Person using a computer

Check out our catalog of bite-sized, engaging cyber security training courses.

Don’t see what you’re looking for?

Get in touch with us - we can develop custom training for your organization.

Core Cyber Security Courses

Beginner

  • Phishing

  • Security at Home

  • Using Social Media Safely

  • Social Engineering

  • Removable Media

  • Secure Internet Use

  • Working Remotely

  • Physical Security

  • Cloud Security

  • Mobile Device Security

  • Public Wi-Fi

  • Online Payments

  • Malware

  • Bring-Your-Own-Device (BYOD)

Intermediate

  • Secure Passwords & Authentication

  • What Makes a Cyber Criminal

  • Vishing (voice phishing)

  • Information & Data

  • The Insider Threat

  • Patching & Updating Smishing (SMS Phishing)

  • Ransomware

  • Videoconferencing

  • Securely The Internet of Things (IoT)

  • Secure Email Use

Advanced

  • Denial of Service Attacks (DoS)

  • Data Loss

  • Home Network Security

  • Secure VPN Use

  • Using Third-Party Services Securely

  • Malicious Websites & Applications

  • File Sharing in the Workplace

  • Protecting Your Online Privacy

  • Spyware & Adware Clear Desk Policy

  • The Dark Web

Specialty Topics

  • Coronavirus Control and Prevention (WHO Advice)

  • Coronavirus Phishing

  • Covid-19 Misinformation & Common Scams

  • C-Suite Security: Introduction to Cyber Security for Senior Management

  • Protection of Personal Information Act (POPIA) - South Africa

  • C-Suite Security: Securing Accounts with Passwords and Authentication

  • C-Suite Security: Staying Safe from Social Engineering Attacks

  • C-Suite Security: Keeping Data and Devices Safe when Traveling

  • C-Suite Security: Building a Secure

  • Culture Defending yourself against phishing attacks (NCSC)

  • Introduction to Top Tips for Staff (NCSC)

  • Protecting your accounts with strong passwords (NCSC)

  • Securing your devices (NCSC)

  • Top Tips for Staff (NCSC)

  • High Risk User Training: Protecting Company Systems with Passwords and Authentication

  • High Risk User Training: Protecting Company Data with the Principle of Least Privilege

  • High Risk User Training: Staying Safe from Social Engineering Attacks

  • Phishing +

  • Phishing ++

  • Phishing Micro Training

  • Protecting Corporate Social Media Accounts

  • Return to Office: Essential Security Awareness

  • Russia & Ukraine: Staying safe in a heightened cyber threat environment

  • Secure Coding Practices

  • The Importance of VPNs

  • AI Threats: AI-Driven Phishing Attack

  • AI Threats: Deepfake Attacks

  • AI Threats: Staying Safe from AI Attacks

  • Email Thread Hijacking

  • Multi-Factor Authentication (MFA) Fatigue Attacks Attachment

  • Phishing Attachment

  • Phishing Micro Training

  • QR Code Attacks

  • QR Code Phishing Micro Training

  • How to use AI Tools Safely

  • Staying Safe from QR Code

  • Protecting Your Online Privacy

  • Spyware & Adware Clear Desk Policy

  • The Dark Web

Compliance & Regional Topic Courses

  • EU AI Act

  • Anti-Money Laundering (General)

  • Cyber Security for the Board

  • Data Classification

  • Data Handling GDPR

  • GDPR (Advanced)

  • GDPR Essentials

  • GDPR for Consumers

  • GDPR for Senior Staff Members

  • Mobile Device Security

  • PCI DSS

  • PCI DSS Essentials

  • Protecting Payment Card Information

  • Protecting Personal Data (GDPR)

  • Data Protection Managed

  • Security Awareness Training and Data Protection

  • Security Awareness Training - Overview

  • Anti-Money Laundering (AU) - Australia

  • Consumer Privacy Protection Act - Canada

  • Introduction to the Personal Data Protection Act (PDPA) - Singapore

  • Protecting Personal Information (POPIA) - South Africa

  • Protection of Personal Information Act (POPIA) - South Africa

  • Anti-Money Laundering - United Kingdom

  • Anti-Slavery - United Kingdom

  • Anti-Tax Evasion - United Kingdom

  • The Data Protection Act - United Kingdom

  • California Consumer Privacy Act (CCPA) - United States

  • HIPAA - United States

  • Sarbanes-Oxley (SOX) - United States

  • Understanding HIPAA: Beginner - United States

  • Understanding HIPAA: Intermediate - United States

  • Understanding HIPAA: Advanced - United States

  • HIPAA: The Privacy Rule Explained - United States

  • Introduction to the New Zealand Privacy Act 2020

  • Tout comprendre sur le Cyberscore - France

  • HIPAA Training for Business Associates - United States

  • HIPAA Training for IT Professionals - United States

  • HIPAA Training for Managers - United States

  • HIPAA Refresher Course - United States