthcare field to safeguard personal data in accordance with privacy laws. 4 minute(s)
HIPAA Overview Animated Video This video training introduces you to the Health Insurance Portability and Accountability Act (HIPAA) requirements, concepts, and rules. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 12 minute(s)
Holding Health to Ransom Multi-Path Adventure In this Interactive Episode, visit This City along with Detective Frank Cannon, where the most recent case highlights the dangers of ransomware and how to avoid falling victim to such an attack. Inspired by a real-life case, can you help avoid the mistakes that led to this event? 10 minute(s)
Home Wi-Fi Networks: Security Tips Interactive Home Wi-Fi networks can be just as vulnerable as your local coffee shop’s open public wireless network. And without the proper defenses, your networks can be accessible to anyone with even a modest set of cyber-snooping skills. 5 minute(s)
Home Wi-Fi Networks: Security Tips Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to home Wi-Fi networks. This assessment correlates to our Home Wi-Fi Networks: Security Tips training. 5 minute(s)
Hong Kong's Personal Data Privacy Ordinance Interactive This training introduces you to Hong Kong's Personal Data Privacy Ordinance (PDPO) and the proposed reforms. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
How Attackers Use Email Aliases Live Action Video This video is part of our 60 Seconds to Better Security series, and explains how attackers use email aliases. 1 minute(s)
How Do DLP Solutions Work? Animated Video DLP solutions outline how an organization can protect and share data by implementing technical rules and procedures, and can monitor data in use, data in motion, and data at rest. This video training will help you understand the importance of data loss prevention measures. 3 minute(s)
How Do DLP Solutions Work? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data loss prevention measures. This assessment correlates to our How Do DLP Solutions Work? training. 4 minute(s)
How Malicious Insiders Manipulate Coworkers Animated Video The term “trusted insider” refers to a trusted person in an organization—often an employee. Someone who’s been vetted and granted access to sensitive information, systems, or resources. But a malicious insider is someone who misuses their access for their own purposes, such as revenge or personal gain. This video training will help you recognize and identify the ways malicious insiders can compromise an organization. 2 minute(s)
How Malicious Insiders Manipulate Coworkers Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to malicious insiders. This assessment correlates to our How Malicious Insiders Manipulate Coworkers training. 3 minute(s)
ICS Attack Surface: An Overview Interactive This training introduces you to the attack surface for industrial control systems (ICS). 11 minute(s)
ICS Attack Surface: An Overview Interactive This training introduces you to the attack surface for industrial control systems (ICS). 10 minute(s)
ICS Attacks: Real-World Incidents Interactive This training highlights several real-world attacks on ICS environments. We cover both direct and indirect attacks. 10 minute(s)
ICS Attacks: Real-World Incidents Interactive This training highlights several real-world attacks on ICS environments. We cover both direct and indirect attacks. 10 minute(s)
ICS Security: Objectives and Obstacles Interactive This training introduces you to common cybersecurity objectives and obstacles within industrial control systems (ICS). 9 minute(s)
ICS Security: Objectives and Obstacles Interactive This training introduces you to common cybersecurity objectives and obstacles within industrial control systems (ICS). 8 minute(s)
ICS: An Introduction Interactive This training provides an overview of industrial control systems (ICS)—also known as process control systems (PCS)—and the challenges of securing these environments. 11 minute(s)
ICS: An Introduction Interactive This training provides an overview of industrial control systems (ICS)—also known as process control systems (PCS)—and the challenges of securing these environments. Part one of our five-part ICS series. 11 minute(s)
Impacts of Email Account Compromise Live Action Video This tongue-in-cheek training will help you understand security risks regarding email account compromise. 3 minute(s)
Impacts of Email Account Compromise Animated Video If an attacker gains access to your email account password, that account is considered compromised. This module reviews some of the significant impacts of compromised email accounts. 2 minute(s)
Incident Reporting Interactive Employees play a really important role in helping to improve their organization’s overall security and the reporting of suspected incidents shouldn’t be overlooked. This course will help employees understand why they are encouraged to report an incident, the different types of incidents that might need to be reported, and how to respond. 12 minute(s)
Indications of Account Compromise Interactive This training will help you learn about the indications of account compromise and how to prevent it. 3 minute(s)
Indications of Account Compromise Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to indications of account compromise and how to prevent it. This assessment correlates to our Indications of Account Compromise training. 4 minute(s)
Insider Threat Overview Interactive Recognize insider threats and learn basic best practices to protect against them. 12 minute(s)
Insider Threats Interactive Insider threats can manifest themselves in various ways, in people from all walks of life, and they pose a huge risk to organisations when to compared to external threats. This is simply because an insider already has access to information such as customer data, trade secrets, financial information and/or systems. This course will help staff understand what is meant by the term ‘insider’, help them recognise the warning signs of an insider threat, and understand what to do in response. This training will also help to reduce the risk of individuals posing a threat to the organisation, whether that be unintentionally or carelessly. 12 minute(s)
Internet Enabled Nightmare Multi-Path Adventure Join the What Now Enterprises team in this Interactive Episode, based on a recent real-life event. Can your employees take note of the key learning points around password security and the internet of things, before things start to unravel and not everything is as it seems? 12 minute(s)
Internet of Things: Security Risks Animated Video “The Internet of Things,” or “IoT” refers to the network of internet-connected devices that actively collect and exchange data. But the way IoT devices actively collect and transmit data can pose security risks. Hackers can exploit IoT devices for malicious purposes. Learn how to recognize and avoid these attacks. 4 minute(s)
Internet of Things: Security Risks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to "The Internet of Things", or "IoT" attacks. This assessment correlates to our Internet of Things: Security Risks training. 3 minute(s)
Intro to Phishing Animated Video This training will help you to recognize obvious signs of phishing and apply methods for avoiding malicious emails. 5 minute(s)
Intro to Phishing Interactive This training will help you to recognize obvious signs of phishing and apply methods for avoiding malicious emails. 5 minute(s)
Intro to Phishing Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing. This assessment correlates to our Intro to Phishing training. 5 minute(s)
Introduction to HIPAA for Business Associates Interactive The Health Insurance Portability and Accountability Act of 1996, also known as HIPAA, protects the privacy and security of individuals’ health information. This federal law isn’t only for healthcare providers. It applies to a variety of organizations, including third parties that handle sensitive information for the industry. This interactive training will help you understand HIPAA compliance requirements for business associates. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 4 minute(s)
Introduction to HIPAA for Business Associates Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to HIPAA compliance requirements for business associates. This assessment correlates to Introduction to HIPAA for Business Associates training. 3 minute(s)
Introduction to HIPAA for Covered Entities Interactive HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. This training module will help you to learn about HIPAA compliance requirements. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 5 minute(s)
Introduction to HIPAA for Covered Entities Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to HIPAA compliance requirements.. This assessment correlates to our Introduction to HIPAA for Covered Entities training. 4 minute(s)
Introduction to Phishing Interactive Recognize email traps and avoid phishing scams 19 minute(s)
Introduction to Phishing Emails and Websites Interactive Can your employees recognise the different types of phishing emails and websites? This course will educate your staff on the basics of phishing emails and websites, why fraudsters use them, and how they occur. To complete the course, your employees will need to work through a range of phishing emails, decide whether or not they are trustworthy, and then decide why they have chosen their answer. 12 minute(s)
Introduction to Security Interactive This convenient training module will introduce you to essential beginner-level security concepts: social engineering, phishing, generative AI, web browsing, mobile devices, data protection, travel security, and physical security. 31 minute(s)
Introduction to Security Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to security essentials: social engineering, phishing, generative AI, web browsing, mobile devices, data protection, travel security, and physical security. 31 minute(s)
It Really Is That Easy Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows just how easy it really is to attack people with ransomware. 4 minute(s)
It Really Is That Easy Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows just how easy it really is to attack people with ransomware. 4 minute(s)
Japan's APPI Interactive This training discusses Japan's Act on the Protection of Personal Information (APPI) and gives a basic overview of the requirements. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
Jurassic Hack Multi-Path Adventure Join us for Security Awareness at the Movies! Can you help director Steven Bielspurg stay true to his cyber-safe-self and deliver Jurassic Hack with a security conscience? 9 minute(s)
Laptopia: Email Security Training Game Help Colby and Mic save Laptopia from malicious mail! The Inbox Machine wasn't built to stop malicious emails from getting through. Can you correctly identify all the potential warning signs in the problematic emails and rebuild the machine? 5 minute(s)
Leaky Data Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows the different ways data leaks could happen. 5 minute(s)
Leaky Data Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows why is it important to protect your data. 5 minute(s)
Local Criminals Near Me Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows how criminals can use the information you share on social media. 4 minute(s)
Local Criminals Near Me Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows how criminals can use the information you share on social media. 4 minute(s)
Lock Before You Walk - Dr. Live Action Video This video is part of the "Make a Great Save" Series. Watch our security-minded soccer goalie save another unwitting victim from leaving sensitive information exposed. 1 minute(s)
Lock Before You Walk - Dr. Live Action Video Watch our security-minded soccer goalie save another unwitting victim from leaving sensitive information exposed. 1 minute(s)
Lock Before You Walk - HR Live Action Video Watch our security-minded soccer goalie save another unwitting victim from leaving sensitive information exposed. 1 minute(s)
Lock Before You Walk - Human Resources Live Action Video This video is part of the "Make a Great Save" Series. Watch our security-minded soccer goalie save another unwitting victim from leaving sensitive information exposed. 1 minute(s)
Malicious Emails Nano Learning Live Action Video Use this short nano learning as a helpful reminder about malicious emails. Under 1 min
Malicious Insider Threat Interactive Learn through real-world examples and discover actions that help mitigate malicious threats. 9 minute(s)
Malicious Insider Threats: Why Do They Do It? Interactive Malicious insiders are people who intentionally abuse the access their organization has entrusted them with. Their actions can harm data, systems, property, or other assets—not to mention their colleagues or their organization’s reputation. This module will explain the most common motivations. 2 minute(s)
Malicious Insider Threats: Why Do They Do It? Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to your role in recognizing and reporting malicious insider threats. 2 minute(s)
Malicious Insider Threats: Why Do They Do It? Animated Video Malicious insiders are people who intentionally abuse the access their organization has entrusted them with. Their actions can harm data, systems, property, or other assets—not to mention their colleagues or their organization’s reputation. This module will explain the most common motivations. 2 minute(s)
Malicious Insider Threats: Why Do They Do It? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to insider threats. This assessment correlates to our Malicious Insider Threats: Why Do They Do It? training. 2 minute(s)
Malware & Ransomware Interactive Malware and ransomware can infect your computer or network in a variety of ways. This might be through Adware, Key Loggers or even as a result of clicking on a phishing email. This course will outline the different types of malware and ransomware and help your employees understand some of the basic prevention measures and develop best practices. 12 minute(s)
Malware Attacks Interactive The consequences of a malware attack can be devastating. This module will focus on what malware is, how it can be delivered to devices, and how you can avoid falling for a malware attack. 10 minute(s)
Managing OT Risks: Manufacturing Industry Interactive Technological advancements, interconnectivity, and reliance on digital systems have significantly increased cybersecurity risks in the manufacturing industry. This module discusses managing Operational Technology (OT) risks in the manufacturing industry. 5 minute(s)
Managing OT Risks: Manufacturing Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the manufacturing industry. This assessment correlates to our Managing OT Risks: Manufacturing Industry training. 4 minute(s)
