All

View all 424 of our All content pieces available in SecurityIQ.

Infosec Named a Leader in 2019 Gartner Magic Quadrant

Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.

Posters: IPA - Don't Be a Target

Posters: IPA - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Antivirus

Antivirus

This video details the threats antivirus software can and cannot mitigate.

View More
The Art of Cyber War: Personal Identification Information

The Art of Cyber War: Personal Identification Information

Personally identifiable information (PII) is any information which, either on its own or combined with other information, can be used to distinguish or trace an individual's identity.

View More
Malware for Executives

Malware for Executives

Executives are often targeted by hackers via malware, or malicious software. This module explains malware risks in detail and outlines steps executives can take to proactively keep their data secure.

View More
Don't Be a Target: Your Database

Don't Be a Target: Your Database

Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.

View More
Internet Security

Internet Security

View More
Removable Media Brief Assessment

Removable Media Brief Assessment

View More
Data Destruction Assessment

Data Destruction Assessment

View More
OWASP A5 - Broken Access Control

OWASP A5 - Broken Access Control

This module covers broken access control, types of attacks and how to prevent them.

View More
Don't Be a Target: Your Colleague

Don't Be a Target: Your Colleague

Hackers recruit insiders with bribes and coercion. While the insider works for the organization; they are also working for the hacker to give them access to operations, data and money.

View More
Better Together (Two Factor Authentication)

Better Together (Two Factor Authentication)

This micro-learning module presents the concept of two-factor authentication in a delicious way!

View More
Don't Be a Target: Your Email

Don't Be a Target: Your Email

One in 131 emails are malicious, the highest rate in five years. Hackers use email as the primary approach for phishing.

View More
Social Media

Social Media

This module explains common security risks related to the use of social media in business, and ways that learners can protect themselves and their company from social media threats.

View More
Intellectual Property Rights

Intellectual Property Rights

This video delves covers the basics US copyright and trademark laws.

View More
Intelligent Personal Assistant

Intelligent Personal Assistant

This module defines Intelligent Personal Assistants and how they work, and explains some of the risks associated with using intelligent personal assistants in the workplace.

View More
Phishing (Without TOC)

Phishing (Without TOC)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Introduction to C-TPAT

Introduction to C-TPAT

The United States imports and exports trillions of dollars’ worth of goods and services every year. This module covers the Customs-Trade Partnership Against Terrorism, or C-TPAT.

View More
OWASP Top Ten Overview

OWASP Top Ten Overview

This module will cover the Open Web Application Security Project’s list of the ten most dangerous Web application security flaws.

View More
Security Awareness Baseline Knowledge Assessment I

Security Awareness Baseline Knowledge Assessment I

View More
The Art of Cyber War: Advanced Persistent Threat

The Art of Cyber War: Advanced Persistent Threat

Hacker's use Advanced Persistent Threats (APT) to access a network and stay undetected.

View More
Safe Harbor (Safe Web Browsing)

Safe Harbor (Safe Web Browsing)

How to browse the web safely.

View More
Don't Be a Target: Your Mobile Device

Don't Be a Target: Your Mobile Device

Many of these devices use their own wireless networks and are used in public. These facts make your mobile phones and devices susceptible to hackers.

View More
OWASP A9 - Using Components with Known Vulnerabilities

OWASP A9 - Using Components with Known Vulnerabilities

This module covers using components with known vulnerabilities.

View More
Protecting Mobile Devices Assessment

Protecting Mobile Devices Assessment

View More
Phishing Assessment (Capital One) W/ Hints

Phishing Assessment (Capital One) W/ Hints

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications.

View More
Software Licensing Assessment

Software Licensing Assessment

View More
Don't Be a Target: Your Unencrypted Files

Don't Be a Target: Your Unencrypted Files

Encryption is the best defense against unwanted use of data, before and/or after it is stolen.

View More
Spearphishing Assessment

Spearphishing Assessment

View More
Working Remotely (Simplified Navigation)

Working Remotely (Simplified Navigation)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure. Learners will gain deeper understanding of home networks and the devices and risks that come with them, and learn why use of public networks and devices should be avoided when possible.

View More
Protecting Mobile Devices

Protecting Mobile Devices

This video covers the steps you can take to protect your device from prying eyes and theft. Topics include screen locks, encryption and frequent software and firmware updates.

View More
Business Email Compromise Assessment

Business Email Compromise Assessment

View More
Malware

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Social Engineering

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Encryption Assessment

Encryption Assessment

View More
Ten Tips for Physical Security Infographic

Ten Tips for Physical Security Infographic

View More
Posters: Remote Connection - Art of Cyber War

Posters: Remote Connection - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Posters: Cloud Services - Art of Cyberwar

Posters: Cloud Services - Art of Cyberwar

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Broken Access Control

Broken Access Control

This module defines and explains broken access control, which allows attackers to access unauthorized functionality and/or data.

View More
Safe Web Browsing (Without TOC)

Safe Web Browsing (Without TOC)

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. Topics include use of HTTPS (using SSL or TLS), unsafe links, web pop-ups, browser alerts, plugins and downloads. Lessons from our Phishing and Malware modules are also reinforced for increased retention.

View More
Improper Error Handling

Improper Error Handling

Errors are a fact of life in any system. But what happens when an error report ends up revealing a weakness? Take a closer look at the problem of improper error handling.

View More
The Art of Cyber War: Removable Media

The Art of Cyber War: Removable Media

Hackers steal information from unencrypted, removable media.

View More
Social Engineering Brief Assessment

Social Engineering Brief Assessment

View More
Security Awareness Baseline Knowledge Assessment III

Security Awareness Baseline Knowledge Assessment III

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
Posters: APT - Art of Cyberwar

Posters: APT - Art of Cyberwar

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Intellectual Property Assessment

Intellectual Property Assessment

View More
Posters: Marine Lowlifes: Common Phish

Posters: Marine Lowlifes: Common Phish

View More
Launch Email - Management

Launch Email - Management

View More
Data Security Assessment

Data Security Assessment

View More
Posters: APT - Don't Be a Target

Posters: APT - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing for Executives

Phishing for Executives

When it comes to phishing, executives are one of the most targeted group of email users due to their levels of access and authority. This module explains the risks phishing poses to executives and organizations, and suggests ways executives can work with their security teams and staff to keep information secure.

View More
Insecure Deserialization

Insecure Deserialization

This module covers best practices for serialization - the process of turning data objects into binary streams of data.

View More
Electronic Funds Transfer Act (EFTA) Assessment

Electronic Funds Transfer Act (EFTA) Assessment

View More
Suspicious Hosts Assessment (Google)

Suspicious Hosts Assessment (Google)

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation.

View More
Conclusion (No Background Music)

Conclusion (No Background Music)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
EAL Browser Event

EAL Browser Event

This module teaches learners about safe web browsing.

