KnowBe4 Training Modules Overview
KnowBe4’s game-changing partnerships with The Security Awareness Company, Popcorn Training, exploqii, Canada Privacy Training, Twist & Shout, El Pescador, CLTRe, Saya University, lawpilots, MediaPRO, and Kontra allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library 1000+ security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.
To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account.
We offer three Training Access Levels: I, II, and III depending on your subscription level. Compliance Plus is also available for your compliance training needs as an optional add-on to any Training Access Level. The KnowBe4 content library is constantly being updated with fresh new content. Content listed below are examples from the KnowBe4 ModStore by subscription level and subject to change. If you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library!
Kevin Mitnick Security Awareness Training
Included in Training Access Level I (Silver)
Kevin Mitnick Security Awareness Training (45-min)
Cybercrime happens way more often than you realize, and you are a target! This fully interactive course is based on three modules: Common Threats, Social Engineering Red Flags, and Your Role: Internet Security and You. Discover the most common threats you and your organization face, as well as the warning signs (or red flags) that can make you aware of potential threats. Kevin Mitnick (KnowBe4's Chief Hacking Officer and "The World's Most Famous Hacker") will take you behind the scenes and show you how a phishing attack is carried out. Additionally, Jenny Radcliffe (a social engineer) will use real-life examples to fill you in on how you can minimize the risks you and your organization face from these cyberthreats.
Kevin Mitnick Security Awareness Training (15-min)
This module is a condensed version of the full 45-minute training, often assigned to management. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Kevin Mitnick (Chief Hacking Officer at KnowBe4) as he takes you behind the scenes to show you how the bad guys do what they do. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. This module is available in 36 language versions.
KnowBe4 Cybersecurity Awareness Posters
Included in Training Access Level I (Silver)
KnowBe4 Cybersecurity Awareness Posters
- All Your Data Are Belong To Us
- Bad Rabbit: Think Before You Click
- Be An Email Superhero
- Burning Man
- CEO Fraud
- Don't Let Your Strings Get Pulled
- Don’t Click on Me
- Email Subject Line Red Flags
- Give Us the Bitcoin
- It only takes one
- Jaws: Don’t Be a Victim
- Keep Calm and Don’t Click
- Loose Clicks Sink Ships
- Loose Lips Sink Ships
- Loose Tweets Sink Fleets
- Phishin’ Is Easy
- Ransomware Apocalypse is Calling
- Ransomware Has No Borders
- Ransomware Invaders
- Resist the USB Attack
- Stop Phishing Attacks Dead in Their Tracks
- Stop, Look, Think
- Stop, Look, Think Signs
- The Clickers
- There's Something Phishy in Your Inbox
- Think Before You Click
- Think Before You Click Boy
- Think Before You Click Brain
- Think Before You Click Eye Chart
- Think Before You Click Monster
- Think Before You Click Pop-Up
- This is My Ransomware Killing Poster
- Tron Ransomware
- Uncle Sam: I Want You to Stop Clicking
- Why Security Awareness Training?
- You Can’t Go Back
KnowBe4 Training Modules
Also included in Training Access Level II (Gold & Platinum)
- KnowBe4 Security Awareness Training (30-Min)
This fully interactive course takes you through two modules: Social Engineering Red Flags and Your Role*. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Sparr0w (a hacker) as he shares his insider knowledge and takes you behind the scenes to show you how it's done. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. Additionally, you will practice your security awareness skills through a number of engaging scenarios. * Abridged for inclusion in the 30-minute course. - Basics of Credit Card Security
This 20-minute module covers the basics of credit card security. It is meant for all employees in your organization who handle credit cards and/or credit card data. Employees will learn what the hackers are after, the techniques hackers use to try and gain access, and the best practices they can take to protect the organization and its valuable credit card data. - CEO Fraud
In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise. - Common Threats, Part 1 - Miranda's Story
In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished. - Common Threats, Part 2 - Kyle's Story
In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished. - Creating Strong Passwords
In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one. - Financial Institution Physical Security (for Financial Institutions only)
This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies. - GDPR
This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end. - GLBA Security Awareness Training (for Financial Institutions only)
In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.