Managing OT Risks: Mining Industry Interactive Mining organizations face significant risks from the convergence of physical and cyber systems. If these risks are not mitigated, the organizations become vulnerable to threats that can halt operations and cause severe consequences. This module discusses Operational Technology (OT) risks in the mining industry. 6 minute(s)
Managing OT Risks: Mining Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the mining industry. This assessment correlates to our Managing OT Risks: Mining Industry training. 4 minute(s)
Managing OT Risks: Oil and Gas Industry Interactive The Oil and Gas industry possesses a broad attack surface due to its interconnected digital systems. This ever-increasing number of internet-connected assets leads to a larger threat surface, increasing cyber risks. Such attacks can have catastrophic consequences. This module discusses how to manage the Operational Technology (OT) risks associated with the Oil and Gas industry. 5 minute(s)
Managing OT Risks: Oil and Gas Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the oil and gas industry. This assessment correlates to our Managing OT Risks: Oil and Gas Industry training. 4 minute(s)
Managing OT Risks: Power Industry Interactive The power industry’s OT and ICS form the backbone of critical infrastructure, ensuring a continuous and reliable electricity supply to homes, businesses, and industries. This module discusses managing Operational Technology (OT) risks in the power industry. 6 minute(s)
Managing OT Risks: Power Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the power industry. This assessment correlates to our Managing OT Risks: Power Industry training. 4 minute(s)
Managing OT Risks: Retail Industry Interactive Retailers are increasingly incorporating IoT devices into their enterprise management systems. This module discusses managing Operational Technology (OT) risks in the retail industry. 5 minute(s)
Managing OT Risks: Retail Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the retail industry. This assessment correlates to our Managing OT Risks: Retail Industry training. 4 minute(s)
Managing OT Risks: Transportation and Logistics Interactive Transportation and logistics are rapidly evolving, relying on Operational Technology (OT) for traffic control, sensors, and road management. While OT improves efficiency, it also introduces cybersecurity risks. This module discusses cybersecurity in OT, risks introduced by IT-OT convergence, common cybersecurity attack types, and real-life examples of cybersecurity attacks. 4 minute(s)
Managing OT Risks: Transportation and Logistics Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the transportation and logistics industries. This assessment correlates to our Managing OT Risks: Transportation and Logistics training. 4 minute(s)
Managing OT Risks: Water and Wastewater Industry Interactive The Water and Wastewater industry delivers vital services that underpin the functioning of all critical infrastructure. Water and wastewater facilities depend on IT and OT systems for their operations. A breach or compromise of these systems could disrupt services and result in significant cascading effects across critical infrastructure. This module discusses how to manage Operational Technology (OT) risks in the Water and Wastewater industry. 5 minute(s)
Managing OT Risks: Water and Wastewater Industry Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT risks in the water and wastewater industry. This assessment correlates to our Managing OT Risks: Water and Wastewater Industry training. 4 minute(s)
MFA Requests Nano Learning Live Action Video Use this short nano learning as a helpful reminder about MFA requests. 1 minute(s)
Mitigating Compromised Devices Interactive Protect your organization from compromised devices. 12 minute(s)
Mitigating Compromised Devices Interactive This training will introduce you to security concepts related to device and account compromise. 6 minute(s)
Mitigating Compromised Devices Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to compromised devices. This assessment correlates to our Mitigating Compromised Devices training. 4 minute(s)
Mobile Apps: 3 Common Threats Animated Video This video training will help you understand how mobile apps can pose a risk to your devices. 3 minute(s)
Mobile Device Defence Interactive Do you have employees who work in multiple locations? Perhaps they use laptops, mobile phones, and other mobile devices for business purposes? Given the widespread use of such devices, it’s no surprise that cybercriminals exploit them, too. This course will help your staff understand why cybercriminals often target mobile devices, why the security of such devices is imperative, and what they can do to avoid becoming a victim. 12 minute(s)
Mobile Device Security Live Action Video This video training will teach you how to secure the data, functions, and communications on your mobile devices. 11 minute(s)
Mobile Device Security Interactive Use important physical and technical safeguards to protect your devices and your data. 22 minute(s)
Mobile Devices and Dangerous Links Interactive This interactive training will help you to safely interact with links when viewing emails on mobile devices. 3 minute(s)
Mobile Devices and Dangerous Links Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to safely interacting with links when viewing emails on mobile devices. This assessment correlates to our Mobile Devices and Dangerous Links training. 4 minute(s)
Mobile Devices: Common Risks and Threats Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to mobile devices. 2 minute(s)
Mobile Devices: Common Risks and Threats Interactive There’s no denying the convenience of mobile devices. They are a fixture in our work and personal lives. We take our smartphones, tablets, smart watches, and health trackers nearly everywhere we go. This portability increases the risk of devices being lost or stolen. But those aren’t the only threats to your devices and the data they hold. 2 minute(s)
Mobile Devices: Common Risks and Threats Animated Video There’s no denying the convenience of mobile devices. They are a fixture in our work and personal lives. We take our smartphones, tablets, smart watches, and health trackers nearly everywhere we go. This portability increases the risk of devices being lost or stolen. But those aren’t the only threats to your devices and the data they hold. 2 minute(s)
Mobile Devices: Common Risks and Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to mobile devices. This assessment correlates to our Mobile Devices: Common Risks and Threats training. 2 minute(s)
Mobile Devices: Cybersecurity Fundamentals Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to keeping mobile devices and data safe. 2 minute(s)
Mobile Devices: Cybersecurity Fundamentals Interactive Smartphones, smart watches, tablets, fitness trackers. Mobile devices that were once only the stuff of science fiction are with us constantly. And criminals are constantly targeting these devices, and the data they contain. So it’s critical to understand the cybersecurity best practices that will help you avoid common threats. 2 minute(s)
Mobile Devices: Cybersecurity Fundamentals Animated Video Smartphones, smart watches, tablets, fitness trackers. Mobile devices that were once only the stuff of science fiction are with us constantly. And criminals are constantly targeting these devices, and the data they contain. So it’s critical to understand the cybersecurity best practices that will help you avoid common threats. 2 minute(s)
Mobile Devices: Cybersecurity Fundamentals Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to mobile devices. This assessment correlates to our Mobile Devices: Cybersecurity Fundamentals training. 2 minute(s)
Mobile Devices: Physical Security Fundamentals Interactive Mobile devices are valuable tools for both work and personal use. But the same features that make them so convenient, such as small size and easy mobility, are also security risks. And replacing these devices can be a big challenge, so that’s why physical security measures are critical. Two simple practices mentioned in this module can help you keep track of your devices. 2 minute(s)
Mobile Devices: Physical Security Fundamentals Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to the physical security of mobile devices. 2 minute(s)
Mobile Devices: Physical Security Fundamentals Animated Video Mobile devices are valuable tools for both work and personal use. But the same features that make them so convenient, such as small size and easy mobility, are also security risks. And replacing these devices can be a big challenge, so that’s why physical security measures are critical. Two simple practices mentioned in this module can help you keep track of your devices. 2 minute(s)
Mobile Devices: Physical Security Fundamentals Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to mobile devices. This assessment correlates to our Mobile Devices: Physical Security Fundamentals training. 2 minute(s)
Mobile Risks: Invasive App Permissions Animated Video This video training will help you understand how app permissions work and recall common permissions that pose the greatest risk. 3 minute(s)
Mobile Risks: Invasive App Permissions Interactive This training will introduce you to how app permissions work and common permissions that pose the greatest risk. 4 minute(s)
Mobile Risks: Invasive App Permissions Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to how app permissions work. This assessment correlates to our Mobile Risks: Invasive App Permissions training. 4 minute(s)
Modern Slavery Act Interactive Understanding the Modern Slavery Act is very important to organisations and their people. It’s a complicated crime and can include a range of issues and offences and is unfortunately something that affects all communities. That’s why it is important we all know how to help one another stay safe. This course will look at what modern slavery is and the legal background, how this can affect individuals and the organisation, and how to spot some of the practical warning signs to look out for. It will also cover what to do if an individual is concerned about someone. 12 minute(s)
Mrs. Doubtfirewall Multi-Path Adventure Join us for Security Awareness at the Movies! Can you help director Steven Bielspurg stay true to his cyber-safe-self and deliver Mrs. Doubtfirewall with a security conscience? 9 minute(s)
Multi-Factor Authentication Interactive Learn best practices for using multi-factor authentication (MFA) to add an extra level of security to your accounts. 6 minute(s)
Multimedia Messaging Service Phishing Attacks Animated Video This video training will help you recognize multimedia messaging service (MMS) phishing attacks and apply methods to avoid falling for them. 3 minute(s)
My Data Has Been Breached. Now What? Interactive This interactive training will help you to learn about common causes of data breaches and the implications of poor data handling. 3 minute(s)
My Data Has Been Breached. Now What? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data breaches. This assessment correlates to our My Data Has Been Breached. Now What? training. 3 minute(s)
Nerves of Steel Multi-Path Adventure What Now Enterprises’ IT Manager, Geoff, is under the spotlight in the latest episode as he faces his toughest challenge yet – ransomware. 12 minute(s)
Not Particularly High Tech Live Action Video This video is part of The Cyber Guys Series. This comedy sketch teaches physical security tips for keeping scammers out of the workplace. 4 minute(s)
Not Particularly High Tech Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch teaches physical security tips for keeping scammers out of the workplace. 4 minute(s)
Not So Secure Printing Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows why you don't necessarily need to be hacked in order to lose important customer and company data. 3 minute(s)
Not So Secure Printing Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows why you don't necessarily need to be hacked in order to lose important customer and company data. 3 minute(s)
Notes From An Expert: Botnets Live Action Video Join one of our Threat Research experts to learn what botnets are and why attackers use this method of attack. 2 minute(s)
Notes From An Expert: Business Email Compromise Live Action Video Join one of our Threat Research experts to learn how to recognize business email compromise scams and understand why attackers use these methods. 3 minute(s)
Notes From An Expert: Credential Phishing Live Action Video Join one of our Threat Research experts to learn how to recognize credential phishing attacks and understand why attackers use these methods. 2 minute(s)
Notes From An Expert: Data Entry Phishing Live Action Video Join one of our Threat Research experts to learn how to recognize data entry phishing scams and understand why attackers use these methods. 3 minute(s)
Notes From An Expert: Ransomware Live Action Video Join one of our Threat Research experts to learn how to recognize ransomware attacks and understand why attackers use these methods. 3 minute(s)
Notes From An Expert: Spear Phishing Live Action Video Join one of our Threat Research experts to learn how to recognize spear phishing attacks and understand why attackers use these methods. 2 minute(s)
Notes From An Expert: Stealers Live Action Video Join one of our Threat Research experts to learn what stealers are and why attackers use this method of attack. 2 minute(s)
Notes From An Expert: Telephone-Oriented Attack Delivery (TOAD) Live Action Video Join one of our Threat Research experts to learn how to recognize TOAD attacks and understand why attackers use these methods. 4 minute(s)
Oh My … Password! Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows why you should secure each account with its own strong, unique password. 4 minute(s)
Oh My … Password! Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows why you should secure each account with its own strong, unique password. 4 minute(s)
OMG...It's a BEC Live Action Video TThis video is part of “The Cyber Guys” Series. This comedy sketch explains what can happen if you fall for a BEC scam. 3 minute(s)
OMG...It's a BEC Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explains what can happen if you fall for a BEC scam. 3 minute(s)
Organizational Data: What To Do If You Suspect a Breach Interactive “Data breach”: a phrase no organization wants to hear. But how does a breach happen? And what should you do about it? This module explains how breaches occur and what steps you should take if you believe a data breach has taken place. 2 minute(s)
Organizational Data: What To Do if You Suspect a Breach Animated Video “Data breach”: a phrase no organization wants to hear. But how does a breach happen? And what should you do about it? This module explains how breaches occur and what steps you should take if you believe a data breach has taken place. 2 minute(s)
