Awareness Training

Security awareness training

Offer your team members exactly what they need. No more, no less.

LEARNING

Awareness training for different levels

Our training modules are divided into different levels to match different responsibilities within your organisation, giving each user the breadth and depth of knowledge and practise needed in their everyday work.

CHANGING

A matter of culture

Increased awareness, greater knowledge and good data security practices will ultimately change every computer user’s behaviour and nurture a culture of security within your organisation.

REPORTING

Monitoring and compliance

Our platform’s analytics allow you to identify weaknesses among your individual staff as well as departments. At the same time, it facilitates compliance with national or international regulations. Ultimately, this protects you against highly damaging and potentially costly data breaches.

Course Catalogue

All
Essentials Training
Leaders Training
Compliance & Governance
Tech Training
Posters

Active Information Gathering

Explains the basic concepts of Active Information Gathering in Penetration Testing.

Ads attract buyers and fraudsters

Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.

Anti-Money Laundering

This course focuses on different aspects of money laundering.

Beware of banking instructions

Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.

Beware Of Malware

Blocking Mobile Attacks

This lesson draws attention to the important fact that mobile devices, including smartphones, are extremely vulnerable to cyber attacks.

Browse the Web Safely

This course educates users on how to securely browse the web to avoid malicious content.

Buffer Overflow

Explains basic concepts of buffer overflow attacks.

Business Ethics

A company’s ethics will determine its reputation. Good business ethics are essential for the long-term success of an organization.

BYOD Security

This lesson clarifies the crucial BYOD guidelines when personal devices are used in the workplace.

Call before you click!

SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!

Can you Recognise Suspicious Attachments

Can You Tell If A Website Is Safe

Clean Desk Policy

This course summarises the importance of having clean desks.

Components and Processes of IDS

Explains the basic processes and components of IDS systems.

Creating Passwords

This course educates users on how to treat their passwords as well as the importance of password complexity.

Credit Card Security

This course focuses on practical measures for keeping credit cards safe.

CYBERAWARE – Full Course

This course includes 13 courses from Essentials category bundled together.

Cybersecurity Starts With YOU – Phishing

Cybersecurity Starts With YOU – Mobile Devices

Data is Like Diamonds

Disaster Recover Plan

Explains basic concepts of what disaster recovery is.

Encrypting File System

It gives an overview of encrypting file system.

GDPR AWARENESS

This course is an interactive SCORM course for GDPR regulations.

Hacking Preparation

Explains the first steps that hackers take before the attack.

Identify and Mitigate Malware

This course educates users on how to identify malware on their systems and mitigate the threats.

Identifying the Need for Security

This course outlines why Cyber Security is needed.

Identity Theft

This course warns for the risks of identity theft and the harm it can cause.

Incident Response Plan

This course provides an overview on what the Incident Response Plan involves.

ISO 27001

The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.

Layer 2 Tunneling Protocol

It gives an overview of what L2TP is.

MAC Addresses

Explains what MAC addresses are.

Maintain Physical Security of Devices

This course educates users on how to implement physical security to their devices.

Malvertising

This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.

Multi-factor Authentication

This course explains why the use of multi-factor authentication is important.

Password Are Precious

Patching

Explains why operating system patches are needed.

Payment Card Industry Data Security Standard (PCI DSS)

This course explains which organisations must comply with PCI DSS.

Phishing for Business

This course introduces the social engineering term and the most common forms.

Physical Security Measures

This course explains how to implement Physical security inside the organisation.

Protect Your Data

This course educates users on how to protect their data from theft.

Rainbow Tables

Explains what rainbow tables are and how are used.

Ransomware

This course introduces the term ransomware and explains what it is.

Ransomware

It gives an overview of some famous ransomware attacks.

Registry

Explains what the registry is and what is stored in it.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook on Mobile)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (OWA)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Respect in the Workplace

This lesson will give you the tools and conversation to help empower your team to recognize behaviors that influence their performance within the workplace.

Responsibility in the Workplace

This lesson will introduce to you the idea of responsibility and the traits that define a responsible employee.

Risk Assessment and Management

Risk assessment and management is essential for the success of any business. However, many companies do not always take the necessary precautions, which leads to disaster.

Safety in the Workplace

Those who are in management are responsible for protecting the safety of their employees. Workplace safety, however, is the responsibility of everyone in an organization.

Securing Devices

This course educates users on how to keep their accounts and devices safe from unauthorised access.

Security Fatique

This course introduces the term security fatique and describes the measures related to data security.

Security Information and Event Management

Explains the basic concepts of a SIEM system.

Seven Signs of Phishing

This course is an interactive SCORM course for learners to recognise phishing emails.

Shadow Security

This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.

Social Engineering

This course explains what Social Engineering is, and how to avoid getting played.

Social Engineering for Business

This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.

Social Media Can Be Scary

Software Installation and Removal

Explains why users should not be allowed to install or remove software.

Technical support or clever scam?

See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.

The Dark Side Of The Cloud

Unintentional Data Leak

This courses explains how data leakage can occur.

Use Cloud Services Securely

This course educates users on how to securely use Cloud Services.

Use Email Securely

This course educates users on how to securely use email services.

Use Social Networking Securely

This course educates users on how to securely use Social Networking.

Use Wireless Devices Securely

This course educates users on how to securely use wireless devices.

What is a Firewall

Explains what the firewall is.

Why Incident Response is Needed

Expains why incident response is vital to organisations.

Working From Home – Security Tips

This course warns for the risks when working from home.