View More
Privacy and PII Assessment

Privacy and PII Assessment

View More
Password Security Brief

Password Security Brief

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.

View More
Need to Know: Malware

Need to Know: Malware

Trojan horses, worms, RATs — There’s a whole animal kingdom of malware out there. Join Anthony and Fiona as they explore the best ways to keep malware from migrating into your system.

View More
Introduction to CCPA Assessment

Introduction to CCPA Assessment

View More
OWASP A7 - Cross-Site Scripting (XSS)

OWASP A7 - Cross-Site Scripting (XSS)

This module covers cross-site scripting.

View More
Log Monitoring and Analysis Assessment

Log Monitoring and Analysis Assessment

View More
Posters: IPA - Art of Cyber War

Posters: IPA - Art of Cyber War

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
The Art of Cyber War: Working Remotely

The Art of Cyber War: Working Remotely

Hackers steal information from unsecured connections.

View More
GDPR - Rights of the Data Subjects (Video)

GDPR - Rights of the Data Subjects (Video)

This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed.

View More
OWASP A1 - Injection

OWASP A1 - Injection

This module covers various types of injection and the associated risks to applications.

View More
Safe Web Browsing

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.

View More
Safe Web Browsing Brief Assessment

Safe Web Browsing Brief Assessment

View More
Buffer Overflow - No BG music

Buffer Overflow - No BG music

This module discusses the risks caused by buffer overflows and how to avoid them.

View More
Double Check (Verifying Wire Transfers)

Double Check (Verifying Wire Transfers)

This micro-learning module emphasizes the importance of verifying wire transfers.

View More
Lost and Found (Encryption)

Lost and Found (Encryption)

Why you should use encryption in sensitive environments.

View More
Safe Web Browsing (Simplified Navigation)

Safe Web Browsing (Simplified Navigation)

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. Topics include use of HTTPS (using SSL or TLS), unsafe links, web pop-ups, browser alerts, plugins and downloads. Lessons from our Phishing and Malware modules are also reinforced for increased retention.

View More
Insider Threats

Insider Threats

Insider threats include security threats posed by employees, contractors or vendors. This module explains why malicious insiders are dangerous, and provides examples of common behaviors that can be indicators of insider threats. Suggestions for incident reporting are also included to help combat insider threats.

View More
Mobile Security Assessment

Mobile Security Assessment

View More
Social Engineering for Managers

Social Engineering for Managers

This module will explain the various social engineering methods hackers use, and teach managers how to work with staff to prevent data breaches and leaks.

View More
Introduction to Security Awareness (No Background Music)

Introduction to Security Awareness (No Background Music)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Don't Be a Target: Your Password

Don't Be a Target: Your Password

If you fail to protect your password or choose a weak password, you are at risk. A weak password can be guessed by hackers in minutes.

View More
Vishing Assessment

Vishing Assessment

View More
SMiShing

SMiShing

SMS Phishing, or SMiShing, is used by cyber criminals to collect valuable information and distribute malware. After completing this module, learners will know what SMiShing is, how to recognize a SMiShing attack and effective ways to stop SMiShing attempts.

View More
Password Security (Without TOC)

Password Security (Without TOC)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Using Components with Known Vulnerabilities

Using Components with Known Vulnerabilities

This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.

View More
Cloud Services

Cloud Services

Cloud services include any service available via the Internet through a third-party’s server. This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services.

View More
Tailgating

Tailgating

This video explains the risks of tailgating, or when hackers gain physical access to restricted areas. It also details physical security best practices for your office or campus.

View More
Physical Security for Executives

Physical Security for Executives

Executives often carry physical documents and hardware containing highly sensitive information. In this module, physical security topics for executives and organizations are outlined in detail, including methods for keeping physical records secure. Topics include secure record destruction, encryption and building access.

View More
Marine Lowlifes: Whaling Shark Infographic

Marine Lowlifes: Whaling Shark Infographic

View More
Mobile Security Assessment

Mobile Security Assessment

View More
APT Assessment

APT Assessment

View More
Working Remotely

Working Remotely

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
Cloud Services Assessment

Cloud Services Assessment

View More
Physical Security Brief (No Background Music)

Physical Security Brief (No Background Music)

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.

View More
Conclusion (Without TOC)

Conclusion (Without TOC)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
SMiShing Assessment

SMiShing Assessment

View More
Working Remotely short Assessment

Working Remotely short Assessment

View More
Handling SSA Provided Information

Handling SSA Provided Information

This module will review basic safe, federally-required practices for safely using and storing SSA-provided data, including best practices, review of certain applicable laws, and civil and criminal penalties for PII loss.

View More
Managing Software Assets

Managing Software Assets

Managing the devices and other hardware assets that exist within an environment is never an easy task. We’ll look at best practices such as the U.S. government-approved NIST guidelines and review automation and access control concepts.

View More
The Art of Cyber War: Malware

The Art of Cyber War: Malware

Your computer is at risk of attacks by hackers using malware, or malicious software, that is intended to steal, damage or control computers and computer systems.

View More
Posters: Suite - Don't Be a Target

Posters: Suite - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Securing Home Networks and Devices (Without TOC)

Securing Home Networks and Devices (Without TOC)

Protecting home computers and networks can help keep company networks secure, especially those with remote or mobile workforces. This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.

View More
Knowledge Is Power (Security Training)

Knowledge Is Power (Security Training)

Security training should be a part of your daily life.

View More
The Art of War: Intelligent Personal Assistant

The Art of War: Intelligent Personal Assistant

Intelligent Personal Assistants (IPAs) assist us by accessing information and interacting with other technology, usually through voice commands.

View More
The Art of Cyber War: Data Retention

The Art of Cyber War: Data Retention

Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.

View More
Physical Security (Simplified Navigation)

Physical Security (Simplified Navigation)

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
Acceptable Use Policy

Acceptable Use Policy

When you start a new job or enroll in a new school, you’ll often be asked to review and sign an Acceptable Use Policy for the network. Let’s take a quick look at the purpose and contents of an AUP.

View More
OWASP A3 - Sensitive Data Exposure

OWASP A3 - Sensitive Data Exposure

This module covers sensitive data and how to protect it.

View More
Security Misconfiguration

Security Misconfiguration

In this module, we define security misconfiguration and offer tips on improving server security.

View More
Password Security

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Reporting Phishing Emails Assessment

Reporting Phishing Emails Assessment

View More
Is it Safe? (Mobile Security)

Is it Safe? (Mobile Security)

This short video reinforces the importance of using trusted publishers when installing mobile applications. It uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of insecure mobile applications.

View More
Physical Security short Assessment

Physical Security short Assessment

View More
Safe Use of Social Media

Safe Use of Social Media

This short video covers the precautions you should take when making public posts and provides guidance on how to spot harmful links.