Organizational Data: What To Do if You Suspect a Breach Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to organizational data. This assessment correlates to our Organizational Data: What To Do if You Suspect a Breach training. 2 minute(s)
OT Patch and Vulnerability Management Interactive Effectively managing vulnerabilities and applying patches in OT environments are essential to maintaining the safety, security and reliability of our OT systems in industrial operations. This module focuses on Operational Technology (OT) patch and vulnerability management. 4 minute(s)
OT Patch and Vulnerability Management Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT patch and vulnerability management. This assessment correlates to our OT Patch and Vulnerability Management training. 4 minute(s)
OT Risks in Supply Chain Vendor Management Interactive Vendors provide equipment, software, and services directly connected to OT systems; for example, machinery, industrial control systems (ICS), and automation tools. This module focuses on Operational Technology (OT) risks in supply chain vendor management. 4 minute(s)
OT Risks in Supply Chain Vendor Management Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT supply chain vendor management. This assessment correlates to our OT Risks in Supply Chain Vendor Management training. 4 minute(s)
OT Security: Building Access Interactive Building access devices and CCTV systems are prime targets for cyberattacks. These compromised IT components can spread threats to OT environments. This module focuses on building access security systems in Operational Technology (OT) environments. 5 minute(s)
OT Security: Building Access Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to building access security systems in Operational Technology (OT) environments. This assessment correlates to our OT Security: Building Access training. 4 minute(s)
OT Security: Deepfakes Interactive Deepfakes are fake digital media (usually video or audio) created using advanced artificial intelligence (AI) and machine learning techniques. This module focuses on Operational Technology (OT) security measures against deepfakes. 4 minute(s)
OT Security: Deepfakes Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Operational Technology (OT) security measures against deepfakes. This assessment correlates to our OT Security: Deepfakes training. 4 minute(s)
OT Security: Device Asset Management Interactive OT asset management is essential to secure and optimize industrial systems. This module discusses Operational Technology (OT) asset management and its critical aspects, focusing on the basics of OT systems, key risks, and best practices for effective management. 4 minute(s)
OT Security: Device Asset Management Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT asset management. This assessment correlates to our OT Security: Device Asset Management training. 4 minute(s)
OT Security: Insider Threats Interactive An insider threat is someone with authorized access to an organization's systems, network, or facility who can cause harm or compromise security through intentional or unintentional actions. This module focuses on insider threats in Operational Technology (OT) environments and how to mitigate them. 4 minute(s)
OT Security: Insider Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to insider threats in Operational Technology (OT) environments. This assessment correlates to our OT Security: Insider Threats training. 4 minute(s)
OT Security: OT Backup and Recovery Interactive OT systems are essential for manufacturing, energy production, and transportation. They focus on the hardware and software that control physical processes. A failure in these systems can result in downtime, financial losses, and safety hazards. This module focuses on Operational Technology (OT) backup and recovery management. 4 minute(s)
OT Security: OT Backup and Recovery Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Operational Technology (OT) backup and recovery management. This assessment correlates to our OT Security: OT Backup and Recovery training. 4 minute(s)
OT Security: Social Engineering Interactive Social engineering is a manipulation technique that exploits human psychology to deceive individuals into revealing confidential information, granting unauthorized access, or performing actions compromising security. This module focuses on social engineering risks around Operational Technology (OT) security. 5 minute(s)
OT Security: Social Engineering Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to social engineering in OT security. This assessment correlates to our OT Security: Social Engineering training. 4 minute(s)
OT Security: Supply Chain Site Practices Interactive In today's interconnected industrial environments, third-party personnel play a crucial role in maintaining and upgrading OT and ICS. Depending on the task, these personnel may arrive on site for a quick repair or may be present for long-term maintenance or upgrades. This module focuses on Operational Technology (OT) security in supply chain site practices. 5 minute(s)
OT Security: Supply Chain Site Practices Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Operational Technology (OT) security in supply chain site practices. This assessment correlates to our OT Security: Supply Chain Site Practices training. 4 minute(s)
OT Security: Using External Devices in a Controlled Network Interactive Did you know that a single unsanctioned device can jeopardize the security of an entire OT network? This module explores implementing effective access control for external devices in OT systems. 4 minute(s)
OT Security: Using External Devices in a Controlled Network Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to access control for external devices in OT Systems. This assessment correlates to our OT Security: Using External Devices in a Controlled Network training. 4 minute(s)
OT Supply Chain Technology Impacts Interactive Many hardware and software solutions procured today contain components and subcomponents that are not exclusively developed by the solution vendor. This module focuses on how to manage Operational Technology (OT) supply chain impacts. 3 minute(s)
OT Supply Chain Technology Impacts Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OT supply chain technology impacts. This assessment correlates to our OT Supply Chain Technology Impacts training. 4 minute(s)
OWASP API Security Top 10 Threats Interactive Every so often OWASP puts out a list to help you identify and understand major API security threats. Here are ten of the latest risks. 4 minute(s)
OWASP API Security Top 10 Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OWASP’s API Security Top 10 list. This assessment correlates to our OWASP API Security Top 10 training. 4 minute(s)
OWASP Server-Side Request Forgery (SSRF) Interactive In this module, we’ll review Server-Side Request Forgery (SSRF)—a new category in the 2021 update of the OWASP Top 10. SSRF involves web applications fetching remote resources without validating user-supplied URLs. 8 minute(s)
OWASP Top 10 Animated Video The Open Web Application Security Project (OWASP) brings together developers, security professionals, and other volunteers and organizations to improve software security. This module will introduce you to OWASP’s Top 10 list of web application security risks. 3 minute(s)
OWASP Top 10 Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to OWASP’s Top 10 list of web application security risks. This assessment correlates to our OWASP Top 10 training. 2 minute(s)
OWASP Top 10 For LLM Applications Interactive The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation. It focuses on improving software security. OWASP has created a list to help you identify and understand major large language model (LLM) application threats. Here are ten of the most significant risks. 6 minute(s)
OWASP Top 10 For LLM Applications Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the ten of the most significant large language model (LLM) application threats. This assessment correlates to our OWASP Top 10 For LLM Applications training. 6 minute(s)
OWASP: Broken Access Control Interactive In this module, we’ll review the Broken Access Control category from the 2021 update of the OWASP Top 10. This category moved up from the fifth spot in 2017 to the top spot in 2021. According to OWASP, 94% of applications tested included some form of broken access control. 8 minute(s)
OWASP: Broken Access Control Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Broken Access Control category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Broken Access Control training. 3 minute(s)
OWASP: Cryptographic Failures Interactive In this module, we’ll review the Cryptographic Failures category from the 2021 update of the OWASP Top 10. Known as Sensitive Data Exposure in the 2017 update, the name change reflects that cryptographic failures are often the root cause of sensitive data exposure. This category moved up from #3 to #2 in the 2021 update. 8 minute(s)
OWASP: Cryptographic Failures Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Cryptographic Failures category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP 2021: Cryptographic Failures training. 5 minute(s)
OWASP: Identification and Authentication Failures Interactive In this module, we’ll review the Identification and Authentication Failures category from the 2021 update of the OWASP Top 10. Known as Broken Authentication in the 2017 update, the category has been expanded to include identification failures. Failing to protect password data stores is an area of overlap with A02: Cryptographic Failures. 8 minute(s)
OWASP: Identification and Authentication Failures Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Identification and Authentication Failures category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Identification and Authentication Failures training. 8 minute(s)
OWASP: Injection Interactive In this module, we’ll review the Injection category from the 2021 update of the OWASP Top 10. This category fell from the first spot to the third spot in 2021. The updated version of the category now includes Cross-Site Scripting (XSS). 8 minute(s)
OWASP: Injection Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Injection category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP 2021: Injection training. 6 minute(s)
OWASP: Insecure Design Interactive In this module, we’ll review Insecure Design—a new category in the 2021 update to the OWASP Top 10. Insecure design creates a poor foundation for building an application. 8 minute(s)
OWASP: Insecure Design Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Insecure Design category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Insecure Design training. 9 minute(s)
OWASP: Security Logging and Monitoring Failures Interactive In this module, we’ll review the Security Logging and Monitoring Failures category from the 2021 update of the OWASP Top 10. Known as Insufficient Logging and Monitoring in the 2017 update, this category moved up to #9 overall in 2021. 8 minute(s)
OWASP: Security Logging and Monitoring Failures Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Security Logging and Monitoring Failures category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Security Logging and Monitoring Failures training. 5 minute(s)
OWASP: Security Misconfiguration Interactive In this module, we’ll review the Security Misconfiguration category from the OWASP Top 10. This vulnerability moved from #6 in the 2017 update to #5 in 2021. This vulnerability relates to A06: Vulnerable and Outdated Components. 8 minute(s)
OWASP: Security Misconfiguration Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Security Misconfiguration category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Security Misconfiguration training. 6 minute(s)
OWASP: Server-Side Request Forgery (SSRF) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Server-Side Request Forgery (SSRF) category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Server-Side Request Forgery (SSRF) training. 14 minute(s)
OWASP: Software and Data Integrity Failures Interactive In this module, we’ll review Software and Data Integrity Failures, a new category of the OWASP Top 10. Software and Data Integrity Failures focuses on software update risks and Continuous Integration and Continuous Delivery/Deployment (CI/CD) pipelines without verifying integrity. This category also addresses unsigned firmware updates and Insecure Deserialization from OWASP 2017. 8 minute(s)
OWASP: Software and Data Integrity Failures Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Software and Data Integrity Failures category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Software and Data Integrity Failures training. 6 minute(s)
OWASP: Vulnerable and Outdated Components Interactive In this module, we’ll review the Vulnerable and Outdated Components category from the 2021 update of the OWASP Top 10. This vulnerability is threatening to the community, and often encountered in web applications. Known as Using Components with Known Vulnerabilities in the 2017 update, this category moved up from the #9 spot to #6 in 2021. 8 minute(s)
OWASP: Vulnerable and Outdated Components Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Vulnerable and Outdated Components category from the 2021 update of the OWASP Top 10. This assessment correlates to our OWASP: Vulnerable and Outdated Components training. 4 minute(s)
Password Best Practices - Password Management Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to password management. 2 minute(s)
Password Best Practices: Password Management Animated Video This video training will introduce you to beginner-level security concepts related to password management. 2 minute(s)
Password Management Interactive Learn best practices for safely managing passwords. 13 minute(s)
Password Policy Interactive Learn how to create passwords compliant with your company’s policy. 7 minute(s)
Password Security: Third-Party Logins Animated Video This video training will help you understand the security risks regarding third-party logins. 2 minute(s)
PCI Disaster Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves what can happen when PCI DSS regulations are not followed. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 9 minute(s)
PCI DSS Interactive The Payment Card Industry Data Security Standard is administered by the PCI Security Standards Council to prevent payment card fraud and increase the security of confidential payment card information. It is a global data security standard that all organisations, of any size, must adhere to in order to accept payment cards. This course will help employees understand what PCI DSS is, how it protects financial and personal information, and their specific responsibilities in order to comply with PCI DSS and keep payment data secure. 12 minute(s)