- Handling Sensitive Information
This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available. - Mobile Device Security
This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job. - PCI Compliance Simplified
This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization. - Ransomware
This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom. - Ransomware For Hospitals Training
Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this. - Safe Web Browsing
In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing. - Social Engineering Red Flags
This totally interactive module covers the social engineering “red flags” that can be found in emails, digital messages, over the phone, and through in-person social engineering attacks. To engage the learner, common “hacking tricks” are presented from the viewpoint of a hacker as he explains what he does, why he does it—and most importantly, how an educated user might spot the red flags in each of the hacker’s methods. By knowing what to look for, the employee becomes able to spot a social engineering attack and not be tricked. - The Danger Zone
Keep your organization safe by successfully answering questions and preventing a hacker from reaching an unlocked workstation. This gamified assessment is designed as a post-training activity, meant to be taken after completing the 2020 Your Role, 2020 Social Engineering Red Flags, and 2020 Common Threats modules. - Your Role, Internet Security and You
Your Role discusses today’s threat landscape and an employee’s role in keeping their organization secure against these threats. Current cybercrime strategies are introduced, followed by an exploration of 12 common types of digital and in-person threats used by today’s cybercriminals to trick employees into taking an action. By learning how to recognize these threats, an employee can make smarter security decisions every day and help prevent a cybercrime attack that would put their organization, and themselves, at risk.
KnowBe4 Training Micro-modules
Also included in Training Access Level II (Gold & Platinum)
- Executive Series Micro-modules
- CEO Fraud
- Decision-Maker Email Threats
- Mobile Device Security
- Ransomware and Bitcoin
- Remote and Travel WiFi Dangers
- Safe Web Browsing With Corporate Devices
- Secure Destruction of Sensitive Information
- Securely Working From Home
- Social Engineering the Executive
- Social Media Precautions for Executives
- Captain Awareness Series
- Be a Human Firewall
- Conquer Internet Safety for Kids
- Securing Your Mobile Devices
- Triumph over the Reuse of Passwords
- Understanding GDPR
- Securely Working from Home
- Be Vigilant with USB Drives
- Outwit Dumpster Divers
- Travel Securely
- Handling Printouts
- Understanding Data Breaches
- Safeguard Social Media
- Protect Your Web Browser
- Guardians of Sensitive Information
- Vanquish Malicious Attachments
- Outwit Social Engineering
- Conquer Open WiFi
- Foil Phishing
- Voice Activated Device
- Detecting Suspicious Activity
- Perils of Pretexting
- Beware of Disinformation
- Credit Card Security (Part 1)
This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information. - Credit Card Security (Part 2)
This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi. - Danger Zone Exercise
Oh no! A hacker is inside your organization and has spotted an unlocked workstation. Answer security awareness training-related questions correctly, and you will move closer to the workstation. Answer incorrectly, and the hacker will move closer. Stop the hacker, get to that workstation, and save the organization. Game on!
- Don't Be Dave
This 90 second video shows two of the worst things you can do with your password. - Email Spoofing
This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be. - Handling Sensitive Information Securely (Part 1)
This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII). - Handling Sensitive Information Securely (Part 2)
This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI). - How to Stay Safe for the Holidays
The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target. - Ransomware
This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files. - Safe Web Browsing
This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end. - Social Engineering
This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks. - Social Media Best Practices
This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers. - Strong Passwords
This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords. - USB Attack
This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.
The Security Awareness Company Content Library
Also included in Training Access Level III (Diamond)
Cyber Security Awareness Interactive Training Modules
- Active Shooter & Physical Incident Response
- Call Center & Help Desk Awareness
- Computer Security & Data Protection
- Cross Border Data Protection
- Data Classification
- Developing an Incident Response Plan
- Empowering Your Employees for Better Security
- Executive Awareness Leadership
- How to be a Human Firewall
- Identification & User Authentication
- Identity Theft and Data Breaches
- Insider Threats for Executives and Managers
- Malware
- Mobile Security Basics
- Non-technical Security Basics
- OWASP Top 10
- PCI DSS Retail Store Experience
- Password Basics
- Phishing Andrew's Inbox
- Phishing Awareness
- Phishing Fundamentals
- Privacy Basics
- Ransomware
- Secure Online Behavior
- Security Awareness Fundamentals
- Security Triads
- Social Engineering
- Social Engineering & Phishing for Executives
- Social Engineering Basics
- The Top 10 Security Awareness Fundamentals Test Out
- Top 10 Security Awareness Fundamentals for New Hires
- Understanding and Mitigating Security Risks for Executives
- Understanding and Protecting PII
- Workforce Safety & Security Awareness
- Workplace Violence and Safety
Cyber Security Awareness Compliance Modules
- FERC/NERC for End Users
- FERC/NERC for Managers and Executives
- FERPA (Education)
- FFIEC (Financial Compliance)GLBA (Finance)
- HIPAA (Healthcare)
- PCI-DSS (Retail Compliance)
- Sarbanes-Oxley (Accounting)
Cyber Security Awareness Newsletters and Security Docs
- 13 Habits of Savvy SM Users
- 5 Examples of Social Engineering
- 5 Steps to Prevent ID Theft
- 5 Steps to Prevent ID Theft
- 5 Traits of a Security Aware Employee
- 7 Tips for Travelers
- A Real Life Spear Phishing Attack
- Access Controls
- Advanced Persistent Threats
- Are Your Things Part of a Botnet?
