Awareness Training

Security awareness training

Offer your team members exactly what they need. No more, no less.

LEARNING

Awareness training for different levels

Our training modules are divided into different levels to match different responsibilities within your organisation, giving each user the breadth and depth of knowledge and practise needed in their everyday work.

CHANGING

A matter of culture

Increased awareness, greater knowledge and good data security practices will ultimately change every computer user’s behaviour and nurture a culture of security within your organisation.

REPORTING

Monitoring and compliance

Our platform’s analytics allow you to identify weaknesses among your individual staff as well as departments. At the same time, it facilitates compliance with national or international regulations. Ultimately, this protects you against highly damaging and potentially costly data breaches.

Course Catalogue

All
Essentials Training
Leaders Training
Compliance & Governance
Tech Training
Posters

Malvertising

This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.

Call before you click!

SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!

Beware of banking instructions

Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.

Ads attract buyers and fraudsters

Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.

Technical support or clever scam?

See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.

ISO 27001

The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.

Incident Response Plan

This course provides an overview on what the Incident Response Plan involves.

CYBERAWARE – Full Course

This course includes 13 courses from Essentials category bundled together.

Workplace Safety

Security Information and Event Management

Explains the basic concepts of a SIEM system.

Active Information Gathering

Explains the basic concepts of Active Information Gathering in Penetration Testing.

Multi-factor Authentication

This course explains why the use of multi-factor authentication is important.

Unintentional Data Leak

This courses explains how data leakage can occur.

Clean Desk Policy

This course summarises the importance of having clean desks.

The Dark Side Of The Cloud

Can you Recognise Suspicious Attachments

Can You Tell If A Website Is Safe

Why Incident Response is Needed

Expains why incident response is vital to organisations.

What is a Firewall

Explains what the firewall is.

Software Installation and Removal

Explains why users should not be allowed to install or remove software.

Registry

Explains what the registry is and what is stored in it.

Anti-Money Laundering

This course focuses on different aspects of money laundering.

Credit Card Security

This course focuses on practical measures for keeping credit cards safe.

Working From Home – Security Tips

This course warns for the risks when working from home.

Identity Theft

This course warns for the risks of identity theft and the harm it can cause.

Seven Signs of Phishing

This course is an interactive SCORM course for learners to recognise phishing emails.

Creating Passwords

This course educates users on how to treat their passwords as well as the importance of password complexity.

Physical Security Measures

This course explains how to implement Physical security inside the organisation.

Use Cloud Services Securely

This course educates users on how to securely use Cloud Services.

Ransomware

It gives an overview of some famous ransomware attacks.

Rainbow Tables

Explains what rainbow tables are and how are used.

Patching

Explains why operating system patches are needed.

MAC Addresses

Explains what MAC addresses are.

Beware Of Malware

Use Social Networking Securely

This course educates users on how to securely use Social Networking.

Use Email Securely

This course educates users on how to securely use email services.

Browse the Web Safely

This course educates users on how to securely browse the web to avoid malicious content.

Use Wireless Devices Securely

This course educates users on how to securely use wireless devices.

Identify and Mitigate Malware

This course educates users on how to identify malware on their systems and mitigate the threats.

Password Are Precious

Your Phone And Tablet Are For Your Hands Only

Social Media Can Be Scary

Cybersecurity Starts With YOU – Mobile Devices

Cybersecurity Starts With YOU – Phishing

Layer 2 Tunneling Protocol

It gives an overview of what L2TP is.

Hacking Preparation

Explains the first steps that hackers take before the attack.

Encrypting File System

It gives an overview of encrypting file system.

Disaster Recover Plan

Explains basic concepts of what disaster recovery is.

Ransomware

This course introduces the term ransomware and explains what it is.

Phishing for Business

This course introduces the social engineering term and the most common forms.

Shadow Security

This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.

Security Fatique

This course introduces the term security fatique and describes the measures related to data security.

Protect Your Data

This course educates users on how to protect their data from theft.

Securing Devices

This course educates users on how to keep their accounts and devices safe from unauthorised access.

Maintain Physical Security of Devices

This course educates users on how to implement physical security to their devices.

Components and Processes of IDS

Explains the basic processes and components of IDS systems.

Payment Card Industry Data Security Standard (PCI DSS)

This course explains which organisations must comply with PCI DSS.

Data is Like Diamonds

Buffer Overflow

Explains basic concepts of buffer overflow attacks.

GDPR AWARENESS

This course is an interactive SCORM course for GDPR regulations.

Social Engineering for Business

This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.

Social Engineering

This course explains what Social Engineering is, and how to avoid getting played.