View More
Buffer Overflow

Buffer Overflow

This module discusses the risks caused by buffer overflows and how to avoid them.

View More
GDPR: Breach Notification Assessment

GDPR: Breach Notification Assessment

View More
Shoulder Surfing

Shoulder Surfing

This video explains what shoulder surfing is and emphasizes the importance of situational awareness when entering sensitive information in public settings.

View More
Security Awareness Baseline Knowledge Assessment II

Security Awareness Baseline Knowledge Assessment II

View More
Need to Know: Safe Web Browsing

Need to Know: Safe Web Browsing

It’s a jungle in there. Explore the winding paths of the internet with Anthony and Cecil as they venture into thorny areas like fake browser warnings, HTTPS and dangerous URLs.

View More
Posters: Remote Connection - Don't Be a Target

Posters: Remote Connection - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Data Classification (Video)

Data Classification (Video)

This module discusses the importance of data security and how to classify data.

View More
Removable Media (No Background Music)

Removable Media (No Background Music)

This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Privacy and EU GDPR

Privacy and EU GDPR

In this module, we review the new European Union General Data Protection Regulation (EU GDPR).

View More
Mobile Security (Simplified Navigation)

Mobile Security (Simplified Navigation)

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
Secure Connection (Data In Transit)

Secure Connection (Data In Transit)

This micro-learning module highlights the importance of using secure connections when conquering a mountain or sending sensitive data over the Internet.

View More
Conclusion

Conclusion

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Phishing In Brief

Phishing In Brief

An abbreviated version of our core phishing training, this module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.

View More
The Art of Cyber War: Spear Phishing Attacks

The Art of Cyber War: Spear Phishing Attacks

The most dangerous type of phishing is known as "Spear Phishing." A spear phisher will craft messages to target individuals or small groups.

View More
Posters: Password Security - Don't Be a Target

Posters: Password Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
The Art of Cyber War: Social Engineering

The Art of Cyber War: Social Engineering

Hackers have you unknowingly provide information for use in an attack.

View More
Posters: Spearphishing - Don't Be a Target

Posters: Spearphishing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Social Engineering Brief

Social Engineering Brief

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.

View More
Intellectual Property Rights Assessment

Intellectual Property Rights Assessment

View More
Malware in Brief Assessment

Malware in Brief Assessment

View More
Removable Media Assessment

Removable Media Assessment

View More
Performance Email - Management

Performance Email - Management

View More
Social Media (Without TOC)

Social Media (Without TOC)

Social media has become an integral part of everyday life for individuals and businesses. In many cases, it is the primary method used to communicate with friends, family and customers. This module explains common security risks related to the use of social media in business, and ways that learners can protect themselves and their company from social media threats.

View More
Posters: Data Retention - Don't Be a Target

Posters: Data Retention - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
FCPA Assessment

FCPA Assessment

View More
Phishing Assessment (Capital One)

Phishing Assessment (Capital One)

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications.

View More
Conclusion (Simplified Navigation)

Conclusion (Simplified Navigation)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
GDPR for Executives

GDPR for Executives

This security awareness training covers Privacy and the General Data Protection Regulation for Executives.

View More
Data Backup And Recovery (Video)

Data Backup And Recovery (Video)

This module emphasizes the importance of data backup and recovery.

View More
Privacy for Executives

Privacy for Executives

This module will cover the basics of Personally-Identifiable Information (PII) security for executives.

View More
OWASP A10 - Insufficient Logging and Monitoring

OWASP A10 - Insufficient Logging and Monitoring

This module covers insufficient logging and monitoring.

View More
Hackjob Season 1 Episode 1

Hackjob Season 1 Episode 1 "Recon"

h@ckj0b is your security team’s worst nightmare come to life. Will TechniCorp Dynamix survive Vermintooth’s assault, or will Tim leave them to deal with the mess they’ve gotten themselves into?

View More
Posters: Encryption - Art of Cyber War

Posters: Encryption - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
WORKed Episode 3: Robot Lawnmower

WORKed Episode 3: Robot Lawnmower

Is Ed getting scammed? You decide. But the answer is totally yes. Teach your employees the basics of safe wab browsing with this WORKed training module.

View More
Mobile Wi-Fi Security Assessment

Mobile Wi-Fi Security Assessment

View More
GDPR: Rights of Data Subjects Assessment

GDPR: Rights of Data Subjects Assessment

View More
The Art of Cyber War: Insider Threat

The Art of Cyber War: Insider Threat

Hackers recruit insiders with bribes and coercion. While the insider works for the organization; they are also working for the hacker to give them access to operations, data and money.

View More
Phishing in Brief (No Background Music)

Phishing in Brief (No Background Music)

This module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.

View More
Removable Media for Managers

Removable Media for Managers

This module will explain the risks associated with removable media like USB drives, and provide guidance on how managers can help employees use removable media securely.

View More
Security Awareness for IT Professionals

Security Awareness for IT Professionals

This module explains fundamental concepts of information security and the important role IT professionals play in protecting organizational data assets. It discusses some of the most common information security threats and motivations behind cyber attacks, and outlines fundamental goals of information security.

View More
Posters: Marine Lowlifes: Clone Phish

Posters: Marine Lowlifes: Clone Phish

View More
Mobile Security (Without TOC)

Mobile Security (Without TOC)

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
Insider Threats (Simplified Navigation)

Insider Threats (Simplified Navigation)

View More
Need to Know: Working Remotely

Need to Know: Working Remotely

Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

View More
Posters: Marine Lowlifes: Swimming in Emails

Posters: Marine Lowlifes: Swimming in Emails

View More
Posters: Safe Browsing - Don't Be a Target

Posters: Safe Browsing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
The Art of Cyber War: Phishing Attacks

The Art of Cyber War: Phishing Attacks

Hackers use email as the primary approach for phishing.

View More
Secure Data Storage

Secure Data Storage

This module covers how to securely store personal data.

View More
Creating Strong Passwords Assessment

Creating Strong Passwords Assessment

View More
Working Remotely for Executives

Working Remotely for Executives

This module details best practices for working remotely on secure networks. It also provides guidance on what executives can do to ensure they and all other employees are protecting their devices, data and access.

View More
Posters: Marine Lowlifes: Spearphish

Posters: Marine Lowlifes: Spearphish

View More
Need to Know: Social Engineering

Need to Know: Social Engineering

Some hackers don’t need computers at all. Join Anthony and Erica in exploring the dirty business of social engineering — when all it takes is a lie to crack open a company.

View More
The Art of Cyber War: Cyber Security

The Art of Cyber War: Cyber Security

The threat of cyberattack is real, it’s everyone’s responsibility to learn more about cyber protection.

View More
Malware (Simplified Navigation)

Malware (Simplified Navigation)

This interactive module defines malware in common terms and details the dangers it poses to organizations. Practical and applicable preventative actions are summarized in three anti-malware recommendations: avoiding suspicious downloads, attachments and other files, frequent/automated software patches and proper use of anti-virus software.