- Availability
- Back to School Security Checklist
- Bad Passwords
- Bank Secrecy Act
- Being a Human Firewall in All Three Domains
- China's Cybersecurity Law
- Click With Care
- Confidentiality
- Cross Border Data Protection Overview
- DIY Home Internet Security Policy
- Data Breaches and You
- Data Classification at Home
- Data Classification at Work
- EU GDPR: The Basics
- Field Guide to Phishing Emails
- Following Policy and Reporting Incidents
- Forms of Social Engineering
- Hey! That's my pie! Oops, I mean PII
- How VPNs Work
- How to Identify a Social Engineering Attack
- In Case of Emergency
- Incident Response in Action
- Incident Response in All Three Domains
- Integrity
- IoT Gone Rogue
- Keeping Kids Safe on Social Media + 10 Tips for Parents
- LinkedIn Scams & It’s a Spammer's World
- Malware on the go!
- Mined Your Data
- Monthly Security Awareness Newsletter
- Monthly Scavenger Hunt Questions for Newsletter
- Non-technical Security in ALL THREE DOMAINS
- PHI stands for Protected Health Information
- PII: To Prominent Constant of Information Security
- Passphrases: The Smart Alternative
- Phishing In Action
- Privacy vs. Security
- Proven Password Policies
- Ransomware Security One Sheet
- Redefining What it Means to be a Human Firewall
- Regulations Near and Far
- Respecting Privileged Access
- Securing Mobile Devices
- Securing Smart Devices
- Security Incidents and Where to Report Them
- Shipshape SM Behavior
- Simple Steps to Online Safety
- Smishing: Phishing Gone Mobile
- Spam Emails vs Phishing Emails
- The CIA Triad: Security to the Power of Three
- The Cloud Is Not Yours
- The Domains Triad: Mind, Body, and Soul
- The Future of Identification and Authentication
- The Horrors of Malware
- The Importance of Data Classification
- The Internet of Things and the Concerns of Convenience
- The Journey to Being Anonymous on the Internet
- The Many Lives Triad
- The Many Lives of PII
- The Physical Side of Security Awareness
- The Rule of Three
- The Three Domains of Social Engineering
- The Three Lives of Incident Response
- The Underground Marketplace and Common Cyber Attacks
- Tis the Season..... for Scams
- Top 10 Security Practices for Work
- Top 10 Ways to Stay Safe at Home
- Top 10 Ways to Stay Secure on the Go
- Understanding BEC
- Understanding Compliance Standards
- Understanding Insider Threats
- Understanding Insider Threats & Offboarding
- Understanding the Attackers
- Whale and Spear Phishing
- What is A Human Firewall?
- What is NIST Cybersecurity Framework?
- What is Privacy Shield?
- What’s the WiFi Password?
- Where Do You Hide Your Passwords?
