top of page

KnowBe4’s game-changing partnerships with The Security Awareness Company, Popcorn Training, ThinkHR, exploqii, Canada Privacy Training, Twist & Shout, TeachPrivacy, Syntrio, and El Pescador allows you to significantly better manage the ongoing problem of social engineering.

 

KnowBe4 offer you the best-in-class phishing platform combined with the world's largest library 1000+ security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

​

The KnowBe4 content library is constantly being updated with fresh new content. Content listed below are examples from the KnowBe4 ModStore by subscription level and subject to change. 

Screenshot 2020-11-20 at 12.31.37.png

Included in Training Access Level I (Silver)

 

Kevin Mitnick Security Awareness Training (45-min)
This fully interactive course takes you through three modules: Social Engineering Red Flags, Common Threats and Your Role*. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Sparr0w (a hacker) and Kevin Mitnick (Chief Hacking Officer at KnowBe4) as they share their insider knowledge and take you behind the scenes to show you how the bad guys do what they do. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. Additionally, you will practice your security awareness skills through a number of engaging scenarios. *Abridged for inclusion in the 45-minute course.

 

Kevin Mitnick Security Awareness Training (15-min)
This module is a condensed version of the full 45-minute training, often assigned to management. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Sparr0w (a hacker) and Kevin Mitnick (Chief Hacking Officer at KnowBe4) as they share their insider knowledge and take you behind the scenes to show you how the bad guys do what they do. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. This module is available in 32 language versions.

Screenshot 2020-11-20 at 12.35.12.png

Included in Training Access Level I (Silver)

   

KnowBe4 Cybersecurity Awareness Posters
All Your Data Are Belong To Us
Bad Rabbit: Think Before You Click
Be An Email Superhero
Burning Man
CEO Fraud
Don't Let Your Strings Get Pulled
Don’t Click on Me
Email Subject Line Red Flags
Give Us the Bitcoin
It only takes one
Jaws: Don’t Be a Victim
Keep Calm and Don’t Click
Loose Clicks Sink Ships
Loose Lips Sink Ships
Loose Tweets Sink Fleets
Phishin’ Is Easy
Ransomware Apocalypse is Calling
Ransomware Has No BordersRansomware Invaders
Resist the USB Attack
Stop Phishing Attacks Dead in Their Tracks
Stop, Look, Think
Stop, Look, Think Signs
The Clickers
There's Something Phishy in Your Inbox
Think Before You Click
Think Before You Click Boy
Think Before You Click Brain
Think Before You Click Eye Chart
Think Before You Click Monster
Think Before You Click Pop-Up
This is My Ransomware Killing Poster
Tron Ransomware
Uncle Sam: I Want You to Stop Clicking
Why Security Awareness Training?
You Can’t Go Back

 

Screenshot 2020-11-17 at 19.41.53.png

Also included in Training Access Level II (Gold & Platinum)

 

KnowBe4 Security Awareness Training (30-Min)

This fully interactive course takes you through two modules: Social Engineering Red Flags and Your Role*. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Sparr0w (a hacker) as he shares his insider knowledge and takes you behind the scenes to show you how it's done. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. Additionally, you will practice your security awareness skills through a number of engaging scenarios. * Abridged for inclusion in the 30-minute course.

 

Basics of Credit Card Security

This 20-minute module covers the basics of credit card security. It is meant for all employees in your organization who handle credit cards and/or credit card data. Employees will learn what the hackers are after, the techniques hackers use to try and gain access, and the best practices they can take to protect the organization and its valuable credit card data.

   

CEO Fraud

In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

   

Common Threats, Part 1 - Miranda's Story

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

   

Common Threats, Part 2 - Kyle's Story

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

   

Creating Strong Passwords

In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

   

Financial Institution Physical Security (for Financial Institutions only)

This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

   

GDPR

This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

   

GLBA Security Awareness Training (for Financial Institutions only)

In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

   

Handling Sensitive Information

This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

   

Mobile Device Security

This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

   

PCI Compliance Simplified

This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

   

Ransomware

This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

   

Ransomware For Hospitals Training

Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

   

Safe Web Browsing

In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

   

Social Engineering Red Flags

This totally interactive module covers the social engineering “red flags” that can be found in emails, digital messages, over the phone, and through in-person social engineering attacks. To engage the learner, common “hacking tricks” are presented from the viewpoint of a hacker as he explains what he does, why he does it—and most importantly, how an educated user might spot the red flags in each of the hacker’s methods. By knowing what to look for, the employee becomes able to spot a social engineering attack and not be tricked.

