This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Awareness Training
Security awareness training
Offer your team members exactly what they need. No more, no less.
LEARNING
Awareness training for different levels
Our training modules are divided into different levels to match different responsibilities within your organisation, giving each user the breadth and depth of knowledge and practise needed in their everyday work.
CHANGING
A matter of culture
Increased awareness, greater knowledge and good data security practices will ultimately change every computer user’s behaviour and nurture a culture of security within your organisation.

REPORTING
Monitoring and compliance
Our platform’s analytics allow you to identify weaknesses among your individual staff as well as departments. At the same time, it facilitates compliance with national or international regulations. Ultimately, this protects you against highly damaging and potentially costly data breaches.
Course Catalogue
Malvertising
This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.
Call before you click!
SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!
Beware of banking instructions
Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.
Ads attract buyers and fraudsters
Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.
Technical support or clever scam?
See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.
ISO 27001
The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.
Incident Response Plan
This course provides an overview on what the Incident Response Plan involves.
CYBERAWARE – Full Course
This course includes 13 courses from Essentials category bundled together.
Workplace Safety
Security Information and Event Management
Explains the basic concepts of a SIEM system.
Active Information Gathering
Explains the basic concepts of Active Information Gathering in Penetration Testing.
Multi-factor Authentication
This course explains why the use of multi-factor authentication is important.
Unintentional Data Leak
This courses explains how data leakage can occur.
Clean Desk Policy
This course summarises the importance of having clean desks.
The Dark Side Of The Cloud
Can you Recognise Suspicious Attachments
Can You Tell If A Website Is Safe
Why Incident Response is Needed
Expains why incident response is vital to organisations.
What is a Firewall
Explains what the firewall is.
Software Installation and Removal
Explains why users should not be allowed to install or remove software.
Registry
Explains what the registry is and what is stored in it.
Anti-Money Laundering
This course focuses on different aspects of money laundering.
Credit Card Security
This course focuses on practical measures for keeping credit cards safe.
Working From Home – Security Tips
This course warns for the risks when working from home.
Identity Theft
This course warns for the risks of identity theft and the harm it can cause.
Seven Signs of Phishing
This course is an interactive SCORM course for learners to recognise phishing emails.
Creating Passwords
This course educates users on how to treat their passwords as well as the importance of password complexity.
Physical Security Measures
This course explains how to implement Physical security inside the organisation.
Use Cloud Services Securely
This course educates users on how to securely use Cloud Services.
Ransomware
It gives an overview of some famous ransomware attacks.
Rainbow Tables
Explains what rainbow tables are and how are used.
Patching
Explains why operating system patches are needed.
MAC Addresses
Explains what MAC addresses are.
Beware Of Malware
Use Social Networking Securely
This course educates users on how to securely use Social Networking.
Use Email Securely
This course educates users on how to securely use email services.
Browse the Web Safely
This course educates users on how to securely browse the web to avoid malicious content.
Use Wireless Devices Securely
This course educates users on how to securely use wireless devices.
Identify and Mitigate Malware
This course educates users on how to identify malware on their systems and mitigate the threats.
Password Are Precious
Your Phone And Tablet Are For Your Hands Only
Social Media Can Be Scary
Cybersecurity Starts With YOU – Mobile Devices
Cybersecurity Starts With YOU – Phishing
Layer 2 Tunneling Protocol
It gives an overview of what L2TP is.
Hacking Preparation
Explains the first steps that hackers take before the attack.
Encrypting File System
It gives an overview of encrypting file system.
Disaster Recover Plan
Explains basic concepts of what disaster recovery is.
Ransomware
This course introduces the term ransomware and explains what it is.
Phishing for Business
This course introduces the social engineering term and the most common forms.
Shadow Security
This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.
Security Fatique
This course introduces the term security fatique and describes the measures related to data security.
Protect Your Data
This course educates users on how to protect their data from theft.
Securing Devices
This course educates users on how to keep their accounts and devices safe from unauthorised access.
Maintain Physical Security of Devices
This course educates users on how to implement physical security to their devices.
Components and Processes of IDS
Explains the basic processes and components of IDS systems.
Payment Card Industry Data Security Standard (PCI DSS)
This course explains which organisations must comply with PCI DSS.