PCI DSS: Anti-Tampering Animated Video For credit card companies, preventing fraud is key to maintaining consumer trust. This training will help you understand why payment card companies like MasterCard, Visa, Discover Financial Services, American Express, JCB International, and more rely on PCI DSS to help prevent credit card fraud. 3 minute(s)
PCI DSS: Anti-Tampering Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to PCI DSS anti-tampering. This assessment correlates to our PCI DSS: Anti-Tampering training. 3 minute(s)
PCI DSS: Protecting Cardholder Data Interactive This training will introduce you to key PCI DSS guidelines for protecting cardholder data. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 2 minute(s)
PCI DSS: Protecting Cardholder Data Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to cardholder data. This assessment correlates to our PCI DSS: Protecting Cardholder Data training. 5 minute(s)
PCI Payment Card Data Interactive Our PCI awareness training program, Payment Card Data – PCI, provides PCI training to all employees who handle payment card data. This course provides basic information for a lay audience. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
Perfect Your Password Interactive Still using passwords such as QWERTY, Password and 123456? Having a poor password means that even the best security measures can be easily bypassed. That’s why it’s really important that your employees create really strong passwords and ensure that these passwords are different for every account. This course will teach your employees why passwords are so important to ensuring your organisation is secure, provide them with guidance on how to construct a strong password and give them some practical tips to manage them. 12 minute(s)
Perfecting Passwords Interactive Keeping track of passwords can be challenging. But that’s nothing compared to having your accounts compromised and information stolen! One of the most common problems with passwords … is that they’re common. Another problem: The shorter a password is, the easier it is for attackers to guess. It's crucial you understand how to create strong and secure passwords. 2 minute(s)
Perfecting Passwords Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to passwords. 2 minute(s)
Perfecting Passwords Animated Video Keeping track of passwords can be challenging. But that’s nothing compared to having your accounts compromised and information stolen! One of the most common problems with passwords … is that they’re common. Another problem: The shorter a password is, the easier it is for attackers to guess. It's crucial you understand how to create strong and secure passwords. 2 minute(s)
Perfecting Passwords Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to passwords. This assessment correlates to our Perfecting Passwords training. 2 minute(s)
Personally Identifiable Information Interactive PII is essentially any information, or even any combination of information, that can be easily used to identify someone. It is extremely important from a security perspective, because any disclosure of this type of information, can pose a very real risk of identity theft. PII costs the economy billions each year and is a risk that applies to the organisation, customers, and individuals personally. This course will help staff to identify the different types of PII, the key ways to protect it (both at work and at home), and how to respond to any PII related incidents. 12 minute(s)
Personally Identifiable Information (PII) Fundamentals Interactive In this module, you’ll learn how to protect confidential information about yourself, your employer, and their customers, ensuring compliance with privacy standards and safeguarding sensitive data effectively. 5 minute(s)
Phish Finder: Spotting Warning Signs (Advanced) Interactive With growing public awareness of how to spot a phishing email, attackers are developing phish that are more detailed … more believable … and more difficult to detect. This training will help you to recognize sophisticated phishing techniques and to apply methods for avoiding malicious communications. 6 minute(s)
Phish Finder: Spotting Warning Signs (Advanced) Animated Video With growing public awareness of how to spot a phishing email, attackers are developing phish that are more detailed … more believable … and more difficult to detect. This video training will help you to recognize sophisticated phishing techniques and to apply methods for avoiding malicious communications. 5 minute(s)
Phish Finder: Spotting Warning Signs (Advanced) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to sophisticated phishing techniques. This assessment correlates to our Phish Finder: Spotting Warning Signs (Advanced) training. 3 minute(s)
Phish Finder: Spotting Warning Signs (Beginner) Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to recognizing the warning signs of phishing. 2 minute(s)
Phish Finder: Spotting Warning Signs (Beginner) Animated Video Phishing attacks won’t just go away, so it’s important to learn some of the warning signs to help keep you safe, both at work and at home. This module will explain what to look out for. 2 minute(s)
Phish Finder: Spotting Warning Signs (Beginner) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing. This assessment correlates to our Phish Finder: Spotting Warning Signs (Beginner) training. 2 minute(s)
Phish Finder: Spotting Warning Signs (Intermediate) Animated Video Phishing attacks won’t just go away, so it’s important to learn some of the subtle warning signs to help keep you safe, both at work and at home. This module will explain what to look out for. 2 minute(s)
Phish Finder: Spotting Warning Signs (Intermediate) Interactive Phishing attacks won’t just go away, so it’s important to learn some of the subtle warning signs to help keep you safe, both at work and at home. This module will explain what to look out for. 1 minute(s)
Phish Finder: Spotting Warning Signs (Intermediate) Live Action Video This tongue-in-cheek training reviews the warning signs of ransomware. 3 minute(s)
Phish Finder: Spotting Warning Signs (Intermediate) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing. This assessment correlates to our Phish Finder: Spotting Warning Signs (Intermediate) training. 2 minute(s)
Phishing Emails in Real Life Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows some of the clever ways phishing emails try to trick you into taking the bait. 4 minute(s)
Phishing Emails in Real Life Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows some of the clever ways phishing emails try to trick you into taking the bait. 3 minute(s)
Phishing on Multiplatform Messaging Apps Animated Video This video training will help you recognize more subtle, sophisticated phishing techniques and apply methods for avoiding malicious communications. 3 minute(s)
Phishing on Multiplatform Messaging Apps Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to sophisticated phishing techniques. This assessment correlates to our Phishing on Multiplatform Messaging Apps training. 3 minute(s)
Physical Security Interactive Learn how to use physical security measures to keep your data and assets safe. 14 minute(s)
Physical Security Interactive A better awareness of physical security can help to prevent crime in both the workplace and at home. It’s important that employees always think carefully about their surroundings, keep sensitive and personal information secured away wherever possible, and keep an eye out for would-be criminals. This course will give employees an understanding of why the organisation and they themselves might be targeted, how they can help maintain a high level of physical security, and some of the sneaky tricks criminals use. 12 minute(s)
Physical Security Fundamentals Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to physical security. 2 minute(s)
Physical Security Fundamentals Animated Video Cybersecurity isn’t just about software updates and avoiding fraudulent emails and websites. To protect your data and devices, you need good physical security habits that go beyond cyberspace. It's crucial for you to be aware of and adapt those security habits. 2 minute(s)
Physical Security Fundamentals Interactive Cybersecurity isn’t just about software updates and avoiding fraudulent emails and websites. To protect your data and devices, you need good physical security habits that go beyond cyberspace. It's crucial for you to be aware of and adapt those security habits. 2 minute(s)
Physical Security Fundamentals Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to physical security. This assessment correlates to our Physical Security Fundamentals training. 2 minute(s)
Pick Your Passwords Live Action Video This video is part of The Cyber Guys Series. This comedy sketch gives tips for making a top shelf password. 4 minute(s)
Pick Your Passwords Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch gives tips for making a "top shelf" password. 4 minute(s)
PII Fundamentals Interactive Protect confidential information about yourself, your employer, and your customers. 16 minute(s)
PII in Action Interactive An opportunity to work through a set of scenarios. See how the best practices learned in PII Fundamentals affect real world decisions. 11 minute(s)
PII In Action Animated Video Learn how to apply best practices for working with personally identifiable information (PII). 10 minute(s)
Planet Cyber: Data Protection Live Action Video This humorous faux documentary shows common ways data can fall into the wrong hands. 4 minute(s)
Planet Cyber: Insider Threats Live Action Video This humorous faux documentary shows that insider threats are much more common than you might think! 4 minute(s)
Planet Cyber: Mobile Device Security Live Action Video This humorous faux documentary shows that the security of your mobile phone is extremely important. 4 minute(s)
Planet Cyber: Passwords Live Action Video This humorous faux documentary shows that strong passwords can be the last line of defense against a cyber attack. 4 minute(s)
Planet Cyber: Phishing Live Action Video This humerous faux documentary shows that challenging the alpha over phishing is a difficult but necessary part of survival in the world of cybersecurity. 5 minute(s)
Planet Cyber: Physical Security Live Action Video This humorous faux documentary shows that when it comes to physical security, it's better to be safe than sorry. 5 minute(s)
Planet Cyber: Ransomware Live Action Video This humorous faux documentary shows that ransomware attacks are common and anyone can be a victim. 4 minute(s)
Planet Cyber: Social Engineering Live Action Video This humorous faux documentary shows that if something sounds too good to be true, it probably is too good to be true. 5 minute(s)
Planet Cyber: Social Media Live Action Video This humorous faux documentary shows that a small social media faux pas could become a big deal. 4 minute(s)
Planet Cyber: Working From Home Live Action Video This humorous faux documentary shows that even when working from home you should continue to follow cybersecurity best practices. 4 minute(s)
Planet Surf Live Action Video This video is part of "The Cyber Guys" Series. This faux documentary shows the types of reckless behavior you should avoid while surfing the web. 4 minute(s)
Planet Surf Live Action Video This video is part of "The Cyber Guys" Series. This faux documentary shows the types of reckless behavior you should avoid while surfing the web. 4 minute(s)
Precursor to Phishing Animated Video Learn how scammers use phishing emails to steal your sensitive information and what to look for in suspicious emails. 9 minute(s)
Precursor to Phishing Interactive Learn how scammers use phishing emails to steal your sensitive information and what to look for in suspicious emails. 5 minute(s)
Preventing Credential Compromise Animated Video Attackers use lots of tricks to try to steal login credentials. They send manipulative phishing emails and post misleading content on social media. They also construct lookalike login pages and websites to capture the credentials of unsuspecting users. This module will explain the ways to avoid credential compromise. 2 minute(s)
Preventing Credential Compromise Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to preventing credential compromise. 2 minute(s)
Preventing Credential Compromise Interactive Attackers use lots of tricks to try to steal login credentials. They send manipulative phishing emails and post misleading content on social media. They also construct lookalike login pages and websites to capture the credentials of unsuspecting users. This module will explain the ways to avoid credential compromise. 2 minute(s)
Preventing Credential Compromise Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to credential compromise. This assessment correlates to our Preventing Credential Compromise training. 2 minute(s)
Preventing Malware Infections Animated Video Attackers spread malware in many ways, including phishing emails, malicious cloud documents, and lookalike websites, applications, and pop-up windows. This module reviews four tips to keep in mind. 2 minute(s)
Preventing Malware Infections Live Action Video This tongue-in-cheek training reviews tips for preventing malware infections. 3 minute(s)
Preventing Malware Infections Interactive This training will introduce you to security concepts related to malware. 3 minute(s)
Preventing Malware Infections Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to malware. This assessment correlates to our Preventing Malware Infections training. 2 minute(s)
Preventing Ransomware Incidents Interactive This interactive training will help you to recall methods for avoiding malware and ransomware infections. 4 minute(s)
Preventing Ransomware Incidents Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to ransomware. This assessment correlates to our Preventing Ransomware Incidents training. 3 minute(s)
Preventing Supply Chain Fraud Animated Video This video training will help you understand the steps to take to prevent supply chain fraud. 2 minute(s)
Preventing Supply Chain Fraud Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the prevention of supply chain fraud. This assessment correlates to our Preventing Supply Chain Fraud training. 2 minute(s)
Printing Data Nano Learning Live Action Video Use this short nano learning as a helpful reminder about printing data. 1 minute(s)
Privacy Law in Asia-Pacific Interactive This short Asia-Pacific Privacy Law training course provides an overview of privacy law in the APAC region. The course discusses the varied landscape of APAC data protection laws, the APEC Privacy Framework, the influence of the US and EU, the APEC Cross-Border Privacy Rules (CBPR), the common elements of privacy laws in the region, and notable differences among laws. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 10 minute(s)