- Where in the World is Ransomware
- Where's the Remote
- Who are Cybercriminals
- Why Does Compliance Matter
- You Need a PW Manager
Cyber Security Awareness Videos (2-5 mins)
- 10 ways to avoid phishing scams
- 10 ways to keep PII private
- 10 ways to stay safe on social media
- A Day of Bad Passwords
- Backup
- Being a Human Firewall
- Beyond Phishing
- Catching malware
- Cyber Crime Starts with You
- Dangers of USBs
- Data Breach Overview
- Data Breaches and You
- Data Classification Overview
- Data Loss and Insiders
- Definition of Social Engineering
- Dumpster Diving
- Email Spoofing
- Executives Mitigating Insider Threats
- Hide your passwords
- Human Firewall and Data Classification
- Incident Response 101
- Introduction to Ransomware
- Introduction to the cloud
- Low-Tech Hacks to Steal Your ID
- Mouse Overs
- Non-Technical Security Skills
- Non-Technical and Physical security tips and tricks
- PII and Compliance
- Phishing Contest Winner
- Phishing From Facebook
- Phishing From Netflix
- Phishing From Your Bank
- Phishing in Action
- Physical Security Threats
- Pretexting: (Fake Fraud Protection)
- Pretexting: (Fake Help Desk)
- Pretexting: Fake Employee to Help Desk
- Pretexting: Fake Executive to I.T.
- Pretexting: From Fake Credit Card Company
- Pretexting: From Fake I.T.
- Privacy Vs. Security
- Protecting Data
- Road Warriors
- Safe Surfing 1 - HTTP vs HTTPS & Online Authentication
- Security Myths Busted
- Social Media
- Social Media Data Mining
- Social Networking Do's and Don’ts
- The CIA Triad
- The Domains Triad
- The Human Firewall's Top Concerns in All Three Domains
- The Many Lives Triad
- The Many Lives of PII
- Understanding Encryption
- Welcome to Security Awareness Training
- Welcome to Security Awareness Training - Animated
- What Are APTs
- What Does a Social Engineer Look Like?
- What is I.D. Theft
- What is PII?
- Why Executives Need Awareness Training
- Why Security Awareness?
- Workplace Physical Awareness
- Your Security Awareness Journey
Cyber Security Awareness Games
- End of the Day Security Challenge
- Human Firewall Big Business
- Human Firewall Trivia
- Human Firewall World Race
- Password Big Business Game
- Password World Race Game
- Phishing Awareness Big Business
- Phishing Awareness Trivia
- Phishing Awareness World Race
- Security Awareness World Race
- Security Awareness Big Business
- Security Awareness Card Stack
- Security Awareness Casino Challenge
- Security Awareness Trivia
- Social Engineering & Phishing Millionaire Challenge
- Social Engineering Big Business Game
- Social Engineering Trivia
- Social Engineering World Race Game
Cyber Security Awareness Posters
- Anatomy Of A Phishing Email
- Are You The Weakest Link?
- Back Up
- Bad Guys don't always wear Masks
- Be Alert
- Be a Human Firewall
- Be a Human Firewall- Always Follow Policy
- Break Up With Your Password
- Buckle Up
- Can you Spot a Social Engineer?
- Changed your Password?
- Confidential Documents
- Confused By our Security Policies?
- Confused about policy?
- Critical Assets In Your Hands
- Ctrl+Alt+Delete
- Cyber Security in the Workplace
- Data Protection Life Cycle
- Decorate Your Devices
- Definition: Click Happy
- Definition: Phish Face
- Did You Click A Phishing Link?
- Did You Forget To Backup?
- Did you follow Policy?
- Digital Signature
- Do You Know FERC/NERC?
- Do You Know Malware? (Spider)
- Do You Know Malware? (Warning)
- Do You Know Our Policies?
- Do You Know Your Security Responsibilities
- Do You Think Before You Click?
- Do You Think Before You Click? Ask!
- Do you Download Apps?
- Do you Trust the Delivery Man?
- Do you know what you are Downloading?
- Don't Leave Us In the Dark
- Don't Turn Off the Lights
- Don't Use your Dog's Name for a Password
- Don't be Fooled(IRS)
- Don't be Phishing Bait
- Don't get hooked on Phishing Scams
- Don’t Be Phishing Bait
- Don’t Be a Puppet
- Don’t Let Social Engineers In Your Head
- EU-US Privacy Shield
- Fishing Bait Click Bait
- Forget Passwords
- GDPR is Here
- GLBA Pretexting Protection
- GLBA Safeguards Rule
- Got A Problem?
- HIPAA Penalties
- HIPAA is More Than Just Compliance
- HIPAA isn't just for medical professionals
- Have You Been Social Engineered Lately?
- Health Care Requires Data Care
- How Do You Know If Your ID Has Been Stolen
- How Much Information Can Be Stolen From Your Laptop?
