This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Awareness Training
Security awareness training
Offer your team members exactly what they need. No more, no less.
LEARNING
Awareness training for different levels
Our training modules are divided into different levels to match different responsibilities within your organisation, giving each user the breadth and depth of knowledge and practise needed in their everyday work.
CHANGING
A matter of culture
Increased awareness, greater knowledge and good data security practices will ultimately change every computer user’s behaviour and nurture a culture of security within your organisation.

REPORTING
Monitoring and compliance
Our platform’s analytics allow you to identify weaknesses among your individual staff as well as departments. At the same time, it facilitates compliance with national or international regulations. Ultimately, this protects you against highly damaging and potentially costly data breaches.
Course Catalogue
Active Information Gathering
Explains the basic concepts of Active Information Gathering in Penetration Testing.
Ads attract buyers and fraudsters
Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.
Anti-Money Laundering
This course focuses on different aspects of money laundering.
Beware of banking instructions
Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.
Beware Of Malware
Blocking Mobile Attacks
This lesson draws attention to the important fact that mobile devices, including smartphones, are extremely vulnerable to cyber attacks.
Browse the Web Safely
This course educates users on how to securely browse the web to avoid malicious content.
Buffer Overflow
Explains basic concepts of buffer overflow attacks.
Business Ethics
A company’s ethics will determine its reputation. Good business ethics are essential for the long-term success of an organization.
BYOD Security
This lesson clarifies the crucial BYOD guidelines when personal devices are used in the workplace.
Call before you click!
SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!
Can you Recognise Suspicious Attachments
Can You Tell If A Website Is Safe
Clean Desk Policy
This course summarises the importance of having clean desks.
Components and Processes of IDS
Explains the basic processes and components of IDS systems.
Creating Passwords
This course educates users on how to treat their passwords as well as the importance of password complexity.
Credit Card Security
This course focuses on practical measures for keeping credit cards safe.
CYBERAWARE – Full Course
This course includes 13 courses from Essentials category bundled together.
Cybersecurity Starts With YOU – Phishing
Cybersecurity Starts With YOU – Mobile Devices
Data is Like Diamonds
Disaster Recover Plan
Explains basic concepts of what disaster recovery is.
Encrypting File System
It gives an overview of encrypting file system.
GDPR AWARENESS
This course is an interactive SCORM course for GDPR regulations.
Hacking Preparation
Explains the first steps that hackers take before the attack.
Identify and Mitigate Malware
This course educates users on how to identify malware on their systems and mitigate the threats.
Identifying the Need for Security
This course outlines why Cyber Security is needed.
Identity Theft
This course warns for the risks of identity theft and the harm it can cause.
Incident Response Plan
This course provides an overview on what the Incident Response Plan involves.
ISO 27001
The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.
Layer 2 Tunneling Protocol
It gives an overview of what L2TP is.
MAC Addresses
Explains what MAC addresses are.
Maintain Physical Security of Devices
This course educates users on how to implement physical security to their devices.
Malvertising
This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.
Multi-factor Authentication
This course explains why the use of multi-factor authentication is important.
Password Are Precious
Patching
Explains why operating system patches are needed.
Payment Card Industry Data Security Standard (PCI DSS)
This course explains which organisations must comply with PCI DSS.
Phishing for Business
This course introduces the social engineering term and the most common forms.
Physical Security Measures
This course explains how to implement Physical security inside the organisation.
Protect Your Data
This course educates users on how to protect their data from theft.
Rainbow Tables
Explains what rainbow tables are and how are used.
Ransomware
This course introduces the term ransomware and explains what it is.
Ransomware
It gives an overview of some famous ransomware attacks.
Registry
Explains what the registry is and what is stored in it.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook on Mobile)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (OWA)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Respect in the Workplace
This lesson will give you the tools and conversation to help empower your team to recognize behaviors that influence their performance within the workplace.
Responsibility in the Workplace
This lesson will introduce to you the idea of responsibility and the traits that define a responsible employee.
Risk Assessment and Management
Risk assessment and management is essential for the success of any business. However, many companies do not always take the necessary precautions, which leads to disaster.
Safety in the Workplace
Those who are in management are responsible for protecting the safety of their employees. Workplace safety, however, is the responsibility of everyone in an organization.
Securing Devices
This course educates users on how to keep their accounts and devices safe from unauthorised access.
Security Fatique
This course introduces the term security fatique and describes the measures related to data security.
Security Information and Event Management
Explains the basic concepts of a SIEM system.
Seven Signs of Phishing
This course is an interactive SCORM course for learners to recognise phishing emails.
Shadow Security
This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.
Social Engineering
This course explains what Social Engineering is, and how to avoid getting played.
Social Engineering for Business
This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.
Social Media Can Be Scary
Software Installation and Removal
Explains why users should not be allowed to install or remove software.
Technical support or clever scam?
See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.
The Dark Side Of The Cloud
Unintentional Data Leak
This courses explains how data leakage can occur.
Use Cloud Services Securely
This course educates users on how to securely use Cloud Services.
Use Email Securely
This course educates users on how to securely use email services.
Use Social Networking Securely
This course educates users on how to securely use Social Networking.
Use Wireless Devices Securely
This course educates users on how to securely use wireless devices.
What is a Firewall
Explains what the firewall is.
Why Incident Response is Needed
Expains why incident response is vital to organisations.
Working From Home – Security Tips
This course warns for the risks when working from home.
Workplace Bullying
This lesson will introduce you to your company’s responsibility with regard to preventing bullying, as well as the effects of bullying.