View More
Where Is Your Device? (Backups)

Where Is Your Device? (Backups)

This 60-second video details the importance of physical security and frequent data backups.

View More
Securing Mobile Devices

Securing Mobile Devices

Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions.

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices.

View More
GDPR for Data Processors

GDPR for Data Processors

This security awareness training covers privacy and EU General Data Protection Regulation for data processors.

View More
Removable Media Brief

Removable Media Brief

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.

View More
Introduction to Security Awareness (Simplified Navigation)

Introduction to Security Awareness (Simplified Navigation)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Physical Security (Without TOC)

Physical Security (Without TOC)

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
WORKed Episode 9: Tailgating

WORKed Episode 9: Tailgating

This week, the gang teases Ed and it’s totally justified. Show your employees why physical security is so important with this WORKed training module.

View More
Securing Home Networks and Devices Assessment

Securing Home Networks and Devices Assessment

View More
Password Security for Managers

Password Security for Managers

Managers have a responsibility to not only set secure passwords for themselves, but also to ensure their teams follow best practices in password security. This module will show managers how to pick strong passwords and keep them safe, how to securely set passwords for employees and how to help employees with password security related issues.

View More
OWASP A2 - Broken Authentication

OWASP A2 - Broken Authentication

This module covers authentication vulnerabilities and session management.

View More
Phishing Assessment

Phishing Assessment

View More
Ransomware (Without TOC)

Ransomware (Without TOC)

Ransomware is malware, or malicious software, that holds technology for ransom. This modules will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
Top 25 #1 - SQL Injection

Top 25 #1 - SQL Injection

This module discusses the risks of SQL injection attacks and how to prevent them.

View More
WORKed Episode 2: Evite

WORKed Episode 2: Evite

I doth see a vision of scammery! Help your employees avoid phishing attacks with this WORKed training module.

View More
Score! (Encryption)

Score! (Encryption)

This module teaches how to prevent interception of your messages.

View More
Posters: Cyber Security - Art of Cyber War

Posters: Cyber Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Protecting Devices and Media Infographic

Protecting Devices and Media Infographic

View More
Help Desk

Help Desk

Our Help Desk module explains how hackers can exploit the trust between a help desk and its users through social engineering attacks.

View More
The Art of Cyber War: Encryption

The Art of Cyber War: Encryption

Encryption transforms data into a locked format that cannot be read without a key, You can encrypt stored data, data en route for communications and devices that may used for storage.

View More
WORKed Episode 6: Demons

WORKed Episode 6: Demons

A strong team treats office security like they are protecting their castle. From orcs and stuff. Teach your employees how to avoid malware in this WORKed training module.

View More
Identifying Social Engineering

Identifying Social Engineering

This brief overview covers the hallmarks of social engineering attacks and how to prevent them.

View More
Malware Assessment

Malware Assessment

View More
The Art of Cyber War: Password Security

The Art of Cyber War: Password Security

If you fail to protect your password or choose a weak password, you are at risk.

View More
Posters: Suite - Art of Cyber War

Posters: Suite - Art of Cyber War

PDF in two print sizes: -Printshop - Letter -Self Print - Letter

View More
One Person's Trash... (Dumpster Diving)

One Person's Trash... (Dumpster Diving)

This mini movie covers the consequences of failing to shred, burn, or properly dispose of sensitive physical documents.

View More
Reporting Phishing Emails

Reporting Phishing Emails

Our Reporting Phishing Emails module reviews the functionality of the PhishNotify button, which allows users to report suspicious emails to system administrators through Outlook, Office 365 and Gmail.

View More
IoT Security

IoT Security

This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT.

View More
Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

In this module, learners will cover the scope and uses of PIPEDA and learn to spot possible PIPEDA breaches before they occur.

View More
Ransomware

Ransomware

Ransomware is malware, or malicious software, that holds technology for ransom. This module will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
Data Security

Data Security

In this module, learners are introduced to the concept of data security, its significance and the risks posed by insecure data handling.

View More
Electronic Funds Transfer Act (EFTA)

Electronic Funds Transfer Act (EFTA)

Almost everyone uses online banking, but there are many ways an electronic fund transfer could go wrong. If someone makes fraudulent charges on your account, what are your responsibilities? What are the bank’s? The Electronic Funds Transfer Act has your back.

View More
Social Engineering (Simplified Navigation)

Social Engineering (Simplified Navigation)

Social engineering occurs when a hacker uses two-way forms of communication, including phones and messaging, to trick users into sharing personal or confidential information. Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Posters: Insider Threat - Don't Be a Target

Posters: Insider Threat - Don't Be a Target

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
GDPR: What is GDPR? Assessment

GDPR: What is GDPR? Assessment

View More
Don't Be a Target: Cloud Service

Don't Be a Target: Cloud Service

Make sure your Cloud is secure, remains private and contains all of the data you expect.

View More
Software Licensing

Software Licensing

This brief video covers the appropriate methods for installing and licensing software.

View More
Introduction to Account Takeover Attacks (ATO)

Introduction to Account Takeover Attacks (ATO)

Learn about account takeover attacks: what they are, what they aim for, and how to keep yourself safe from them.

View More
Don't Be a Target: Your Computer

Don't Be a Target: Your Computer

Your computer is at risk of attacks by hackers using malware, or malicious software, that is intended to steal, damage or control computers and computer systems.

View More
Injection

Injection

Injection is one of the most common, and harmful, security risks to web applications. This module details different types of injection and suggests effective mitigation strategies for the workplace.

View More
Posters: Ransomware - Don't Be a Target

Posters: Ransomware - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Recognizing Phishing Emails

Recognizing Phishing Emails

This short video covers some of the common signs of phishing emails and how to recognize malicious links.

View More
Posters: Malware - Art of Cyber War

Posters: Malware - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing

Phishing

Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Social Media Assessment

Social Media Assessment

View More
The Art of Cyber War: Security Incident Reporting

The Art of Cyber War: Security Incident Reporting

Sharing this information is good for everyone and exposes the activities of hackers.

View More
Posters: Cloud Services - Don't Be a Target

Posters: Cloud Services - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Posters: Cyber Security - Don't Be a Target

Posters: Cyber Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Don't Be a Target: Your Organization

Don't Be a Target: Your Organization

Hacker's use Advanced Persistent Threats (APT) to access a network and stay undetected. Targets are typically large businesses and organizations.

View More
Marine Lowlifes: Game

Marine Lowlifes: Game

Danger lurks in the deep! Step into the role of an intrepid underwater photographer and follow the clues to discover the lairs of four scamming phish.

View More
Creating Strong Passwords

Creating Strong Passwords

This short video details the process of choosing secure, robust passphrases in under one minute. Topics include the importance of using uncommon words and long passphrases.