- Human Firewall Details
- I Know What I Am Downloading
- I know what you did last Friday
- IRS will never threaten with Law Enforcement
- Incident Response Is All About Time
- Incident Response LifeGuard
- InfoSec Is Your Responsibility
- InfoSec Is Your Responsibility World
- Information Security Is All Of Us
- Insider Threat Malicious or Unintentional
- Isn't Their Business (Sunset)
- Keep A Clean Desk!
- Keep Calm Ask if you don't know
- Keep Calm Change Your Password
- Keep Calm Delete Phishing Emails
- Keep Calm Follow Policy
- Keep Calm Report Security Issues
- Keep Calm Think Before You Click
- Keep Secrets Secret
- Keys to the Kingdom
- Kiss your Data Goodbye
- Laptop Security
- Leaks Make Us Weak - Caller
- Leaks Make Us Weak - Click
- Leaks Make Us Weak - Password
- Login Info Is Private
- Messy Desk? Clean Up Your Act!
- Mixed Up Password
- Mobile Phones - Personal Data
- My Password is Complex and Creative
- NIST Cybersecurity Framework
- Need Help with your Password?
- Never Share Passwords
- No Piggybacking Zone
- No Thru Traffic
- No information without Protection
- Not All Insider Threats Are Obvious
- PCI-DSS Cardholder Data
- PCI-DSS POS Security
- PW Smoothie
- Password Expiration
- Passwords Hard to Crack
- Perils of the Internet
- Protect Company Data (No personal data on company devices)
- Protected Health Information
- Protecting Data Across Borders
- Protecting PHI
- Ransomware - Just One Click
- Ransomware Encrypts Your Data
- Ransomware Is A Malicious Program
- Recognize and Protect PII
- Report Anything Unusual
- Report Strange Incidents
- Report Strange Things!
- Report it Immediately
- SHHH Keep Company Conversations Private
- Secure Network
- Secure Your Devices
- Security Doesn't End With Software
- Security Is Not a Vacuum
- Security Leader Lighthouse
- See Something Strange... Report It
- Shred
- Simple Steps to Staying Safe Online
- Social Engineering
- Social Engineering
- Social Engineers Target People
- Social Media
- Something Out of the Ordinary
- Stop Think Connect
- Stop and Shred
- Strong Passwords (Woman)
- Tax Season Checklist
- Tax Season got you Flustered?
- The Cloud is Someone Else's Computer
- The Universe is Expanding
- These Keys Lock Your Computer
- They Don't Wear Name Tags
- Tips To Avoid Ransomware
- Today's Predictions for Tomorrow's Internet
- Together We Are Human Firewalls
- Transferring Data Across Borders
- Treat Passwords Like Your Underpants
- Treat Your Password Like A Toothbrush Photographic
- Treat Your Password Like Underwear
- Treat Your Passwords Like Your Toothbrush - Silhouette
- Triad Classic
- Triad Many Lives
- Triad SNL Passwords
- Triad Security Domains
- USB
- Understanding Compliance
- Unfamiliar Persons
- Use Mobile Devices Safely
- Watch Out for Tailgaters
- Watch out for Shoulder Surfers
- What is PII?
- Whiteboard Security
- Wifi Hot Spot
- Work Phone lost or Stolen?