Privacy Law in Latin America Interactive This short course provides an overview of Latin American privacy law. The course discusses the robust tradition of habeas data, the common elements of privacy laws in the region, and notable differences among laws. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 7 minute(s)
Privacy Regulation in China Interactive This training discusses privacy regulation in China and its personal data protection requirements. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
Privileged Access Awareness Interactive Privileged access accounts are super helpful in limiting data shared throughout an organisation in a structured and secure way, but they’re also targeted by cyber-criminals. Use this module to educate employees about why privileged access accounts are used and the benefits of doing so, as well as how they can help ensure they’re kept secure. 12 minute(s)
Privileged Users Animated Video Privileged user accounts are often targeted by scammers and other types of attackers. This training will discuss ways to keep your valuable information safe. 12 minute(s)
Privileged Users Interactive Learn what a privleged user is and why scammers want to target individuals with this level of access. 16 minute(s)
Protected Health Information Interactive Learn why and how you should safeguard Protected Health Information (PHI). 11 minute(s)
Protecting Against Ransomware Interactive Learn to recognize and prevent ransomware attacks. 12 minute(s)
Protecting Data Interactive The privacy of the data that your organization holds is vitally important and a breach of data could result not only in a very large fine, but also cause significant reputational damage - resulting in further financial losses. Unfortunately, employees are a really common way through which data can be compromised. That’s why it is important to strengthen your first line of defense, by educating employees on best practices and how to protect data. This course will give your employees an understanding of their responsibilities when dealing with data within the organization, as well as how to handle this data, and the best ways to protect it. 12 minute(s)
Protecting PII Interactive Personally Identifiable Information (PII) is any information used to distinguish or trace an individual’s identity. There are many reasons PII needs protection.This training will help you to understand common safeguards for handling, sharing, and storing sensitive data. 3 minute(s)
Protecting PII Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Personally Identifiable Information (PII). This assessment correlates to our Protecting PII training. 3 minute(s)
Public Data vs. Non-Public Data Interactive Some types of information are more sensitive than others. Organizations use different labels for these data types. But at a basic level, organizational data can be classified in one of two ways: as public data or non-public data. It's crucial that you understand the differences between the two, and how to handle data. 2 minute(s)
Public Data vs. Non-Public Data Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to public and non-public data. 2 minute(s)
Public Data vs. Non-Public Data Animated Video Some types of information are more sensitive than others. Organizations use different labels for these data types. But at a basic level, organizational data can be classified in one of two ways: as public data or non-public data. It's crucial that you understand the differences between the two, and how to handle data. 2 minute(s)
Public Data vs. Non-Public Data Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to organizational data. This assessment correlates to our Public Data vs. Non-Public Data training. 2 minute(s)
Public Wi-Fi: Why It's Risky Animated Video We’ve all come to rely on Wi-Fi no matter where we are, but using public Wi-Fi can be a problem. This module will explain what you can do to use Wi-Fi safely. 2 minute(s)
Public Wi-Fi: Why It's Risky Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to public Wi-Fi. 2 minute(s)
Public Wi-Fi: Why It's Risky Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the risks around using public Wi-Fi. This assessment correlates to our Public Wi-Fi: Why It's Risky training. 2 minute(s)
Publicly Available Information Nano Learning Live Action Video Use this short nano learning as a helpful reminder about publicly available information. 1 minute(s)
QR Code Phishing (Quishing) Interactive This interactive training will help you understand what QR code phishing (quishing) is and how to protect yourself against quishing attacks. 3 minute(s)
QR Code Phishing (Quishing) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to QR code phishing. This assessment correlates to our QR Code Phishing (Quishing) training. 3 minute(s)
Ransomware Is Everywhere Animated Video Ransomware is everywhere and can be either localized, or widespread. This module reviews the two main types of ransomware. 2 minute(s)
Ransomware Is Everywhere Live Action Video Ransomware is everywhere and can be either localized, or widespread. This tongue-in-cheek training reviews the two main types of ransomware. 3 minute(s)
Ransomware Is Everywhere Interactive Ransomware is everywhere and can be either localized, or widespread. This module reviews the two main types of ransomware. 2 minute(s)
Ransomware Is Everywhere Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to ransomware. This assessment correlates to our Ransomware Is Everywhere training. 2 minute(s)
Remote Access Trojans (RATs) Interactive This module focuses on learning what remote access trojans (RATs) are and how you can protect your devices from becoming infected. 6 minute(s)
Remote Working: Recognizing the Risks Interactive The idea of “the workplace” has transformed over the years. Technology now allows many people to work from just about anywhere. But remote working presents opportunities for cyberattackers to target you and your organization. 2 minute(s)
Remote Working: Recognizing the Risks Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to remote working. 2 minute(s)
Remote Working: Recognizing the Risks Animated Video The idea of “the workplace” has transformed over the years. Technology now allows many people to work from just about anywhere. But remote working presents opportunities for cyberattackers to target you and your organization. 2 minute(s)
Remote Working: Recognizing the Risks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to remote working. This assessment correlates to our Remote Working: Recognizing the Risks training. 2 minute(s)
Remote Working: Reducing the Risks Animated Video Remote working has become increasingly common—and convenient. But no matter where you work, your organization’s policies and procedures still apply. They help keep data, devices, and systems secure. This module will explain the protocols and ways to minimize risks, even if they take a bit of extra time when working remotely. 2 minute(s)
Remote Working: Reducing the Risks Interactive Remote working has become increasingly common—and convenient. But no matter where you work, your organization’s policies and procedures still apply. They help keep data, devices, and systems secure. This module will explain the protocols and ways to minimize risks, even if they take a bit of extra time when working remotely. 2 minute(s)
Remote Working: Reducing the Risks Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to remote working. 2 minute(s)
Remote Working: Reducing the Risks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to remote working. This assessment correlates to our Remote Working: Reducing the Risks training. 2 minute(s)
Reporting Live Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows that it is important to report incidents to the right people. 4 minute(s)
Reporting Live Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows that it is important to report incidents to the right people. 4 minute(s)
Reporting Security Incidents Animated Video This video training will help you recognize and proactively report suspicious security incidents. 3 minute(s)
Reporting Security Incidents Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to reporting suspicious security incidents. This assessment correlates to our Reporting Security Incidents training. 3 minute(s)
Reporting Suspicious Emails Animated Video This video training will help you understand the need to participate in phishing defenses and why reporting phishing emails is important. 2 minute(s)
Reverse Proxies and MFA Bypass Interactive A reverse proxy is a service that sits between web servers and the end user, acting as an intermediary. It forwards user requests, such as browser traffic, to the server and sends the responses back to the user. Reverse proxies are commonly used by legitimate organizations—but also by cybercriminals. 3 minute(s)
Reverse Proxies and MFA Bypass Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to reverse proxies. This assessment correlates to our Reverse Proxies and MFA Bypass training. 3 minute(s)
Risky Uses of Work Devices Interactive As the line between work and home environments continues to blur, so does the one between business and personal devices. This training discusses the security risks involved. 4 minute(s)
Safe Social Networks Interactive Learn how to use social networks safely and responsibly. 16 minute(s)
Safer Web Browsing Interactive Stay safe on the Internet by avoiding risky behavior and common traps 23 minute(s)
Screen Savers: Physical Security Training Game Join the Screen Savers team in this 360-detective game. See if you can figure out how the attacker got in and gained access to the data, as well as pointing out any other potential security risks. 7 minute(s)
Secure Printing Interactive Printing is often overlooked when it comes to data security – but why? With printers becoming more advanced, and being able to work wirelessly so that you can scan and print from cloud applications, this leaves even more room for a data security risk to occur. This course will help your staff understand the risks associated with insecure printing, why this is a concern from a data perspective, and the role they play in helping to ensure positive security practice. 12 minute(s)
Secure Printing Methods Interactive This interactive training will introduce you to secure printing methods used to ensure data security. 3 minute(s)
Secure Printing Methods Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to secure printing. This assessment correlates to our Secure Printing Methods training. 3 minute(s)
Securi-Tree: General Security for Children Ages 5-8 Interactive This interactive cybersecurity essentials module is intended for children ages 5-8. Kids can learn security basics as they collect achievement badges and practice what they learn by playing fun games. 10 minute(s)
Securing Data: Know Your Role Animated Video Employees interact with data in many different ways. And different organizations hold different types of data. Obviously, some information is more sensitive than others. Cybercriminals often target people based on their access to important data. It's crucial that you recognize how to keep data secure. 2 minute(s)
Securing Data: Know Your Role Interactive Employees interact with data in many different ways. And different organizations hold different types of data. Obviously, some information is more sensitive than others. Cybercriminals often target people based on their access to important data. It's crucial that you recognize how to keep data secure. 2 minute(s)
Securing Data: Know Your Role Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to your role in keeping data secure. 2 minute(s)
Securing Data: Know Your Role Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to securing data. This assessment correlates to our Securing Data: Know Your Role training. 2 minute(s)
Security Awareness Training for Service Desk Personnel Interactive Service desk personnel are the first line of defense against security threats. Their actions can significantly impact the organization's overall security. This module focuses on managing security awareness for service desk personnel. 5 minute(s)
Security Awareness Training for Service Desk Personnel Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to security awarness training for service desk personnel. This assessment correlates to our Security Awareness Training for Service Desk Personnel training. 4 minute(s)
Security Basics: Cloud and Internet Security Live Action Video This tongue-in-cheek training will introduce you to to basic cybersecurity concepts related to Internet and cloud security. 2 minute(s)
Security Basics: Cloud and Internet Security Interactive This Security Basics course provides foundational information on concepts related to cloud and internet security. 2 minute(s)
Security Basics: Cloud and Internet Security Animated Video This Security Basics course provides foundational information on concepts related to cloud and internet security. 2 minute(s)
Security Basics: Cloud and Internet Security Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to cloud and internet security. This assessment correlates to our Security Basics: Cloud and Internet Security training. 2 minute(s)
Security Basics: Compliance Live Action Video This tongue-in-cheek training will introduce you to basic security concepts related to compliance. 3 minute(s)
Security Basics: Compliance Interactive This Security Basics course provides foundational information on concepts related to compliance. 2 minute(s)
Security Basics: Compliance Animated Video This Security Basics course provides foundational information on concepts related to compliance. 2 minute(s)
Security Basics: Compliance Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to compliance. This assessment correlates to our Security Basics: Compliance training. 2 minute(s)
Security Basics: Data Handling and Security Interactive This Security Basics course provides foundational information on concepts related to data handling and security. 2 minute(s)
Security Basics: Data Handling and Security Live Action Video This tongue-in-cheek training will introduce you to basic security concepts related to data handling and security. 3 minute(s)
Security Basics: Data Handling and Security Animated Video This Security Basics course provides foundational information on concepts related to data handling and security. 2 minute(s)
Security Basics: Data Handling and Security Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to data handling and security. This assessment correlates to our Security Basics: Data Handling and Security training. 2 minute(s)
Security Basics: Email and Social Engineering Animated Video This Security Basics course provides foundational information on concepts related to email and social engineering. 2 minute(s)