View More
Removable Media (Without TOC)

Removable Media (Without TOC)

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Marine Lowlifes: Whaling Shark

Marine Lowlifes: Whaling Shark

The wonders of nature are displayed up close as the Whaling Shark chases its prey, the powerful and important Whale. Teach your employees how to spot and avoid this dangerous attack.

View More
Password Security for Executives

Password Security for Executives

Passwords of executive-level staff are a high-value target for cyber criminals. This module will teach executives how to create strong passwords and keep them safe, and show executives how they can personally support secure password management policies and habits within their companies.

View More
Personal Information (Video)

Personal Information (Video)

This module covers personally identifiable information and how to protect it online.

View More
Phishing Assessment (LinkedIn)

Phishing Assessment (LinkedIn)

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications.

View More
Safe Web Browsing Assessment

Safe Web Browsing Assessment

View More
Need to Know: Phishing

Need to Know: Phishing

Learn how to spot the bait as Anthony guides his friend Cecil through the dangers of phishing. Is this actually a very exciting email from the boss, or is it just another hacker’s trap?

View More
Posters: Mobile Device - Don't Be a Target

Posters: Mobile Device - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Privacy and PII Brief (India Localization)

Privacy and PII Brief (India Localization)

This version of our core Privacy and PII training explains privacy and personally identifiable information (PII). This version is localized for India to include protecting Aadaar numbers.

View More
Vulnerability Management

Vulnerability Management

This awareness module covers identification and remediation of security vulnerabilities.

View More
Posters: Spearphishing - Art of Cyber War

Posters: Spearphishing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Physical Security (No Background Music)

Physical Security (No Background Music)

Physical security helps prevent losses of information and technology in the physical environment. Prevention tactics to combat each type of risk is also discussed.

View More
GDPR: Consequences of Noncompliance Assessment

GDPR: Consequences of Noncompliance Assessment

View More
Secure Data Storage Assessment

Secure Data Storage Assessment

View More
HIPAA/HITECH (Simplified Navigation)

HIPAA/HITECH (Simplified Navigation)

View More
Vishing

Vishing

This interactive training module covers voice phishing, or vishing, a simple but effective technique cyber criminals and scam artists use to collect confidential information.

View More
Marine Lowlifes Campaign Kit

Marine Lowlifes Campaign Kit

You don't need to be a communications expert, have an unlimited budget or set aside dozens of hours to create a truly engaging security awareness campaign. You just need the right resources and a playbook. Along with a brand new set of training modules, posters, infographics and email templates, the campaign kit comes with a communication plan to help you roll out every step of the campaign.

View More
Posters: Data Retention - Art of Cyber War

Posters: Data Retention - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Business Email Compromise (BEC)

Business Email Compromise (BEC)

BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. This module suggests defenses against this tactic.

View More
Physical Security Brief

Physical Security Brief

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.

View More
Posters: Physical Security - Don't Be a Target

Posters: Physical Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Posters: Safe Browsing - Art of Cyber War

Posters: Safe Browsing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing in Brief Assessment

Phishing in Brief Assessment

View More
Breach Notification Assessment

Breach Notification Assessment

View More
WORKed Episode 7: Laptop Down

WORKed Episode 7: Laptop Down

We’ve got a situation. Well, they do. Show your employees the importance of device security with this WORKed training module.

View More
HIPAA Assessment

HIPAA Assessment

View More
WORKed Episode 8: Eagle Eye

WORKed Episode 8: Eagle Eye

Keep your head on a swivel and your screen down. Teach your employees to watch out for shoulder surfing in this WORKed training module.

View More
Privacy and PII

Privacy and PII

Our Privacy and PII module defines privacy and Personally Identifiable Information (PII), and reinforces the importance of data security in the workplace.

View More
Don't Be a Target: Removable Media

Don't Be a Target: Removable Media

hackers steal information from unencrypted, removable media. What's worse is when a hacker plants an infected USB drive for someone to find and use.

View More
Working Remotely Assessment

Working Remotely Assessment

View More
Posters: Mobile Device - Art of Cyber War

Posters: Mobile Device - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Posters: Malware - Don't Be a Target

Posters: Malware - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Physical Security Brief Assessment

Physical Security Brief Assessment

View More
Working Remotely (No Background Music)

Working Remotely (No Background Music)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
Safe Web Browsing Brief (No Background Music)

Safe Web Browsing Brief (No Background Music)

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.

View More
Phishing for Managers

Phishing for Managers

Managers are frequently targeted by phishing emails due to their level of data access. This module discusses phishing in detail and teaches managers how to detect phishing attempts. It also outlines how managers can work with their teams to protect their company from phishing attacks.

View More
Password Security Assessment

Password Security Assessment

View More
Incident Response

Incident Response

This module will explore the basics of incident response and the first rules of keeping people and data safe.

View More
Sensitive Data Exposure

Sensitive Data Exposure

Our Sensitive Data Exposure module reinforces the need for security policies by outlining common risks of mishandled personal information.

View More
Don't Be a Target: CEO'S Email

Don't Be a Target: CEO'S Email

The most dangerous type of phishing is known as "Spear Phishing." A spear phisher will craft messages to target individuals or small groups. These emails may appear to come from business associates, or even the CEO.

View More
10 Ways to Recognize and Prevent Insider Threats

10 Ways to Recognize and Prevent Insider Threats

View More
Encryption

Encryption

This module explains the concept of encryption in common terms. It details the encryption process and types of assets that can be encrypted, and reinforces the importance of following encryption-related policies to protect sensitive information.

View More
Suspicious Hosts

Suspicious Hosts

Suspicious hosts are known malicious or potentially unsafe IP addresses or host names. This module will outline how safe browsing can protect Internet users from malicious attacks from suspicious hosts.

View More
Posters: PII - Don't Be a Target

Posters: PII - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
COPPA Assessment

COPPA Assessment

View More
Social Engineering Assessment

Social Engineering Assessment

View More
Posters: Ransomware - Art of Cyber War

Posters: Ransomware - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
GDPR - Breach Notification (Video)

GDPR - Breach Notification (Video)

This brief video covers the next steps for an organization should a breach occur.

View More
Public Networks and Computers Assessment

Public Networks and Computers Assessment

View More
WORKed Episode 11: X-Men

WORKed Episode 11: X-Men

Welcome to the danger room. Danger conference room, really. Teach your employees the importance of mobile security with this WORKed training module.

View More
Privacy and PII Brief

Privacy and PII Brief

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).

View More
Marine Lowlifes Campaign Kit

Marine Lowlifes Campaign Kit

View More
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

This module explains how to recognize advanced persistent threats (APT), APT risks and common attack methods.

View More
Password Security (No Background Music)

Password Security (No Background Music)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation.