- Wrong Way
Popcorn Training
Also included in Training Access Level III (Diamond)
Popcorn Training Modules
Something Phishy Series Videos & Quiz (Animated)
- Something Phishy Introduction
- Mobile Mayhem (mobile threats)
- Pass the Password (passwords, social engineering)
- Breaking the Barrier (physical, clean desk)
- Phishous Malicious (Internet use)
- Dicey Devicey (BYOD Security)
- Freaky Leaky (DLP)
- Cloudy with a chance of Phish (Cloud Apps)
- Social Media Fever (Social Network Security)
Cyber Heroes Series Videos & Quiz (Live Action)
- Cyber Heroes Introduction
- Don't take the bait (spear phishing, social engineering, vishing)
- Mobile Mayhem (mobile threats)
- Pass the Password (pass word, social engineering)
- Internet Threats (Internet use)
- Dicey Devicey (BYOD Security)
- Freaky Leaky (DLP)
- Cloudy with a chance of Phish (Cloud Apps)
- Social Media Fever (Social Network Security)
Security Moment Short Clip Videos & Quiz (Motion Graphic)
- The Big Phish
- Social Engineering
- Ransomware
- Spot the fake attachment
- Spot the fake link
- Privileged user access management (PAM)
- Hacking Emotions
Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
- Secure Transactions and Secure Deployments
- Authentication and Authorization
- Data Security
- Injection Attacks and How to Avoid Them
- Introduction to Web Application Security
- Secure Session Management
Compliance Series (Animated)
- PCI DSS for Merchants
- PCI DSS for Corporate Office
- PCI DSS for Retail Stores
- SupaPOPI (RSA)
- Consumer Protection Act (RSA)
- Treating Customer Fairly (RSA)
- Conflict of interest policy
- Business Continuity / Business Resilience
Privacy Series Videos and Quiz (Live Action)
- Personal Information–Currency of the 21st Century
- Identity Theft–Protect your Personal Information
- Privacy Principles–Handling Personal Information at Work
- Protecting Personal Information–Security & Safeguards
- General Data Protection Regulation (GDPR)–User Rights
Building Secure Software Series
- Ep 1 - Very Early and Often
- Ep 2 - Leverage Security Frameworks and Libraries
- Ep 3 - Secure Database Access
Cyber Essentials Series
- Information Security 101
Standups 4 Security Series: (Live Action)
- Cybercrime Promo
- A Goliath Hack
- Behind the Scam with Loyiso Madinga
- Open Secrets - A Password Exhibition
- Spear phishing - Catching the Big Phish
- Don't Trust Anybody - CEO Scam
- Social Media Oversharing
- The Dark Web Pop-up
Cyber Security Awareness Games
Cyber Heroes Series
- Cloudy with a Chance of Phish
- Dicey Devicey
- Don't Take the Bait
- Freaky Leaky
- Internet Threats
- Mobile Mayhem
- Pass the Password
- Social Media Fever
Security Moments Series
- Hacking Emotions
- Privileged User Access Management
- Ransomware
- Social Engineering 101
- Spot the Bad Attachment
- Spot the Bad Link
- The Big Phish
Something Phishy Series
- Breaking the Barrier
- Cloudy With A Chance of Phish
- Dicey Devicey
- Freaky Leaky
- Mobile Mayhem
- Pass The Password
- Phishious Malicious
- Social Media Fever
- Something Phishy
Privacy Series
- GDPR
- Identity Theft
- Personal Information
- Privacy Principles
- Protecting Personal Information
exploqii Videos
Also included in Training Access Level III (Diamond)
- Anti Trust 1 - Basic Regulations & Risks
- Basic Rules of Secure Communication
- Bluetooth & WiFi
- Business Partner Compliance
- CEO Fraud - Fake President
- Clean Desk Policy
- Cloud Services
- Code of Conduct
- Compliance Checklist
- Compliance Management System
- Conflict of Interest
- Corruption
- Crisis Management
- Data Protection
- Disinformation
- EU GDPR
- Export Control
- Fairness & Respect in the Workplace
- Gifts & Hospitality
- IT Security in the Workplace
- Identity Theft
- Industrial Espionage
- Information Classification
- Information Security @ Mobile Devices
- Information Security @ Remote Workplaces
- Information Security @ Social Media
- Insider Threat
- Internal Investigations
- Know-How Security
- Money Laundering
- Payment Fraud
- Phishing Attacks on Companies
- Phone Scam
- Price Rigging
- Proxy Servers & Data Privacy