Data is Like Diamonds
Buffer Overflow
Explains basic concepts of buffer overflow attacks.
GDPR AWARENESS
This course is an interactive SCORM course for GDPR regulations.
Social Engineering for Business
This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.
Social Engineering
This course explains what Social Engineering is, and how to avoid getting played.
Identifying the Need for Security
This course outlines why Cyber Security is needed.
GDPR AWARENESS
This course is an interactive SCORM course for GDPR regulations.
ISO 27001
The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.
Payment Card Industry Data Security Standard (PCI DSS)
This course explains which organisations must comply with PCI DSS.
Ads attract buyers and fraudsters
Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.
Anti-Money Laundering
This course focuses on different aspects of money laundering.
Beware of banking instructions
Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.
Browse the Web Safely
This course educates users on how to securely browse the web to avoid malicious content.
Call before you click!
SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!
Clean Desk Policy
This course summarises the importance of having clean desks.
Creating Passwords
This course educates users on how to treat their passwords as well as the importance of password complexity.
Credit Card Security
This course focuses on practical measures for keeping credit cards safe.
CYBERAWARE – Full Course
This course includes 13 courses from Essentials category bundled together.
Identify and Mitigate Malware
This course educates users on how to identify malware on their systems and mitigate the threats.
Identifying the Need for Security
This course outlines why Cyber Security is needed.
Identity Theft
This course warns for the risks of identity theft and the harm it can cause.
Maintain Physical Security of Devices
This course educates users on how to implement physical security to their devices.
Malvertising
This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.
Multi-factor Authentication
This course explains why the use of multi-factor authentication is important.
Physical Security Measures
This course explains how to implement Physical security inside the organisation.
Protect Your Data
This course educates users on how to protect their data from theft.
Securing Devices
This course educates users on how to keep their accounts and devices safe from unauthorised access.
Seven Signs of Phishing
This course is an interactive SCORM course for learners to recognise phishing emails.
Social Engineering
This course explains what Social Engineering is, and how to avoid getting played.
Technical support or clever scam?
See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.
Unintentional Data Leak
This courses explains how data leakage can occur.
Use Cloud Services Securely
This course educates users on how to securely use Cloud Services.
Use Email Securely
This course educates users on how to securely use email services.
Use Social Networking Securely
This course educates users on how to securely use Social Networking.
Use Wireless Devices Securely
This course educates users on how to securely use wireless devices.
Working From Home – Security Tips
This course warns for the risks when working from home.
Incident Response Plan
This course provides an overview on what the Incident Response Plan involves.
Phishing for Business
This course introduces the social engineering term and the most common forms.
Ransomware
This course introduces the term ransomware and explains what it is.
Security Fatique
This course introduces the term security fatique and describes the measures related to data security.
Shadow Security
This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.
Social Engineering for Business
This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.
Beware Of Malware
Can you Recognise Suspicious Attachments
Can You Tell If A Website Is Safe
Cybersecurity Starts With YOU – Phishing
Cybersecurity Starts With YOU – Mobile Devices
Data is Like Diamonds
Password Are Precious
Social Media Can Be Scary
The Dark Side Of The Cloud
Workplace Safety
Your Phone And Tablet Are For Your Hands Only
Active Information Gathering
Explains the basic concepts of Active Information Gathering in Penetration Testing.
Buffer Overflow
Explains basic concepts of buffer overflow attacks.
Components and Processes of IDS
Explains the basic processes and components of IDS systems.
Disaster Recover Plan
Explains basic concepts of what disaster recovery is.
Encrypting File System
It gives an overview of encrypting file system.
Hacking Preparation
Explains the first steps that hackers take before the attack.
Layer 2 Tunneling Protocol
It gives an overview of what L2TP is.
MAC Addresses
Explains what MAC addresses are.
Patching
Explains why operating system patches are needed.
Rainbow Tables
Explains what rainbow tables are and how are used.
Ransomware
It gives an overview of some famous ransomware attacks.
Registry
Explains what the registry is and what is stored in it.
Security Information and Event Management
Explains the basic concepts of a SIEM system.
Software Installation and Removal
Explains why users should not be allowed to install or remove software.
What is a Firewall
Explains what the firewall is.
Why Incident Response is Needed
Expains why incident response is vital to organisations.