View More
Security Awareness Review

Security Awareness Review

View More
Social Engineering Defenses

Social Engineering Defenses

This brief video shows you how to recognize and prevent social engineering attacks.

View More
GDPR - Consequences of Non-Compliance

GDPR - Consequences of Non-Compliance

This short video covers the impact non-compliance with GDPR regulations can have on your organization.

View More
GDPR - Important Definitions (Video)

GDPR - Important Definitions (Video)

Brief lesson covers the particulars of how GDPR defines data and its uses.

View More
Posters: Social Engineering - Don't Be a Target

Posters: Social Engineering - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Marine Lowlifes: Common Phish Infographic

Marine Lowlifes: Common Phish Infographic

View More
Marine Lowlifes: Spearphish

Marine Lowlifes: Spearphish

Target sighted! Follow the hunt of that vicious but sometimes misaimed predator, the Spearphish.

View More
The Art of Cyber War: Safe Browsing

The Art of Cyber War: Safe Browsing

Spyware, or malicious software, can be found in all corners of the Internet.

View More
Posters: Encryption - Don't Be a Target

Posters: Encryption - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Mobile Wi-Fi Security (Without TOC)

Mobile Wi-Fi Security (Without TOC)

Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.

View More
Posters: Physical Security - Art of Cyber War

Posters: Physical Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Privacy and PII (Without TOC)

Privacy and PII (Without TOC)

Our Privacy and PII module defines privacy and Personally Identifiable Information (PII), and reinforces the importance of data security in the workplace. Topics covered include best practices for collecting, storing, using, sharing and disposing of personal information per US government recommendations, and includes interactive team exercises for content review and reinforcement.

View More
Spearphishing

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

View More
Removable Media (Simplified Navigation)

Removable Media (Simplified Navigation)

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Insufficient Logging and Monitoring

Insufficient Logging and Monitoring

It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.

View More
Safe Web Browsing (No Background Music)

Safe Web Browsing (No Background Music)

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.

View More
Securing Mobile Devices (Without TOC)

Securing Mobile Devices (Without TOC)

Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions. This module will inform learners on the differences between mobile devices and traditional desktop computers in the context of information security, and teach learners how to use mobile devices safely.

View More
Improper Error Handling (No Background Music)

Improper Error Handling (No Background Music)

Errors are a fact of life in any system. But what happens when an error report ends up revealing a weakness? Take a closer look at the problem of improper error handling.

View More
Security Awareness Baseline Knowledge Assessment IV

Security Awareness Baseline Knowledge Assessment IV

View More
Ransomware (No Background Music)

Ransomware (No Background Music)

Ransomware is malware, or malicious software, that holds technology for ransom. This modules will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
Don't Be a Target: Your Department

Don't Be a Target: Your Department

Given the threat that hackers pose to you and your organization, it's everyone's responsibility to learn more about cyber protection.

View More
International Travel Security

International Travel Security

This security awareness module introduces common information security risks found when traveling abroad.

View More
WORKed Episode 10: Travel Stories

WORKed Episode 10: Travel Stories

Jack gets a little risky on the road. Teach your employees the keys to working remotely with this WORKed training module.

View More
Intellectual Property

Intellectual Property

This module covers important intellectual property protection mechanisms (patents, trademarks, and copyrights) and how they apply to various types of products, including software and digital media.

View More
CPNI for Consumers Assessment

CPNI for Consumers Assessment

View More
Updates And Patches

Updates And Patches

This module covers the importance of regular patches and updates, and also details how to avoid malicious updates from untrusted sources.

View More
The Art of Cyber War: Physical Security

The Art of Cyber War: Physical Security

Poor physical security can often defeat the best IT security controls.

View More
Don't Be a Target: Your Reporting Policy

Don't Be a Target: Your Reporting Policy

For optimum protection against hackers, people must learn about security incidents in a complete, accurate and timely manner. Hackers expect that incident news will not be reported.

View More
Every Step You Take (Mentoring)

Every Step You Take (Mentoring)

Even after you've learned good security practices, you should share your knowledge with others.

View More
Locked Down (Lock Screens)

Locked Down (Lock Screens)

This micro-learning module emphasizes the importance of locking your screens.

View More
Social Engineering (Without TOC)

Social Engineering (Without TOC)

Social engineering occurs when a hacker uses two-way forms of communication, including phones and messaging, to trick users into sharing personal or confidential information. Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Marine Lowlifes: Clone Phish

Marine Lowlifes: Clone Phish

Sink into the depths to observe the Clone Phish, which disguises itself as a previously trustworthy message to lure in prey.

View More
COPPA

COPPA

This module covers the provisions of the Children's Online Privacy Protection Act (COPPA). It outlines when an organization is subject to COPPA requirements, and how to ensure compliance with COPPA provisions.

View More
The Art of Cyber War: Mobile Device Security

The Art of Cyber War: Mobile Device Security

We are no longer tied to our desks, and the use of mobile phones, tablets and other devices is growing.

View More
Mobile Security for Managers

Mobile Security for Managers

This module will explain the risks of mobile devices and public networks in detail, and provide guidance on how managers can work with their teams to keep sensitive data secure.

View More
Data Destruction

Data Destruction

This module reinforces the importance of secure data-disposal methods and shares best practices for disposal of sensitive data.

View More
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.

View More
10 Ways to Recognize and Combat Social Engineering

10 Ways to Recognize and Combat Social Engineering

View More
GDPR- What is GDPR (Video)

GDPR- What is GDPR (Video)

A high level overview of the origin and aims of the General Data Protection Regulations.

View More
A Few Extra Seconds (Lock Screens)

A Few Extra Seconds (Lock Screens)

Why you should use lock screens on your devices.

View More
Malware for Managers

Malware for Managers

This module will help managers understand the risks of malware, teach them how to prevent installation and provide guidance on how managers can help their team understand -- and comply with -- internal security policies.

View More
FERPA Assessment

FERPA Assessment

View More
Check (Automatic Updates)

Check (Automatic Updates)

This micro-learning module highlights the importance of enabling automatic updates.

View More
Don't Be a Target: Your Trust

Don't Be a Target: Your Trust

Social engineering requires contact and trust, and frequently occurs over the phone or through text messages.

View More
Social Engineering Brief (No Background Music)

Social Engineering Brief (No Background Music)

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.

View More
Privacy for HR

Privacy for HR

This module will cover the basics of Personally-Identifiable Information (PII) security for Human Resources.

View More
EAL Phishing

EAL Phishing

This module teaches learners how to avoid falling victim to phishing.

View More
Phishing (No Background Music)

Phishing (No Background Music)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Physical Security Assessment

Physical Security Assessment

View More
Password Security Brief (No Background Music)

Password Security Brief (No Background Music)

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.