Security Basics: Email and Social Engineering Interactive This Security Basics course provides foundational information on concepts related to email and social engineering. 2 minute(s)
Security Basics: Email and Social Engineering Live Action Video This tongue-in-cheek training will introduce you to basic cybersecurity concepts related to email and social engineering. 2 minute(s)
Security Basics: Email and Social Engineering Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to email and social engineering. This assessment correlates to our Security Basics: Email and Social Engineering training. 2 minute(s)
Security Basics: Insider Threats Interactive This Security Basics course provides foundational information on concepts related to insider threats. 2 minute(s)
Security Basics: Insider Threats Live Action Video This tongue-in-cheek training will introduce you to basic security concepts related to insider threats. 3 minute(s)
Security Basics: Insider Threats Animated Video This Security Basics course provides foundational information on concepts related to insider threats. 2 minute(s)
Security Basics: Insider Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to insider threats. This assessment correlates to our Security Basics: Insider Threats training. 2 minute(s)
Security Basics: Mobile Device Management Animated Video This Security Basics course provides foundational information on concepts related to mobile device management. 2 minute(s)
Security Basics: Mobile Device Management Live Action Video This tongue-in-cheek training will introduce you to basic cybersecurity concepts related to mobile device management. 2 minute(s)
Security Basics: Mobile Device Management Interactive This Security Basics course provides foundational information on concepts related to mobile device management. 2 minute(s)
Security Basics: Mobile Device Management Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to mobile devices. This assessment correlates to our Security Basics: Mobile Device Management training. 2 minute(s)
Security Basics: Passwords and Authentication Live Action Video This tongue-in-cheek training will introduce you to basic cybersecurity concepts related to password management. 3 minute(s)
Security Basics: Passwords and Authentication Interactive This Security Basics course provides foundational information on concepts related to password management. 2 minute(s)
Security Basics: Passwords and Authentication Animated Video This Security Basics course provides foundational information on concepts related to password management. 2 minute(s)
Security Basics: Passwords and Authentication Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to passwords and authentication. This assessment correlates to our Security Basics: Passwords and Authentication training. 2 minute(s)
Security Basics: Physical Security and Remote Working Interactive This Security Basics course provides foundational information on concepts related to physical security and remote working. 2 minute(s)
Security Basics: Physical Security and Remote Working Animated Video This Security Basics course provides foundational information on concepts related to physical security and remote working. 2 minute(s)
Security Basics: Physical Security and Remote Working Live Action Video This tongue-in-cheek training will introduce you to basic security concepts related to physical security and remote working. 2 minute(s)
Security Basics: Physical Security and Remote Working Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to physical security and remote working. This assessment correlates to our Security Basics: Physical Security and Remote Working training. 2 minute(s)
Security Basics: What Is a Very Attacked Person (VAP)? Animated Video This video training will introduce you to the concept of a Very Attacked Person (VAP). 1 minute(s)
Security Basics: What Is a Very Attacked Person (VAP)? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Very Attacked People. This assessment correlates to our Security Basics: What Is a Very Attacked Person (VAP)? training. 2 minute(s)
Security Basics: What Is GDPR? Animated Video This Security Basics course provides foundational information on concepts related to GDPR. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 2 minute(s)
Security Basics: What Is HIPAA? Animated Video This video training will help you understand organizational compliance requirements around HIPAA. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 1 minute(s)
Security Basics: What Is HIPAA? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to HIPAA compliance. This assessment correlates to our Security Basics: What Is HIPAA? training. 3 minute(s)
Security Basics: What Is PCI DSS? Animated Video This Security Basics course provides foundational information on concepts related to PCI-DSS. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 2 minute(s)
Security Basics: What Is PCI DSS? Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to security essentials. This assessment correlates to our Security Essentials training. 5 minute(s)
Security Beyond the Office Interactive Avoid common security mistakes while working at home or on the road. 15 minute(s)
Security Beyond The Office Interactive With the ever-increasing technological advances, it is becoming more common that the data individuals deal with is often used and processed outside the walls of the work environment – possibly on mobile devices or where employees work remotely. It is important that information is handled safely whilst outside of the office, and that devices and documents are secure, protecting them from prying eyes. The course will teach employees about the common threats beyond the office, how this might impact them and the organisation, and how to avoid them. 12 minute(s)
Security Essentials Interactive This convenient training module compilation will introduce you to essential beginner-level security concepts. Topics covered include data protection; physical security; protecting accounts, devices, and systems; and secure remote working. This same information is also broken down into assignable microlearning modules by topic in our content library. 14 minute(s)
Security Essentials Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to security essentials. This assessment correlates to our Security Essentials training. 10 minute(s)
Security Essentials for Executives Interactive Cybercriminals and social engineers are always searching for access to your organization’s valuable assets. These attackers can be persistent and sophisticated. As an executive, you’re a key player in your organization’s security. But executives are also prime targets for both legitimate and malicious actors—ranging from competitors and trusted insiders to hackers, activists, and nation-state actors. 7 minute(s)
Security Essentials for Executives Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to security essentials for executives. This assessment correlates to our Security Essentials for Executives training. 8 minute(s)
Security Essentials: Data Protection Interactive This training module will introduce you to essential beginner-level data protection concepts. This same information is also available as part of a convenient training module compilation in our content library. 3 minute(s)
Security Essentials: Data Protection Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to essential beginner-level data protection concepts. This assessment correlates to our Security Essentials: Data Protection training. 4 minute(s)
Security Essentials: Introduction Interactive This introductory training module will introduce you to essential beginner-level security concepts. Please note that this module is intended to be used in conjunction with any of the Security Essentials microlearning modules and not as a stand-alone module. This same information is also available as part of a convenient training module compilation in our content library. 1 minute(s)
Security Essentials: Introduction for Facilities and Maintenance Personnel Interactive This introductory training module will introduce you to essential beginner-level security concepts. Please note that this introduction module has been tailored for facility and maintenance personnel and is intended to be used in conjunction with any of the Security Essentials microlearning modules and not as a stand-alone module. 1 minute(s)
Security Essentials: Introduction for Finance Professionals Interactive This introductory training module will introduce you to essential beginner-level security concepts. Please note that this introduction module has been tailored for finance professionals and is intended to be used in conjunction with any of the Security Essentials microlearning modules and not as a stand-alone module. 1 minute(s)
Security Essentials: Introduction for Human Resource Professionals Interactive This introductory training module will introduce you to essential beginner-level security concepts. Please note that this introduction module has been tailored for human resource professionals and is intended to be used in conjunction with any of the Security Essentials microlearning modules and not as a stand-alone module. 1 minute(s)
Security Essentials: Introduction for Privileged Users Interactive This introductory training module will introduce you to essential beginner-level security concepts. Please note that this introduction module has been tailored for privileged users and is intended to be used in conjunction with any of the Security Essentials microlearning modules and not as a stand-alone module. 1 minute(s)
Security Essentials: Physical Security Interactive This training module will introduce you to essential beginner-level physical security concepts. This same information is also available as part of a convenient training module compilation in our content library. 3 minute(s)
Security Essentials: Physical Security Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to essential beginner-level physical security concepts. This assessment correlates to our Security Essentials: Physical Security training. 4 minute(s)
Security Essentials: Protecting Accounts, Devices, and Systems Interactive This training module will introduce you to essential beginner-level concepts for protecting accounts, devices, and systems from a variety of threats. This same information is also available as part of a convenient training module compilation in our content library. 4 minute(s)
Security Essentials: Protecting Accounts, Devices, and Systems Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to essential beginner-level concepts for protecting accounts, devices, and systems from a variety of threats. This assessment correlates to our Security Essentials: Protecting Accounts, Devices, and Systems training. 4 minute(s)
Security Essentials: Secure Remote Working Interactive This training module will introduce you to essential beginner-level remote working concepts. This same information is also available as part of a convenient training module compilation in our content library. 3 minute(s)
Security Essentials: Secure Remote Working Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to essential beginner-level remote working concepts. This assessment correlates to our Security Essentials: Secure Remote Working training. 3 minute(s)
Security Essentials: Trending Threats Interactive In today’s constantly evolving business environment, cybercriminals use a wide range of techniques to target individuals and organizations. The tactics and techniques change over time, but some types of attacks become common and widespread. This training module will introduce you to trending security threats. 4 minute(s)
Security Essentials: Trending Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to trending threats. This assessment correlates to our Security Essentials: Trending Threats training. 3 minute(s)
Security Tonight: Business Email Compromise Live Action Video In this episode, our comedy news show focuses on business email compromise (BEC). Host Tammy Bogdanovich conducts an interview and gives advice on protecting against BEC attacks. 3 minute(s)
Security Tonight: Business Email Compromise Live Action Video In this episode, our comedy news show focuses on business email compromise (BEC). Host Tammy Bogdanovich conducts an interview and gives advice on protecting against BEC attacks. 3 minute(s)
Security Tonight: Fraudulent Ads Live Action Video In this episode, our comedy news show focuses on fraudulent ads. Host Tammy Bogdanovich conducts an interview and gives advice on how to avoid these cyber scams. 3 minute(s)
Security Tonight: Insider Threats Live Action Video In this episode, our comedy news show focuses on insider threats. Host Tammy Bogdanovich conducts an interview and gives advice on protecting against insider threats. 4 minute(s)
Security Tonight: Insider Threats Live Action Video In this episode, our comedy news show focuses on insider threats. Host Tammy Bogdanovich conducts an interview and gives advice on protecting against insider threats. 4 minute(s)
Security Tonight: Malicious Cloud Documents Live Action Video In this episode, our comedy news show focuses on cloud documents. Host Tammy Bogdanovich conducts an interview and gives advice on what to keep in mind when using file-sharing platforms. 3 minute(s)
Security Tonight: Multi-Factor Authentication (MFA) Live Action Video In this episode, our comedy news show focuses on multi-factor authentication (MFA). Host Tammy Bogdanovich conducts an interview and reviews why MFA is important. 3 minute(s)
Security Tonight: Phishing Live Action Video In this episode, our comedy news show focuses on phishing. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself against phishing attacks. 4 minute(s)
Security Tonight: Phishing Live Action Video In this episode, our comedy news show focuses on phishing. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself against phishing attacks. 4 minute(s)
Security Tonight: Physical Security Live Action Video In this episode, our comedy news show focuses on physical security. Host Tammy Bogdanovich conducts an interview and gives advice on safe practices both inside and outside the office. 3 minute(s)
Security Tonight: Physical Security Live Action Video In this episode, our comedy news show focuses on physical security. Host Tammy Bogdanovich conducts an interview and gives advice on safe practices both inside and outside the office. 3 minute(s)
Security Tonight: Ransomware Live Action Video In this episode, our comedy news show focuses on ransomware. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself from ransomware. 4 minute(s)
Security Tonight: Ransomware Live Action Video In this episode, our comedy news show focuses on ransomware. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself from ransomware. 4 minute(s)