Identifying the Need for Security

This course outlines why Cyber Security is needed.

GDPR AWARENESS

This course is an interactive SCORM course for GDPR regulations.

ISO 27001

The purpose of the ISO/IEC 27001 course is to provide high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.

Payment Card Industry Data Security Standard (PCI DSS)

This course explains which organisations must comply with PCI DSS.

Ads attract buyers and fraudsters

Beware of buyers who ask for your banking details over the phone, even before meeting you or seeing what you are selling.

Anti-Money Laundering

This course focuses on different aspects of money laundering.

Beware of banking instructions

Banks will not instruct you by email to make changes to your account details. Learn how to identify fake emails that appear to be sent by your bank.

Browse the Web Safely

This course educates users on how to securely browse the web to avoid malicious content.

Call before you click!

SMS messages that appear to be from your bank, asking you to click o a link to take urgent action are always suspicious and usually fake. Beware!

Clean Desk Policy

This course summarises the importance of having clean desks.

Creating Passwords

This course educates users on how to treat their passwords as well as the importance of password complexity.

Credit Card Security

This course focuses on practical measures for keeping credit cards safe.

CYBERAWARE – Full Course

This course includes 13 courses from Essentials category bundled together.

Identify and Mitigate Malware

This course educates users on how to identify malware on their systems and mitigate the threats.

Identifying the Need for Security

This course outlines why Cyber Security is needed.

Identity Theft

This course warns for the risks of identity theft and the harm it can cause.

Maintain Physical Security of Devices

This course educates users on how to implement physical security to their devices.

Malvertising

This lesson explains in simple terms what malvertising is, and why it is a hidden threat that can easily be missed.

Multi-factor Authentication

This course explains why the use of multi-factor authentication is important.

Physical Security Measures

This course explains how to implement Physical security inside the organisation.

Protect Your Data

This course educates users on how to protect their data from theft.

Securing Devices

This course educates users on how to keep their accounts and devices safe from unauthorised access.

Seven Signs of Phishing

This course is an interactive SCORM course for learners to recognise phishing emails.

Social Engineering

This course explains what Social Engineering is, and how to avoid getting played.

Technical support or clever scam?

See how scammers aiming to gain remote access to your computer often pose as representatives of a technical support team.

Unintentional Data Leak

This courses explains how data leakage can occur.

Use Cloud Services Securely

This course educates users on how to securely use Cloud Services.

Use Email Securely

This course educates users on how to securely use email services.

Use Social Networking Securely

This course educates users on how to securely use Social Networking.

Use Wireless Devices Securely

This course educates users on how to securely use wireless devices.

Working From Home – Security Tips

This course warns for the risks when working from home.

Incident Response Plan

This course provides an overview on what the Incident Response Plan involves.

Phishing for Business

This course introduces the social engineering term and the most common forms.

Ransomware

This course introduces the term ransomware and explains what it is.

Security Fatique

This course introduces the term security fatique and describes the measures related to data security.

Shadow Security

This course introduces the shadow security term and describes how complex security measures result in staff creating their own workarounds.

Social Engineering for Business

This course defines the social engineering term and how we allow cyber criminals to exploit human weaknesses.

Beware Of Malware

Can you Recognise Suspicious Attachments

Can You Tell If A Website Is Safe

Cybersecurity Starts With YOU – Phishing

Cybersecurity Starts With YOU – Mobile Devices

Data is Like Diamonds

Password Are Precious

Social Media Can Be Scary

The Dark Side Of The Cloud

Workplace Safety

Your Phone And Tablet Are For Your Hands Only

Active Information Gathering

Explains the basic concepts of Active Information Gathering in Penetration Testing.

Buffer Overflow

Explains basic concepts of buffer overflow attacks.

Components and Processes of IDS

Explains the basic processes and components of IDS systems.

Disaster Recover Plan

Explains basic concepts of what disaster recovery is.

Encrypting File System

It gives an overview of encrypting file system.

Hacking Preparation

Explains the first steps that hackers take before the attack.

Layer 2 Tunneling Protocol

It gives an overview of what L2TP is.

MAC Addresses

Explains what MAC addresses are.

Patching

Explains why operating system patches are needed.

Rainbow Tables

Explains what rainbow tables are and how are used.

Ransomware

It gives an overview of some famous ransomware attacks.

Registry

Explains what the registry is and what is stored in it.

Security Information and Event Management

Explains the basic concepts of a SIEM system.

Software Installation and Removal

Explains why users should not be allowed to install or remove software.

What is a Firewall

Explains what the firewall is.

Why Incident Response is Needed

Expains why incident response is vital to organisations.