   

The Danger Zone

Keep your organization safe by successfully answering questions and preventing a hacker from reaching an unlocked workstation. This gamified assessment is designed as a post-training activity, meant to be taken after completing the 2020 Your Role, 2020 Social Engineering Red Flags, and 2020 Common Threats modules.

   

Your Role, Internet Security and You

Your Role discusses today’s threat landscape and an employee’s role in keeping their organization secure against these threats. Current cybercrime strategies are introduced, followed by an exploration of 12 common types of digital and in-person threats used by today’s cybercriminals to trick employees into taking an action. By learning how to recognize these threats, an employee can make smarter security decisions every day and help prevent a cybercrime attack that would put their organization, and themselves, at risk.

​

​

​

​

​

​

Also included in Training Access Level II (Gold & Platinum)

​

Executive Series Micro-modules

  • CEO Fraud

  • Decision-Maker Email Threats

  • Mobile Device Security

  • Ransomware and Bitcoin

  • Remote and Travel WiFi Dangers

  • Safe Web Browsing With Corporate Devices

  • Secure Destruction of Sensitive Information

  • Securely Working From Home

  • Social Engineering the Executive

  • Social Media Precautions for Executives

​​

Captain Awareness Series

  • Be a Human Firewall

  • Conquer Internet Safety for Kids

  • Securing Your Mobile Devices

  • Triumph over the Reuse of Passwords

  • Understanding GDPR

  • Securely Working from Home

  • Be Vigilant with USB Drives

  • Outwit Dumpster Divers

  • Travel Securely

  • Handling Printouts

  • Understanding Data Breaches

  • Safeguard Social Media

  • Protect Your Web Browser

  • Guardians of Sensitive Information

  • Vanquish Malicious Attachments

  • Outwit Social Engineering

  • Conquer Open WiFi

  • Foil Phishing

  • Voice Activated Device

  • Detecting Suspicious Activity

  • Perils of Pretexting

  • Beware of Disinformation

 

Credit Card Security (Part 1)

This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

   

Credit Card Security (Part 2)

This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

   

Danger Zone Exercise

This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

 

Don't Be Dave

This 90 second video shows two of the worst things you can do with your password.

​

Email Spoofing

This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

   

Handling Sensitive Information Securely (Part 1)

This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

   

Handling Sensitive Information Securely (Part 2)

This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

   

How to Stay Safe for the Holidays

The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

   

Ransomware

This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

   

Safe Web Browsing

This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

   

Social Engineering

This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

   

Social Media Best Practices

This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

   

Strong Passwords

This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

   

USB Attack

This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.

​

​

​

​

 

Also included in Training Access Level III (Diamond)

 

Cyber Security Awareness Interactive Training Modules
Active Shooter & Physical Incident Response
Call Center & Help Desk Awareness
Computer Security & Data Protection
Cross Border Data Protection
Data Classification
Developing an Incident Response Plan
Empowering Your Employees for Better Security
Executive Awareness Leadership
How to be a Human Firewall
Identification & User Authentication
Identity Theft and Data Breaches
Insider Threats for Executives and Managers
Malware
Mobile Security Basics
Non-technical Security Basics
OWASP Top 10
PCI DSS Retail Store Experience Password Basics
Phishing Andrew's Inbox
Phishing Awareness
Phishing Fundamentals
Privacy Basics
Ransomware
Secure Online Behavior
Security Awareness Fundamentals
Security Triads
Social Engineering
Social Engineering & Phishing for Executives
Social Engineering Basics
The Top 10 Security Awareness Fundamentals Test Out
Top 10 Security Awareness Fundamentals for New Hires
Understanding and Mitigating Security Risks for Executives
Understanding and Protecting PII
Workforce Safety & Security Awareness
Workplace Violence and Safety