View More
Posters: PII - Art of Cyber War

Posters: PII - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Mobile Security for Executives

Mobile Security for Executives

In this module, we review the risks of conducting business on mobile devices and public networks, and share best practices for working remotely at home and abroad.

View More
Working Remotely (Without TOC)

Working Remotely (Without TOC)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure. Learners will gain deeper understanding of home networks and the devices and risks that come with them, and learn why use of public networks and devices should be avoided when possible.

View More
Save (Firewall)

Save (Firewall)

This micro-learning module highlights the importance of using firewalls to protect your data.

View More
Removable Media Brief (No Background Music)

Removable Media Brief (No Background Music)

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.

View More
Password Security (Simplified Navigation)

Password Security (Simplified Navigation)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Malware Brief

Malware Brief

An abbreviated version of our core malware training, this module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.

View More
Removable Media for Executives

Removable Media for Executives

Executives must lead and support policies to prevent infections from removable media. This interactive module covers three key areas of focus: safe use of removable media for legitimate purposes, types of attacks hackers launch from “lost” removable media and best practices for preventing infection from a malicious device.

View More
WORKed Episode 4: Coffee Guy

WORKed Episode 4: Coffee Guy

Watch to discover Charlie’s password to EVERYTHING. Help your employees select strong passwords with this WORKed training module.

View More
Mobile Wi-Fi Security

Mobile Wi-Fi Security

Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.

View More
WORKed Episode 5: Mallomars

WORKed Episode 5: Mallomars

You can be nice and still question everything that comes your way. Help your employees avoid social engineering attacks with this WORKed training module.

View More
Posters: Phishing - Art of Cyber War

Posters: Phishing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Appropriate Use of Software

Appropriate Use of Software

In less than 60 seconds, this module covers how to legally use products of creative software.

View More
Safe Web Browsing Brief

Safe Web Browsing Brief

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.

View More
Help Desk Assessment

Help Desk Assessment

View More
Security at Home Infographic

Security at Home Infographic

View More
Don't Be a Target: Your Browser

Don't Be a Target: Your Browser

Attackers exploit browsers to infect, take control, steal information, destroy files and hijack and stage attacks from your computer.

View More
Posters: Phishing - Don't Be a Target

Posters: Phishing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
One Wrong Move (Phishing)

One Wrong Move (Phishing)

This one-minute video uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of a phishing attack.

View More
Broken Authentication and Session Management

Broken Authentication and Session Management

This module describes what incorrect implementation of authentication and session management functions are, and explains how it can allow attackers to assume other users’ identities.

View More
Securing Privileged Access

Securing Privileged Access

This module will discuss the issue of securing privileged access, including the fundamentals of access security and the dangers that can be caused by a misused account.

View More
Marine Lowlifes Resource Library

Marine Lowlifes Resource Library

Download the entire library of Marine Lowlifes resources and training materials. Resources include training modules, posters, infographics, email templates, digital banners and a communication plan to help you roll out every step of the campaign.

View More
Marine Lowlifes: Spearphish Infographic

Marine Lowlifes: Spearphish Infographic

View More
Social Engineering (No Background Music)

Social Engineering (No Background Music)

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Posters: Social Engineering - Art of Cyber War

Posters: Social Engineering - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
GDPR for Managers

GDPR for Managers

This security awareness training covers Privacy and the General Data Protection Regulation for Managers.

View More
Program Introduction Assessment

Program Introduction Assessment

View More
Don't Be a Target: Personal Information

Don't Be a Target: Personal Information

Personally identifiable information (PII) is any information which, either on its own or combined with other information, can be used to distinguish or trace an individual's identity.

View More
Don't Be a Target: Your Hardware

Don't Be a Target: Your Hardware

Poor physical security can often defeat the best IT security controls. Printouts, unattended computers, phones and devices are at risk of being stolen or misused.

View More
Physical Security

Physical Security

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
GDPR: Important Definitions Assessment

GDPR: Important Definitions Assessment

View More
Check Yourself (BEC scams)

Check Yourself (BEC scams)

This micro-learning module emphasizes the need to verify wire transfers.

View More
Malware (No Background Music)

Malware (No Background Music)

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Marine Lowlifes: Common Phish

Marine Lowlifes: Common Phish

Dive into the Sea of Emails for a closer look at one of the oldest scams still swimming today: the Common Phish.

View More
Posters: Worked

Posters: Worked

Download all posters in the WORKed campaign.

View More
Need to Know: Password Security

Need to Know: Password Security

A system is only as secure as its password. Join Anthony and Daryl as they get to grips with the challenges of creating a strong password … because safety is not as easy as 1-2-3.

View More
Safe Web Browsing for Managers

Safe Web Browsing for Managers

This module shows managers how hackers launch attacks from unsafe websites and reinforces the need for managerial reinforcement of internal safe-browsing policies.

View More
Posters: Security Incident Reporting - Art of Cyber War

Posters: Security Incident Reporting - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Physical Security for Managers

Physical Security for Managers

Managers have a responsibility to teach and reinforce the importance of physical security in the office. This module will explain the need for physical security to keep data secure, and teach managers how to avoid theft and misuse of printed materials and unattended technology.

View More
Breach Notification

Breach Notification

This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. Topics include HIPAA’s definition of a breach, breach disclosure requirements (including the concept of “safe harbor”) and recommended breach detection and notification methods.

View More
OWASP A6 - Security Misconfiguration

OWASP A6 - Security Misconfiguration

This module covers security misconfigurations.

View More
The Art of Cyber War: Ransomware Attacks

The Art of Cyber War: Ransomware Attacks

Ransomware holds hostage technology and data that is critical for running your most vital operations.

View More
Data Retention

Data Retention

Our Data Retention module defines data retention in the context of information security and explains the value of a data retention plan in specific scenarios. It will walk learners through common data retention plans, data types typically subject to data retention policies and secure data disposal considerations.

View More
Introduction to Security Awareness (Without TOC)

Introduction to Security Awareness (Without TOC)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Insufficient Attack Protection

Insufficient Attack Protection

Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.

View More
Posters: Removable Media - Art of Cyber War

Posters: Removable Media - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Malware (Without TOC)

Malware (Without TOC)

This interactive module defines malware in common terms and details the dangers it poses to organizations. Practical and applicable preventative actions are summarized in three anti-malware recommendations: avoiding suspicious downloads, attachments and other files, frequent/automated software patches and proper use of anti-virus software.

View More
Suspicious Hosts Assessment

Suspicious Hosts Assessment

View More
Antivirus Assessment

Antivirus Assessment

View More
Ransomware Assessment

Ransomware Assessment

View More
Privacy for Managers

Privacy for Managers

This module will cover the basics of Personally-Identifiable Information (PII) security for managers.

View More
Loose Lips Sink Ships

Loose Lips Sink Ships

This video covers the risks of carrying out business outside of your facility.