Security Tonight: Social Engineering Live Action Video In this episode, our comedy news show focuses on social engineering. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself from social engineering. 5 minute(s)
Security Tonight: Social Engineering Live Action Video In this episode, our comedy news show focuses on social engineering. Host Tammy Bogdanovich conducts an interview and gives advice on protecting yourself from social engineering. 5 minute(s)
Security Tonight: Social Media Mistakes Live Action Video In this episode, our comedy news show focuses on social media mistakes. Host Tammy Bogdanovich conducts an interview and gives advice on what to keep in mind when posting on social media. 3 minute(s)
Sensitive Data: Different Classifications, Different Rules Animated Video This video training will introduce you to security concepts related to common classifications and rules regarding sensitive data. 3 minute(s)
Sensitive Data: Different Classifications, Different Rules Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to common classifications and rules regarding sensitive data. This assessment correlates to our Sensitive Data: Different Classifications, Different Rules training. 3 minute(s)
Sharing Sensitive Data Nano Learning Live Action Video Use this short nano learning as a helpful reminder about sharing sensitive data. 1 minute(s)
Sharing to the Cloud Nano Learning Live Action Video Use this short nano learning as a helpful reminder about sharing to the cloud. 1 minute(s)
Shielding Against Spear Phishing Interactive Spear phishing is a type of phishing scam that thrives on familiarity. This course will help your employees recognise the common types of spear phishing emails they are likely to encounter, as well as educating them on what they should look out for, to keep them safe both personally and at work. Employees will be put to the test by working through an inbox and deciding what actions to take. 12 minute(s)
Singapore's Personal Data Protection Act Interactive This training discusses Singapore's Personal Data Protection Act (PDPA) and reviews its newest amendments from 2020. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
So Much Data Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch offers tips on following data policies and protecting private information. 3 minute(s)
So Much Data Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch offers tips on following data policies and protecting private information. 3 minute(s)
Social Engineering Interactive Social Engineering has been used by criminals since the dawn of time – why? Because it works – really well! This might be in the form of an email or over the phone, but essentially fraudsters will seek to impress emotions such as urgency or fear, in the hope that employees will disclose sensitive information or access a malicious attachment. This course will help your employees understand what social engineering is, why it is used and how it occurs. Employees will also learn how to identify different types of social engineering and some simple tricks to make sure they are one step ahead. 12 minute(s)
Social Engineering Interactive Recognize and avoid social engineering scams 19 minute(s)
Social Engineering: Emotional Tactics Animated Video In a social engineering scam attackers plot to use your emotions against you to provoke you into acting quickly, before you’ve had a chance to really think things through. This module will teach you how to read between the lines of a social engineering attack. 2 minute(s)
Social Engineering: Emotional Tactics Interactive This training will introduce you to beginner security concepts related to social engineering. 2 minute(s)
Social Engineering: Emotional Tactics Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to social engineering. This assessment correlates to our Social Engineering: Emotional Tactics training. 2 minute(s)
Social Engineering: In-Person Imposters Animated Video This video training will help you understand security risks regarding in-person impostors. 2 minute(s)
Social Engineering: In-Person Imposters Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to in-person imposters. This assessment correlates to our Social Engineering: In-Person Imposters training. 4 minute(s)
Social Engineering: Many Methods, Many Motives Animated Video Emotional manipulation and deception tactics known as “social engineering” are common in cyberattacks. This module reviews some common ways social engineers attack. 2 minute(s)
Social Engineering: Many Methods, Many Motives Interactive Emotional manipulation and deception tactics known as “social engineering” are common in cyberattacks. This module reviews some common ways social engineers attack. 2 minute(s)
Social Engineering: Many Methods, Many Motives Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to social engineering. 2 minute(s)
Social Engineering: Many Methods, Many Motives Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to social engineering. This assessment correlates to our Social Engineering: Many Methods, Many Motives training. 2 minute(s)
Social Engineering: Shoulder Surfing and Eavesdropping Animated Video This video training will help you understand security risks regarding shoulder surfing and eavesdropping. 2 minute(s)
Social Engineering: Smishing Attacks Animated Video This video training will introduce you to security concepts related to smishing attacks. 2 minute(s)
Social Engineering: Smishing Attacks Live Action Video This tongue-in-cheek training will introduce you to security concepts related to smishing attacks. 3 minute(s)
Social Engineering: Tailgating Animated Video This video training will help you understand security risks regarding tailgating. 2 minute(s)
Social Engineering: The Long Game Interactive Some social engineering attacks are short-term, such as a phishing email that encourages a recipient to immediately click on a malicious link. But others can unfold over weeks, months, or even years. This training will help you to learn about social engineering attacks that take place over the long term. 3 minute(s)
Social Engineering: The Long Game Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to long-term social engineering scams. This assessment correlates to our Social Engineering: The Long Game training. 3 minute(s)
Social Engineering: Vishing Attacks Live Action Video This tongue-in-cheek will introduce you to security concepts related to voice phishing, or “vishing.” 3 minute(s)
Social Engineering: Vishing Attacks Animated Video This video training will introduce you to security concepts related to voice phishing, or “vishing.” 2 minute(s)
Social Media - Who to Avoid Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to social media. 2 minute(s)
Social Media Roller Coaster Multi-Path Adventure What Now Enterprises’ boss, Ken, has been saving for his dream holiday, but with his money under threat, what will you do? 12 minute(s)
Social Media: Maintaining Privacy in Public Domains Animated Video This video training will help you understand security risks regarding sharing on social media. 2 minute(s)
Social Media: Maintaining Privacy in Public Domains Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to privacy on social media. 2 minute(s)
Social Media: Maintaining Privacy in Public Domains Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to privacy on social media. This assessment correlates to our Social Media: Maintaining Privacy in Public Domains training. 2 minute(s)
Social Media: Privacy Pitfalls Animated Video This video training will help you understand privacy risks related to social media. 2 minute(s)
Social Media: Privacy Pitfalls Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the social media privacy risks. This assessment correlates to our Social Media: Privacy Pitfalls training. 3 minute(s)
Social Media: Spot the Mistakes Instagram Training Game Can you find all the problems with this social media post? 5 minute(s)
Social Media: Spot the Mistakes LinkedIn Training Game Can you find all the problems with this social media post? 5 minute(s)
Social Media: Who to Avoid Animated Video This video training will help you understand the dangers of social media. 2 minute(s)
Social Network Nightmare Multi-Path Adventure For this Interactive Episode, the most recent case in This City involves the dangers of oversharing on social media. Inspired by a recent, real-life event, can you work alongside Detective Frank Cannon to avoid what went wrong? 9 minute(s)
Social Networking Interactive Ever thought about what and how much information individuals actually share online? There’s often a disconnect between the online world and the real-world when using the internet, but it’s now so intertwined that you’ve got to keep your wits about you. This course will look at how social networking can often be a breeding ground for cyber-crime and data incidents, cover some absolute ‘must knows’ to help keep staff safe when using social media, and some of the simple ‘do’s and don’ts’. 12 minute(s)
Socially Engineered Fortune Telling Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explains why you must always use common sense when sharing personal information. 6 minute(s)
Software Updates Interactive Developers release updates to make changes that improve software or application functionality or address known problems. These updates might include fixes for minor bugs, additional features, and improvements to performance and usability. This training will help you understand the importance of keeping browser software and security settings up to date. 3 minute(s)
Software Updates Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the importance of keeping browser software and security settings up to date. This assessment correlates to our Software Updates training. 3 minute(s)
South Korea's PIPA Interactive This training discusses South Korea's Personal Information Protection Act (PIPA) and its differences from the GDPR. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 20 minute(s)
Spear Phishing Threats Interactive Recognize and avoid targeted phishing attacks. 12 minute(s)
Spear Phishing Threats Interactive This training will help you learn why and how people in certain roles might be selected and then specifically attacked via email. 3 minute(s)
Spear Phishing Threats Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the reasons and ways in which people in certain roles might be selected and then specifically attacked via email. This assessment correlates to our Spear Phishing Threats training. 3 minute(s)
Spear Phishing Threats for Finance Professionals Interactive Your role in finance can make you a target for spear phishing attacks.The level of access you have to financial systems and important information is coveted by criminals. This interactive training will help you learn to recognize these spear phishing threats and how to avoid them. 12 minute(s)
Spear Phishing Threats for Managers Interactive In this interactive training, you will learn why managers are targeted during a spear phishing attack along with mitigation strategies. 9 minute(s)
Spear Phishing: It's Personal Animated Video Spear phishing refers to personalized phishing attacks. Rather than sending one malicious email to many recipients, an attacker targets a specific person. This module will explain security practices that can help you identify and avoid spear phishing attacks. 2 minute(s)
Spot the Difference: Cybersecurity on the Web Training Game Put your cybersecurity sleuthing knowledge to the test! Can you spot the differences between these emails? 8 minute(s)
Spotting Invoice Scams Interactive This course will help your employees identify a fake invoice scam and educate them on how to avoid being duped into forwarding one on to someone else in the organization for processing. Employees will even need to work through scenarios and see if they can make the right decisions to prevent becoming a victim. 12 minute(s)
Super Smart Phone Live Action Video This video is part of The Cyber Guys Series. This comedy sketch explores several ways to be super smart when using your smart phone. 3 minute(s)
Super Smart Phone Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch explores several ways to be "super smart" when using your smart phone. 4 minute(s)
Supply Chain Attacks and You Animated Video A supply chain attack, also known as a third-party attack, targets a software vendor’s network. It employs malicious code to compromise the software before it reaches the end user. Everyone needs to be aware of these types of threats, and the risks—regardless of their role in your organization. 3 minute(s)
Supply Chain Attacks and You Assessment Adaptive Learning Assessment A supply chain attack, also known as a third-party attack, targets a software vendor’s network. It employs malicious code to compromise the software before it reaches the end user. Everyone needs to be aware of these types of threats, and the risks—regardless of their role in your organization. This assessment correlates to our Supply Chain Attacks and You training. 4 minute(s)
Surfing the World Wide Web Interactive There are a whole host of risks that staff should be aware of when browsing the internet. Do all of your staff examine the true destination of hyperlinks before clicking on them? This course will look at examples of bad surfing habits and their effects, as well as dissecting a URL, to help keep your staff safe. Not only that, staff will also get to grips with how to spot a secure website, avoid malicious sites and links, and learn some best practice tips. 12 minute(s)
Suspicious Emails: When to Report Interactive Although most emails you receive will be legitimate, a phishing email could land in your inbox at any time. It’s crucial that you know when to report a suspicious email, and that you’re aware of the factors that should prompt you to do so. 2 minute(s)
Suspicious Emails: When to Report Animated Video Although most emails you receive will be legitimate, a phishing email could land in your inbox at any time. It’s crucial that you know when to report a suspicious email, and that you’re aware of the factors that should prompt you to do so. 2 minute(s)
Suspicious Emails: When To Report Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing. This assessment correlates to our Suspicious Emails: When To Report training. 2 minute(s)
Suspicious Emails: Why Reporting Is So Important Interactive Knowing how to recognize a phishing email is one thing, but you also need to be aware of the best practices for reporting suspicious messages. This module will explain what steps should you take when it comes to reporting. 2 minute(s)
Suspicious Emails: Why Reporting Is So Important Live Action Video This tongue-in-cheek training will introduce you to beginner-level security concepts related to the reporting of suspicious emails. 2 minute(s)