Workplace Bullying

This lesson will introduce you to your company’s responsibility with regard to preventing bullying, as well as the effects of bullying.

Workplace Harassment

This lesson will give you the tools necessary to recognize harassment in the workplace as well as understand your rights and responsibilities under the law.

Workplace Safety

Your Phone And Tablet Are For Your Hands Only

Anti-Money Laundering

This course focuses on different aspects of money laundering.

GDPR AWARENESS

This course is an interactive SCORM course for GDPR regulations.

ISO 27001

The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.

Payment Card Industry Data Security Standard (PCI DSS)

This course explains which organisations must comply with PCI DSS.

Ads attract buyers and fraudsters

Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.

Beware of banking instructions

Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.

Blocking Mobile Attacks

This lesson draws attention to the important fact that mobile devices, including smartphones, are extremely vulnerable to cyber attacks.

Browse the Web Safely

This course educates users on how to securely browse the web to avoid malicious content.

BYOD Security

This lesson clarifies the crucial BYOD guidelines when personal devices are used in the workplace.

Call before you click!

SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!

Clean Desk Policy

This course summarises the importance of having clean desks.

Creating Passwords

This course educates users on how to treat their passwords as well as the importance of password complexity.

Credit Card Security

This course focuses on practical measures for keeping credit cards safe.

CYBERAWARE – Full Course

This course includes 13 courses from Essentials category bundled together.

Identify and Mitigate Malware

This course educates users on how to identify malware on their systems and mitigate the threats.

Identifying the Need for Security

This course outlines why Cyber Security is needed.

Identity Theft

This course warns for the risks of identity theft and the harm it can cause.

Maintain Physical Security of Devices

This course educates users on how to implement physical security to their devices.

Malvertising

This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.

Multi-factor Authentication

This course explains why the use of multi-factor authentication is important.

Physical Security Measures

This course explains how to implement Physical security inside the organisation.

Protect Your Data

This course educates users on how to protect their data from theft.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook on Mobile)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Reporting Phishing Emails using Microsoft 365 Phishing Reporter (OWA)

Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.

Securing Devices

This course educates users on how to keep their accounts and devices safe from unauthorised access.

Seven Signs of Phishing

This course is an interactive SCORM course for learners to recognise phishing emails.

Social Engineering

This course explains what Social Engineering is, and how to avoid getting played.

Technical support or clever scam?

See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.

Unintentional Data Leak

This courses explains how data leakage can occur.

Use Cloud Services Securely

This course educates users on how to securely use Cloud Services.

Use Email Securely

This course educates users on how to securely use email services.

Use Social Networking Securely

This course educates users on how to securely use Social Networking.

Use Wireless Devices Securely

This course educates users on how to securely use wireless devices.

Working From Home – Security Tips

This course warns for the risks when working from home.

Business Ethics

A company’s ethics will determine its reputation. Good business ethics are essential for the long-term success of an organization.

Incident Response Plan

This course provides an overview on what the Incident Response Plan involves.

Phishing for Business

This course introduces the social engineering term and the most common forms.

Ransomware

This course introduces the term ransomware and explains what it is.

Respect in the Workplace

This lesson will give you the tools and conversation to help empower your team to recognize behaviors that influence their performance within the workplace.

Responsibility in the Workplace

This lesson will introduce to you the idea of responsibility and the traits that define a responsible employee.

Risk Assessment and Management

Risk assessment and management is essential for the success of any business. However, many companies do not always take the necessary precautions, which leads to disaster.

Safety in the Workplace

Those who are in management are responsible for protecting the safety of their employees. Workplace safety, however, is the responsibility of everyone in an organization.

Security Fatique

This course introduces the term security fatique and describes the measures related to data security.

Shadow Security

This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.

Social Engineering for Business

This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.

Workplace Bullying

This lesson will introduce you to your company’s responsibility with regard to preventing bullying, as well as the effects of bullying.

Workplace Harassment

This lesson will give you the tools necessary to recognize harassment in the workplace as well as understand your rights and responsibilities under the law.

Beware Of Malware

Can you Recognise Suspicious Attachments

Can You Tell If A Website Is Safe

Cybersecurity Starts With YOU – Phishing

Cybersecurity Starts With YOU – Mobile Devices

Data is Like Diamonds

Password Are Precious

Social Media Can Be Scary

The Dark Side Of The Cloud

Workplace Safety

Your Phone And Tablet Are For Your Hands Only

Active Information Gathering

Explains the basic concepts of Active Information Gathering in Penetration Testing.

Buffer Overflow

Explains basic concepts of buffer overflow attacks.

Components and Processes of IDS

Explains the basic processes and components of IDS systems.

Disaster Recover Plan

Explains basic concepts of what disaster recovery is.

Encrypting File System

It gives an overview of encrypting file system.

Hacking Preparation

Explains the first steps that hackers take before the attack.

Layer 2 Tunneling Protocol

It gives an overview of what L2TP is.

MAC Addresses

Explains what MAC addresses are.

Patching

Explains why operating system patches are needed.

Rainbow Tables

Explains what rainbow tables are and how are used.

Ransomware

It gives an overview of some famous ransomware attacks.

Registry

Explains what the registry is and what is stored in it.

Security Information and Event Management

Explains the basic concepts of a SIEM system.

Software Installation and Removal

Explains why users should not be allowed to install or remove software.

What is a Firewall

Explains what the firewall is.

Why Incident Response is Needed

Expains why incident response is vital to organisations.