Check out our catalog of bite-sized, engaging cyber security training courses.
Don’t see what you’re looking for?
Get in touch with us - we can develop custom training for your organization.
Core Cyber Security Courses
Beginner
Phishing
Security at Home
Using Social Media Safely
Social Engineering
Removable Media
Secure Internet Use
Working Remotely
Physical Security
Cloud Security
Mobile Device Security
Public Wi-Fi
Online Payments
Malware
Bring-Your-Own-Device (BYOD)
Intermediate
Secure Passwords & Authentication
What Makes a Cyber Criminal
Vishing (voice phishing)
Information & Data
The Insider Threat
Patching & Updating Smishing (SMS Phishing)
Ransomware
Videoconferencing
Securely The Internet of Things (IoT)
Secure Email Use
Advanced
Denial of Service Attacks (DoS)
Data Loss
Home Network Security
Secure VPN Use
Using Third-Party Services Securely
Malicious Websites & Applications
File Sharing in the Workplace
Protecting Your Online Privacy
Spyware & Adware Clear Desk Policy
The Dark Web
Specialty Topics
Coronavirus Control and Prevention (WHO Advice)
Coronavirus Phishing
Covid-19 Misinformation & Common Scams
C-Suite Security: Introduction to Cyber Security for Senior Management
Protection of Personal Information Act (POPIA) - South Africa
C-Suite Security: Securing Accounts with Passwords and Authentication
C-Suite Security: Staying Safe from Social Engineering Attacks
C-Suite Security: Keeping Data and Devices Safe when Traveling
C-Suite Security: Building a Secure
Culture Defending yourself against phishing attacks (NCSC)
Introduction to Top Tips for Staff (NCSC)
Protecting your accounts with strong passwords (NCSC)
Securing your devices (NCSC)
Top Tips for Staff (NCSC)
High Risk User Training: Protecting Company Systems with Passwords and Authentication
High Risk User Training: Protecting Company Data with the Principle of Least Privilege
High Risk User Training: Staying Safe from Social Engineering Attacks
Phishing +
Phishing ++
Phishing Micro Training
Protecting Corporate Social Media Accounts
Return to Office: Essential Security Awareness
Russia & Ukraine: Staying safe in a heightened cyber threat environment
Secure Coding Practices
The Importance of VPNs
AI Threats: AI-Driven Phishing Attack
AI Threats: Deepfake Attacks
AI Threats: Staying Safe from AI Attacks
Email Thread Hijacking
Multi-Factor Authentication (MFA) Fatigue Attacks Attachment
Phishing Attachment
Phishing Micro Training
QR Code Attacks
QR Code Phishing Micro Training
How to use AI Tools Safely
Staying Safe from QR Code
Protecting Your Online Privacy
Spyware & Adware Clear Desk Policy
The Dark Web
Compliance & Regional Topic Courses
EU AI Act
Anti-Money Laundering (General)
Cyber Security for the Board
Data Classification
Data Handling GDPR
GDPR (Advanced)
GDPR Essentials
GDPR for Consumers
GDPR for Senior Staff Members
Mobile Device Security
PCI DSS
PCI DSS Essentials
Protecting Payment Card Information
Protecting Personal Data (GDPR)
Data Protection Managed
Security Awareness Training and Data Protection
Security Awareness Training - Overview
Anti-Money Laundering (AU) - Australia
Consumer Privacy Protection Act - Canada
Introduction to the Personal Data Protection Act (PDPA) - Singapore
Protecting Personal Information (POPIA) - South Africa
Protection of Personal Information Act (POPIA) - South Africa
Anti-Money Laundering - United Kingdom
Anti-Slavery - United Kingdom
Anti-Tax Evasion - United Kingdom
The Data Protection Act - United Kingdom
California Consumer Privacy Act (CCPA) - United States
HIPAA - United States
Sarbanes-Oxley (SOX) - United States
Understanding HIPAA: Beginner - United States
Understanding HIPAA: Intermediate - United States
Understanding HIPAA: Advanced - United States
HIPAA: The Privacy Rule Explained - United States
Introduction to the New Zealand Privacy Act 2020
Tout comprendre sur le Cyberscore - France
HIPAA Training for Business Associates - United States
HIPAA Training for IT Professionals - United States
HIPAA Training for Managers - United States
HIPAA Refresher Course - United States