- Ransomware Micro-module
- Secure Passwords
- Security-Oriented Personnel Selection
- Sexual Harassment
- Social Engineering Micro-module
- Social Media Guidelines
- Threat Management
- Travel Security
- USB Attacks
- Visitor Management
- 4Whistleblower
Canada Privacy Training Modules
Also included in Training Access Level III (Diamond)
Canada Privacy Training Modules
- Canadian Private Sector Privacy
Twist & Shout Video Modules
Also included in Training Access Level III (Diamond)
Twist & Shout Video Modules
Restricted Intelligence Series
Season 1
Episode 1 - The Test (passwords and passes)
Episode 2 - Browsing (safe surfing)
Episode 3 - A Cry for Help (email hacking and phishing)
Episode 4 - The Journey (portable storage devices)
Episode 5 - The Leak (beware what you share
Episode 6 - The Lesson (mobile devices)
Season 2
Episode 1 - Impression Points (Travel)
Episode 2 - What’s in a Name (Phishing)
Episode 3 - Out of Sight, Out of Mind (Cloud Services)
Episode 4 - Like A Stargate (BYOD)
Episode 5 - It Was Nothing (Document Classification)
Episode 6 - Nobody watches those things (Executive Behavior)
Episode 7 - New Best Friend (Insider Threats)
Season 3
Episode 1 - Leave It To The Master (Social Engineering)
Episode 2 - Nothing to Concern You (Document Disposal)
Episode 3 - Ask the Expert (Social Media Phishing)
Episode 4 - It's Come To My Attention (Homeworking)
Episode 5 - Did You See That One? (Reporting Incidents)
Episode 6 - I Know What You Did Last Weekend (App Permissions)
Season 4
Episode 1 - Everybody Loves Mia (Third Party Vendors)
Episode 2 - Elementary (Social Media Safety)
Episode 3 - One Bad Seed (Physical Access)
Episode 4 - Just Breathe (Phishing)
Episode 5 - Hostage Situation (Ransomware)
Episode 6 - We Could Be Heroes (Public Wifi)
Season 5
Episode 1 - Nothing In Life Is Free (Freeware)
Episode 2 - Besties (Insider Threat)
Episode 3 - There He Blows (Whaling)
Episode 4 - The Worst That Could Happen (Ransomware)
Episode 5 - It's The Latest (Password Safety)
Episode 6 - The Perfect Storm (Oversharing Social Media)
Season 6
Episode 1 - Out of the Shadows (Cloud Services)
Episode 2 - All About Eve (Reporting Incidents)
Episode 3 - Getting the Message (Document Classification)
Episode 4 - Don't Say a Word (Ransomware)
Episode 5 - Charity Case (Phishing)
Episode 6 - False Witness (Identity Theft)
Episode 7 - Bonus: Lionel's Music Video
Restricted Intelligence Privacy Edition
Season 1
Episode 1 - Nothing To Do With Me (What Is PI?)
Episode 2 - Nobody Reads That Stuff (Privacy by Design)
Episode 3 - Once More Unto the Breach (Retention & Disposal)
Episode 4 - The Heart of the Matter (Purpose & Minimisation)
Episode 5 - Mr. Cellophane (Transparency)
Episode 6 - Partners (Third Party Partners)
Bonus: GDPR Intro (GDPR is Coming)
Season 2
Episode 1 - Get Off My Cloud (Privacy and The Cloud)
Episode 2 - Permission To Speak (Access)
Episode 3 - Hard To Say Goodbye (Legitimate Interest)
Episode 4 - Existential Crisis (Data Accuracy)
Episode 5 - Getting It Out There (Accountability)
Episode 6 - Keep It Secret, Keep It Safe (Privacy and Security)
Restricted Intelligence - HIPAA Edition Series
Season 1
Episode 1 - You'll Get A Kick Out Of This (Social Media Sharing)
Episode 2 - Those Seconds Add Up (Unapproved Apps)
Episode 3 - I Hate Surprises (Private Records)
Episode 4 - A Delicate Dance (Passwords & Access)
Episode 5 - Ransom Rumours (Ransomware)
Episode 6 - What's The Worst That Can Happen (Phishing)
Tuesdays with Bernie Series
Season 1
Episode 1 - New Beginnings (Appropriate Workplace Communication)
Episode 2 - Left Behind (Disclosure of Non-Public Information)
Episode 3 - The Fixer (Use of Local Agents)
Episode 4 - Talking a Good Game (External Communications)
Episode 5 - Sit Up and Take Notice (Anti-Corruption)
Episode 6 - Smell Test (Counterparty Screening)
Season 2
Episode 1 - You Scratch My Back (Non-Public Information)
Episode 2 - Like It Never Happened (HSE Reporting)
Episode 3 - Seeing The Light (Export)
Episode 4 - Eye Of The Storm (Business Continuity)
Episode 5 - No Second Chances (Legal Holds)