View More
Advanced Security Awareness

Advanced Security Awareness

View More
Need to Know: Mobile Security

Need to Know: Mobile Security

Join Anthony and Ivana as they explore the ups and downs of phone security. What is encryption? What kind of damage could a stolen phone do? Learn how to take security with you wherever you go.

View More
Avoiding Cybersecurity Risks for Executives

Avoiding Cybersecurity Risks for Executives

This security awareness module explains why top-level managers are targeted, details common attack methods used against executives and offers recommendations for avoiding security risks.

View More
Launch Email - General Workforce

Launch Email - General Workforce

View More
Introduction to Security Awareness

Introduction to Security Awareness

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Working Remotely for Managers

Working Remotely for Managers

This module details best practices for working remotely on secure networks and reinforces the need for managerial support of remote security policies.

View More
Posters: Insider Threat - Art of Cyber War

Posters: Insider Threat - Art of Cyber War

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
To Change a Lightbulb (IoT)

To Change a Lightbulb (IoT)

This micro-learning module stresses the need for network security in the age of IoT.

View More
Need to Know: Physical Security

Need to Know: Physical Security

Anthony and his pal Harold talk physical security. Why do you secure everything (even the printer), and what could someone get by sneaking in? Here’s how not to leave security out in the cold.

View More
GDPR Basics

GDPR Basics

View More
Dumpster Diving

Dumpster Diving

Dumpster diving is a technique used by hackers and thieves to steal sensitive data from organizations.This short, one-minute video outlines the risks improperly disposed printed material, technology and removable media can pose to an organization.

View More
The Art of Cyber War: Cloud Service

The Art of Cyber War: Cloud Service

"The Cloud" is just another word for internet-based hosting and storage services offered by external companies. Make sure your Cloud is secure, remains private and contains all of the data you expect.

View More
OWASP A4 - XML External Entities (XXE)

OWASP A4 - XML External Entities (XXE)

This module covers XML external entities, their flaws and how to protect them.

View More
Incident Response Assessment

Incident Response Assessment

View More
Cross-Site Scripting (XXS)

Cross-Site Scripting (XXS)

Cross-site scripting (XXS) allows attackers to run scripts in a victim’s browser to bypass access controls. In this module, we explain three types of XSS attacks and suggest XXS prevention measures.

View More
Privacy Risks (Video)

Privacy Risks (Video)

This module covers covers the consequences of privacy violations for businesses.

View More
Acceptable Use Assessment

Acceptable Use Assessment

View More
XML External Entitites (XXE)

XML External Entitites (XXE)

This lesson covers how XXE attacks are executed, and how to prevent those attacks on your applications.

View More
Securing Home Networks and Devices

Securing Home Networks and Devices

This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.

View More
Don't Be a Target: Your Technology

Don't Be a Target: Your Technology

Ransomware holds hostage technology and data that is critical for running your most vital operations.

View More
Marine Lowlifes Resource Library

Marine Lowlifes Resource Library

View More
Intellectual Travel Protection Assessment

Intellectual Travel Protection Assessment

View More
Safe Web Browsing for Executives

Safe Web Browsing for Executives

This module will explain safe browsing best practices and provide guidance on how executives can work with IT and managers to implement and enforce safe-browsing policies.

View More
Identity Theft Assessment

Identity Theft Assessment

View More
Introduction to CCPA

Introduction to CCPA

This module is an introduction to the California Consumer Privacy Act, or CCPA.

View More
Public Networks and Computers

Public Networks and Computers

This training module will teach learners how limit security risks while using public networks and computers.

View More
Don't Be a Target: Your Remote Connection

Don't Be a Target: Your Remote Connection

Hackers steal information from unsecured connections. You can feel safe when working remotely if your network connection are properly secured.

View More
Need to Know: Removable Media

Need to Know: Removable Media

Can a thumb drive topple a company? It’s more likely than you think. Join Anthony and Harold as they check out the dangers of removable media — the good, the bait and the ugly.

View More
Marine Lowlifes: Clone Phish Infographic

Marine Lowlifes: Clone Phish Infographic

View More
The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent occurrence of bribes, kickbacks and other unacceptable business practices. This module defines the FCPA and outlines compliance needs, explores important definitions and provisions of the regulation, and suggests methods to help organizations avoid risks when conducting business with foreign officials.

View More
Secure Password Storage

Secure Password Storage

This short video introduces methods employees can use to store passwords securely. Topics include physical security and password storage applications.

View More
Posters: Marine Lowlifes: Whaling Shark

Posters: Marine Lowlifes: Whaling Shark

View More
How Secure Is Public WiFi? (Public WiFi)

How Secure Is Public WiFi? (Public WiFi)

In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers.

View More
Posters: Password Security - Art of Cyber War

Posters: Password Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Under-protected APIs

Under-protected APIs

This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.

View More
What Is Phishing?

What Is Phishing?

This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information.

View More
OWASP A8 - Insecure Deserialization

OWASP A8 - Insecure Deserialization

This module covers insecure deserialization vulnerabilities in applications and how to prevent these flaws.

View More
How Much Is Too Much? (Password Security)

How Much Is Too Much? (Password Security)

In less than one minute, this video reinforces the importance of keeping passwords private.

View More
Malware Brief (No Background Music)

Malware Brief (No Background Music)

This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.

View More
Don't Be a Target: Your Virtual Assistant

Don't Be a Target: Your Virtual Assistant

They may pose a security risk by allowing unauthorized access to your accounts while you are not present.

View More
Removable Media

Removable Media

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Posters: Security Incident Reporting - Don't Be a Target

Posters: Security Incident Reporting - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
WORKed Episode 1: Bathroom

WORKed Episode 1: Bathroom

Scandal in the men’s room! Show your employees how to treat removable media in this WORKed training module.

View More
Share Responsibly

Share Responsibly

This animated module covers the risks involved in oversharing information on social media.

View More
Phishing (Simplified Navigation)

Phishing (Simplified Navigation)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Password Security in Brief Assessment

Password Security in Brief Assessment

View More
WORKed: Teaser

WORKed: Teaser

Use the WORKed Teaser video to draw attention to your campaign and preview what's to come.

View More
Suspicious Hosts Assessment (Google) W/ Hints

Suspicious Hosts Assessment (Google) W/ Hints

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. This version contains hints, pointing learners toward specific parts of the website.

View More
Posters: Removable Media - Don't Be a Target

Posters: Removable Media - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
EAL Malware

EAL Malware

This module teaches learners how to avoid falling victim to malware.

View More
The Art of Cyber War: Removable Media

The Art of Cyber War: Removable Media

Hackers steal information from unencrypted, removable media.

View More
Privacy and PII Brief (No Background Music)

Privacy and PII Brief (No Background Music)

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).

View More
CPNI for Consumers

CPNI for Consumers

This security and awareness training covers Customer Proprietary Network Information, or CPNI.

View More