Workplace Harassment
This lesson will give you the tools necessary to recognize harassment in the workplace as well as understand your rights and responsibilities under the law.
Workplace Safety
Your Phone And Tablet Are For Your Hands Only
Anti-Money Laundering
This course focuses on different aspects of money laundering.
GDPR AWARENESS
This course is an interactive SCORM course for GDPR regulations.
ISO 27001
The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.
Payment Card Industry Data Security Standard (PCI DSS)
This course explains which organisations must comply with PCI DSS.
Ads attract buyers and fraudsters
Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.
Beware of banking instructions
Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.
Blocking Mobile Attacks
This lesson draws attention to the important fact that mobile devices, including smartphones, are extremely vulnerable to cyber attacks.
Browse the Web Safely
This course educates users on how to securely browse the web to avoid malicious content.
BYOD Security
This lesson clarifies the crucial BYOD guidelines when personal devices are used in the workplace.
Call before you click!
SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!
Clean Desk Policy
This course summarises the importance of having clean desks.
Creating Passwords
This course educates users on how to treat their passwords as well as the importance of password complexity.
Credit Card Security
This course focuses on practical measures for keeping credit cards safe.
CYBERAWARE – Full Course
This course includes 13 courses from Essentials category bundled together.
Identify and Mitigate Malware
This course educates users on how to identify malware on their systems and mitigate the threats.
Identifying the Need for Security
This course outlines why Cyber Security is needed.
Identity Theft
This course warns for the risks of identity theft and the harm it can cause.
Maintain Physical Security of Devices
This course educates users on how to implement physical security to their devices.
Malvertising
This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.
Multi-factor Authentication
This course explains why the use of multi-factor authentication is important.
Physical Security Measures
This course explains how to implement Physical security inside the organisation.
Protect Your Data
This course educates users on how to protect their data from theft.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook on Mobile)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (Outlook)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Reporting Phishing Emails using Microsoft 365 Phishing Reporter (OWA)
Get everyone involved!
How? Once our Phishing Reporter has been installed, checking emails will allow every user to simply click on a button to report any email that looks suspicious.
Securing Devices
This course educates users on how to keep their accounts and devices safe from unauthorised access.
Seven Signs of Phishing
This course is an interactive SCORM course for learners to recognise phishing emails.
Social Engineering
This course explains what Social Engineering is, and how to avoid getting played.
Technical support or clever scam?
See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.
Unintentional Data Leak
This courses explains how data leakage can occur.
Use Cloud Services Securely
This course educates users on how to securely use Cloud Services.
Use Email Securely
This course educates users on how to securely use email services.
Use Social Networking Securely
This course educates users on how to securely use Social Networking.
Use Wireless Devices Securely
This course educates users on how to securely use wireless devices.
Working From Home – Security Tips
This course warns for the risks when working from home.
Business Ethics
A company’s ethics will determine its reputation. Good business ethics are essential for the long-term success of an organization.
Incident Response Plan
This course provides an overview on what the Incident Response Plan involves.
Phishing for Business
This course introduces the social engineering term and the most common forms.
Ransomware
This course introduces the term ransomware and explains what it is.
Respect in the Workplace
This lesson will give you the tools and conversation to help empower your team to recognize behaviors that influence their performance within the workplace.
Responsibility in the Workplace
This lesson will introduce to you the idea of responsibility and the traits that define a responsible employee.
Risk Assessment and Management
Risk assessment and management is essential for the success of any business. However, many companies do not always take the necessary precautions, which leads to disaster.
Safety in the Workplace
Those who are in management are responsible for protecting the safety of their employees. Workplace safety, however, is the responsibility of everyone in an organization.
Security Fatique
This course introduces the term security fatique and describes the measures related to data security.
Shadow Security
This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.
Social Engineering for Business
This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.
Workplace Bullying
This lesson will introduce you to your company’s responsibility with regard to preventing bullying, as well as the effects of bullying.
Workplace Harassment
This lesson will give you the tools necessary to recognize harassment in the workplace as well as understand your rights and responsibilities under the law.
Beware Of Malware
Can you Recognise Suspicious Attachments
Can You Tell If A Website Is Safe
Cybersecurity Starts With YOU – Phishing
Cybersecurity Starts With YOU – Mobile Devices
Data is Like Diamonds
Password Are Precious
Social Media Can Be Scary
The Dark Side Of The Cloud
Workplace Safety
Your Phone And Tablet Are For Your Hands Only
Active Information Gathering
Explains the basic concepts of Active Information Gathering in Penetration Testing.
Buffer Overflow
Explains basic concepts of buffer overflow attacks.
Components and Processes of IDS
Explains the basic processes and components of IDS systems.
Disaster Recover Plan
Explains basic concepts of what disaster recovery is.
Encrypting File System
It gives an overview of encrypting file system.
Hacking Preparation
Explains the first steps that hackers take before the attack.
Layer 2 Tunneling Protocol
It gives an overview of what L2TP is.
MAC Addresses
Explains what MAC addresses are.
Patching
Explains why operating system patches are needed.
Rainbow Tables
Explains what rainbow tables are and how are used.
Ransomware
It gives an overview of some famous ransomware attacks.
Registry
Explains what the registry is and what is stored in it.
Security Information and Event Management
Explains the basic concepts of a SIEM system.
Software Installation and Removal
Explains why users should not be allowed to install or remove software.
What is a Firewall
Explains what the firewall is.
Why Incident Response is Needed
Expains why incident response is vital to organisations.