Episode 6 - The Hard Way (Code of Conduct)
Season 1
Episode 1 - The New Guy (Social Engineering)
Episode 2 - Social Hour (Social Media)
Episode 3 - On Our Side (Phishing Attacks)
Episode 4 - Surprise (Document Disposal)
Episode 5 - Takeaways (Clear Desktop Policy)
Episode 6 - Masquerade (Cloud Services)
Episode 7 - Buying Time (Passwords)
Episode 8 - Taken (Ransomware)
Episode 9 - Where The Wild Things Are (Travel)
Episode 10 - Keep Your Friends Close (App security and permissions)
Episode 11 - The Sound Of Trumpets (External Devices)
Episode 12 - Checkmate (Insider Threats)
Season 2
Episode 1 - A Different Tune (Mobile Devices)
Episode 2 - Crack Team (Need to Know)
Episode 3 - It’s a Date (Mobile Devices Continued)
Episode 4 - The Holy Grail (Internet of Things, Connected Devices)
Episode 5 - Unlikely BedFellows (Phishing)
Episode 6 - It’s Complicated (Multi-Factor Authentication/Phone-Phishing)
Episode 7 - Table for Two (Passwords/Third-Party Apps)
Episode 8 - The Guy Behind the Guy (External Devices and Physical Access)
Episode 9 - Behind the Curtain (Social Engineering)
Episode 10 - Showdown at the AI Corral Part 1 (Social Engineering Continued)
Episode 11 - Showdown at the AI Corral Part 2 (Insider Threats)
Episode 12 - A New Day (Internet of Things, Connected Devices)
Season 3
Episode 1 - Getting In (Physical Security)
Episode 2 - Challenge Accepted (Phishing/Passwords)
Episode 3 - Things Unsaid (Disclosing Information in Public)
Episode 4 - Credit Where Credit is Due (Social Media)
Episode 5 - The Truth Shall Set You Free (Personal Information)
Episode 6 - Family Ties (PIN Security)
Episode 7 - You Can’t Choose Your Family (Security Consciousness)
Episode 8 - Escaping the Past (Deepfake/CEO Fraud)
Episode 9 - The Hook (Vishing/Fake Peripherals)
Episode 10 - The Line (Document Security/Hacker Databases)
Episode 11 - The Sinker (Internet Banking)
Episode 12 - Blast from the Past (Social Engineering)
Season 4
Episode 1 - Crash the Party (Spear Phishing, Physical Security)
Episode 2 - Hostage to Fortune (Ransomware, Malware)
Episode 3 - They Always Pay (Ransomware, Malware)
Episode 4 - Appointment with Fate (Phishing, Social Engineering)
Episode 5 - Trust Me (USB, Social Engineering, Human Firewall)
Episode 6 - Under Pressure (Malware, Social Engineering)
Episode 7 - Faking It (Social Media)
Episode 8 - Nuclear Family (Social Engineering, Passwords/Authentication)
Episode 9 - Party On (Social Engineering, Passwords, Social Media)
Episode 10 - Suspicious Minds (Incident Reporting)
Episode 11 - Bittersweet (Ransomware, Email Security, Human Firewall)
Episode 12 - The Morning After (Social Engineering)
El Pescador Training Modules
Also included in Training Access Level III (Diamond)
El Pescador Training Modules
- Data Collection
- Data Collection Quiz
- C-Level Phishing
- Finance Sector Phishing
- Lei Geral de Proteção de Dados
- Phishing: Why Should We Care
- Phishing, The Major Cause of Information Leakage
- Relationship Trust
- The Threat May Be Closer Than You Think
lawpilots
Also included in Training Access Level III (Diamond)
lawpilots Training Modules
- Anti-Bribery and Anti-Corruption
- Data Protection Essentials
- Antitrust and Competition Law
- Data Protection for Employees
- CCPA for Employees
MediaPR
MediaPRO security awareness training content is included in Training Access Level III (Diamond)
MediaPRO Training Modules
- Beating Ransomware
(Additional MediaPRO modules are available with a Compliance Plus subscription)
Kontra
Kontra application security awareness training content is included in Training Access Level III (Diamond)
- OWASP Top 10 for Web (Java)
- OWASP Top 10 for Web (C#)
- AWS Top 10 (Java)
- Front-end Top 10 (Vue.js)
Compliance Plus
Available as an add-on subscription with a Silver, Gold, Platinum, or Diamond subscription.
Compliance Plus Training Modules
New-school compliance training topics covered:
- Diversity, Equity & Inclusion
- Sexual Harassment
- Discrimination
- Business Ethics
- Workplace Safety
- Data Privacy (PCI, HIPAA, FERPA, CPRA, and more)
- Data Protection
- Employment Law (FMLA and ADA)