Suspicious Emails: Why Reporting Is So Important Animated Video Knowing how to recognize a phishing email is one thing, but you also need to be aware of the best practices for reporting suspicious messages. This module will explain what steps should you take when it comes to reporting. 2 minute(s)
Suspicious Emails: Why Reporting Is So Important Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to suspicious emails. This assessment correlates to our Suspicious Emails: Why Reporting Is So Important training. 2 minute(s)
Swiped Right Into Trouble Multi-Path Adventure Join the What Now Enterprises team in this Interactive Episode, based on a recent real-life event. Let your employees make real-time interactions as to whether or not to trust a suspicious email, before interacting online and choosing how much information they can share. 12 minute(s)
TAKEOVER: BEC Scams Multi-Path Adventure Let your employees become the bad guys, in this super-interactive TAKEOVER Episode. Can your employees do their research on a potential target and craft the perfect Business Email Compromise scam to be the most convincing? A great, intuitive and fun way to educate employees about the dangers of business email scams and the importance of securing your social network. 12 minute(s)
TAKEOVER: Digging For Data Multi-Path Adventure Let your employees become the bad guys, in this super-interactive TAKEOVER Episode. Can your employees dig up the appropriate dirt on some unsuspecting victims? Can they target the right company to see what data they might share, with just a little convincing? A fun and interactive way of highlighting the risks posed by poor data protection measures. 12 minute(s)
Texas Health Privacy Animated Video This video training discusses the Texas health privacy law and the consequences for not properly protecting health data. <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 6 minute(s)
The Anatomy of ICS Environments Interactive This training provies an overview of the technology, processes, and people commonly found in industrial control systems (ICS) environments. 11 minute(s)
The Anatomy of ICS Environments Interactive This training provides an overview of the technology, processes, and people commonly found in industrial control systems (ICS) environments. 10 minute(s)
The App Conundrum Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows that while apps are everywhere these days, you still need to check to make sure a dodgy one doesn't get past you. 4 minute(s)
The Bill, Sir Live Action Video This video is part of The Cyber Guys Series. This comedy sketch shows the different tactics invoice scammers may use. 2 minute(s)
The Bill, Sir Live Action Video This video is part of “The Cyber Guys” Series. This comedy sketch shows the different tactics invoice scammers may use. 2 minute(s)
The Dangers of Phishing Animated Video You've got mail, but should you click on it? This video goes over some phishing red flags to remember. 1 minute(s)
The Fraud Triangle Interactive The Fraud Triangle is a concept used to evaluate the conditions under which fraud might be committed by individual employees or by organizations. It is a theory credited to United States criminologist Donald Cressey. Cressey believed it was important to not only understand that fraud happens, but to understand why it happens. This module introduces the Fraud Triangle. 5 minute(s)
The Fraud Triangle Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to the Fraud Triangle concept. This assessment correlates to our Fraud Triangle training. 3 minute(s)
The Hall of Hackers: Count Down Animated Video This episode tells the story of an insider threat attack at a business. "The Hall of Hackers" animated series is set in a museum; each episode highlights a different type of attack by focusing on a fictitious villain and their nefarious specialty. 5 minute(s)
The Hall of Hackers: Handsome Ransom Animated Video This episode tells the story of a ransomware attack at a small business. "The Hall of Hackers" animated series is set in a museum; each episode highlights a different type of attack by focusing on a fictitious villain and their nefarious specialty. 4 minute(s)
The Hall of Hackers: Professor Guesser Animated Video This episode tells the story of Professor Guesser. This virtuoso of villainy preys on those with easy passwords. "The Hall of Hackers" animated series is set in a museum; each episode highlights a different type of attack by focusing on a fictitious villain and their nefarious specialty. 5 minute(s)
The Impacts of Interacting with Malware Animated Video Interacting with malicious files poses a huge risk. But the degree of danger varies, depending on the type of malicious software, or malware. Attackers use different types of malware to achieve specific goals. It's important that you're aware how malware can be used against you. 2 minute(s)
The Lighthouse Keeper: AI-Generated Deepfakes Live Action Video Join our lighthouse keeper Lucy as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on AI-generated deepfakes. 4 minute(s)
The Lighthouse Keeper: Data Protection Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous.This episode focuses on data protection. 4 minute(s)
The Lighthouse Keeper: Gift Card Scams Live Action Video Join our lighthouse keeper Lucy as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on gfit card scams. 5 minute(s)
The Lighthouse Keeper: Malicious Ads Live Action Video Join our lighthouse keeper Lucy as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on malicious ads. 4 minute(s)
The Lighthouse Keeper: Messaging App Attacks Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous.This episode focuses on messaging app attacks. 4 minute(s)
The Lighthouse Keeper: Phishing Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on phishing. 5 minute(s)
The Lighthouse Keeper: Physical Security Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous.This episode focuses on physical security. 4 minute(s)
The Lighthouse Keeper: Remote Working Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous.This episode focuses on remote working. 4 minute(s)
The Lighthouse Keeper: Smishing Live Action Video Join our lighthouse keeper Clara as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous.This episode focuses on smishing. 4 minute(s)
The Lighthouse Keeper: Travel Security Live Action Video Join our lighthouse keeper Lucy as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on travel security. 5 minute(s)
The Lighthouse Keeper: Vishing Live Action Video Join our lighthouse keeper Lucy as she helps navigate folks on land through a sea of cyber threats that can be just as dangerous. This episode focuses on vishing. 5 minute(s)
The Master of Disguise Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows that the physical security of your workplace is just as important as the online security. 4 minute(s)
The Master of Disguise Live Action Video This video is part of "The Cyber Guys" Series. This comedy sketch shows that the physical security of your workplace is just as important as the online security. 4 minute(s)
The Mummy: Revenge of the Data Breach Multi-Path Adventure Join us for Security Awareness at the Movies! Can you help director Steven Bielspurg stay true to his cyber-safe-self and deliver The Mummy: Revenge of the Data Breach with a security conscience? 9 minute(s)
The Passwordinator Multi-Path Adventure Join us for Security Awareness at the Movies! Can you help director Steven Bielspurg stay true to his cyber-safe-self and deliver The Passwordinator with a security conscience? 9 minute(s)
The Privacy Act for Federal Contractors Interactive This privacy training for federal contractors course is designed to meet the requirements of the Federal Acquisition Regulation (FAR). <em>The content on this site is intended for informational purposes only and should not be construed as legal advice.</em> 15 minute(s)
The Problem With Common Passwords Live Action Video This video is part of our 60 Seconds to Better Security series, and explains why using common passwords can be a major security issue. 1 minute(s)
The Problem With Oversharing Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic explanation of why oversharing online can be a problem. 2 minute(s)
The Problem With Password Reuse Live Action Video This video is part of our 60 Seconds to Better Security series, and explain why reusing passwords is a major security gamble. 1 minute(s)
The Problem With Public Wi-Fi Animated Video This video is part of our 60 Seconds to Better Security series, and will give a basic explanation of why using public Wi-Fi can be a problem. 2 minute(s)
The Problem With Public Wi-Fi Live Action Video This tongue-in-cheek training will help you recognize safety risks around using public Wi-Fi. 2 minute(s)
The Problem With Public Wi-Fi Interactive This module will give a basic explanation of why using public Wi-Fi can be a problem. 2 minute(s)
The Problem With Public Wi-Fi Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to public Wi-Fi. This assessment correlates to our The Problem With Public Wi-Fi training. 2 minute(s)
The Problem With Simple Passwords Live Action Video This video is part of our 60 Seconds to Better Security series, and explains why you should avoid using simple passwords. 1 minute(s)
Think Before You Click Live Action Video This video is part of the "Don't Let Thieves In" series. See how clicking on a malicious link can let thieves in to your computer and your organization. 1 minute(s)
Think Before You Click Live Action Video See how clicking on a malicious link can let thieves in to your computer and your organization. 1 minute(s)
Think Before You Click (Great Saves) Live Action Video This video is part of the "Make a Great Save" Series. Watch our security-minded soccer goalie save another unwitting victim from clicking on a phishing link. 1 minute(s)
Think Before You Click (Great Saves) Live Action Video Watch our security-minded soccer goalie save another unwitting victim from clicking on a phishing link. 1 minute(s)
Think Before You Post (Social Media) Live Action Video This video is part of the "Don't Let Thieves In" series. See how sharing confidential information on social media, can let thieves into your office. 1 minute(s)
Think Before You Post (Social Media) Live Action Video This video is part of the ""Don't Let Thieves In"" series. See how sharing confidential information on social media, can let thieves into your office. 1 minute(s)
Third-Party Applications Interactive Third-party applications are everywhere. Learn what they are and the risks that can come with using them. 18 minute(s)
Threat Overview: AI-Generated Deepfakes Interactive As AI-generated content gets more realistic, so does the danger of being a victim of AI-generated deepfakes. Learn what this threat is, how it’s used, and how you can guard yourself against it. 4 minute(s)
Threat Overview: AI-Generated Deepfakes Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to AI-generated deepfakes. This assessment correlates to our Threat Overview: AI-Generated Deepfakes training. 4 minute(s)
Threat Overview: Browser-in-the-Browser Attacks Animated Video This video training will help you spot and avoid Browser-in-the-Browser (BiTB) attacks. 4 minute(s)
Threat Overview: Browser-in-the-Browser Attacks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to Browser-in-the-Browser (BiTB) attacks. This assessment correlates to our Threat Overview: Browser-in-the-Browser Attacks training. 4 minute(s)
Threat Overview: Conversational Scams Interactive Conversational scams are a type of social engineering attack. Attackers try to start a conversation with a target using a believable, typically low-stakes, opening lure. This training will help you to learn about conversational scams. 3 minute(s)
Threat Overview: Conversational Scams Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to conversational scams. This assessment correlates to our Threat Overview: Conversational Scams training. 3 minute(s)
Threat Overview: Phishing in Messaging Apps Animated Video This training will help you will learn about phishing attacks in messaging apps, and how to spot and avoid them. 4 minute(s)
Threat Overview: Phishing in Messaging Apps Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to phishing in messaging apps. This assessment correlates to our Threat Overview: Phishing in Messaging Apps training. 4 minute(s)
Threat Overview: Session Hijacking Animated Video Many websites use "web sessions" to collect relevant data that helps improve a user’s browsing experience. But cyberattackers can also take advantage of this site functionality, through attacks known as “session hijacking.” 4 minute(s)
Threat Overview: Session Hijacking Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to session hijacking. This assessment correlates to our Threat Overview: Session Hijacking training. 4 minute(s)
Threat Overview: Software Supply Chain Attacks Animated Video This video training will help you understand why attackers are targeting the software supply chain. 4 minute(s)
Threat Overview: Software Supply Chain Attacks Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to supply chain. This assessment correlates to our Threat Overview: Software Supply Chain Attacks training. 2 minute(s)
Threat Overview: Spyware Interactive Spyware is a type of malware that tracks your activity without your consent. As its name implies, spyware is intended to be covert, and is difficult to detect on an infected device. This training will help you to learn about spyware. 3 minute(s)
Threat Overview: Spyware Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to spyware. This assessment correlates to our Threat Overview: Spyware training. 3 minute(s)
Threat Overview: Supply Chain Fraud Animated Video This video training will help you recognize challenges related to supply chain fraud. 2 minute(s)
Threat Overview: Supply Chain Fraud Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to supply chain fraud. This assessment correlates to our Threat Overview: Supply Chain Fraud training. 2 minute(s)
Threat Overview: Telephone-Oriented Attack Delivery (TOAD) Animated Video This video training will help you understand telephone-oriented attack delivery (TOAD) and how to avoid these attacks. 5 minute(s)
Threat Overview: Telephone-Oriented Attack Delivery (TOAD) Assessment Adaptive Learning Assessment This adaptive learning assessment will evaluate your knowledge related to telephone-oriented attack delivery (TOAD). This assessment correlates to our Threat Overview: Telephone-Oriented Attack Delivery (TOAD) training. 5 minute(s)
Threat Overview: USB Drops Animated Video This video training will help you understand security risks regarding USB drops. 2 minute(s)

Essentials_Content_May_2025.xlsx

  1. 113 KB
  2. View
  3. Download
Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Carlos Rios

  2. Posted
  3. Updated

Comments