​

Cyber Security Awareness Compliance Modules
FERC/NERC for End Users
FERC/NERC for Managers and Executives
FERPA (Education)
FFIEC (Financial Compliance)GLBA (Finance)
HIPAA (Healthcare)
PCI-DSS (Retail Compliance)
Sarbanes-Oxley (Accounting)

​

Cyber Security Awareness Games
End of the Day Security Challenge
Human Firewall Big Business
Human Firewall Trivia
Human Firewall World Race
Password Big Business Game
Password World Race Game
Phishing Awareness Big Business
Phishing Awareness Trivia
Phishing Awareness World RaceSecurity Awareness World Race
Security Awareness Big Business
Security Awareness Card Stack
Security Awareness Casino Challenge
Security Awareness Trivia
Social Engineering & Phishing Millionaire Challenge
Social Engineering Big Business Game
Social Engineering Trivia
Social Engineering World Race Game

Screenshot 2020-11-17 at 20.00.47.png
Screenshot 2020-11-20 at 11.59.55.png

Cyber Security Awareness Posters

Anatomy Of A Phishing Email
Are You The Weakest Link?
Back Up
Bad Guys don't always wear Masks
Be Alert
Be a Human Firewall
Be a Human Firewall- Always Follow Policy
Break Up With Your Password
Buckle Up
Can you Spot a Social Engineer?
Changed your Password?
Confidential Documents
Confused By our Security Policies?
Confused about policy?
Critical Assets In Your Hands
Ctrl+Alt+Delete
Cyber Security in the Workplace
Data Protection Life Cycle
Decorate Your Devices
Definition: Click Happy
Definition: Phish Face
Did You Click A Phishing Link?
Did You Forget To Backup?
Did you follow Policy?
Digital Signature
Do You Know FERC/NERC?
Do You Know Malware? (Spider)
Do You Know Malware? (Warning)
Do You Know Our Policies?
Do You Know Your Security Responsibilities
Do You Think Before You Click?
Do You Think Before You Click? Ask!
Do you Download Apps?
Do you Trust the Delivery Man?
Do you know what you are Downloading?
Don't Leave Us In the Dark
Don't Turn Off the Lights
Don't Use your Dog's Name for a Password
Don't be Fooled(IRS)
Don't be Phishing Bait
Don't get hooked on Phishing Scams
Don’t Be Phishing Bait
Don’t Be a Puppet
Don’t Let Social Engineers In Your Head
EU-US Privacy Shield
Fishing Bait Click Bait
Forget Passwords
GDPR is Here
GLBA Pretexting Protection
GLBA Safeguards Rule
Got A Problem?
HIPAA Penalties
HIPAA is More Than Just Compliance
HIPAA isn't just for medical professionals
Have You Been Social Engineered Lately?
Health Care Requires Data Care
How Do You Know If Your ID Has Been Stolen
How Much Information Can Be Stolen From Your Laptop?
Human Firewall Details
I Know What I Am Downloading
I know what you did last Friday
IRS will never threaten with Law Enforcement
Incident Response Is All About Time
Incident Response LifeGuard
InfoSec Is Your Responsibility
InfoSec Is Your Responsibility World
Information Security Is All Of Us
Insider Threat Malicious or Unintentional
Isn't Their Business (Sunset)
Keep A Clean Desk!
Keep Calm Ask if you don't know
Keep Calm Change Your Password
Keep Calm Delete Phishing Emails
Keep Calm Follow Policy
Keep Calm Report Security Issues
Keep Calm Think Before You Click
Keep Secrets Secret
Keys to the Kingdom
Kiss your Data Goodbye

Laptop Security
Leaks Make Us Weak - Caller
Leaks Make Us Weak - Click
Leaks Make Us Weak - Password
Login Info Is Private
Messy Desk? Clean Up Your Act!
Mixed Up Password
Mobile Phones - Personal Data
My Password is Complex and Creative
NIST Cybersecurity Framework
Need Help with your Password?
Never Share Passwords
No Piggybacking Zone
No Thru Traffic
No information without Protection
Not All Insider Threats Are Obvious
PCI-DSS Cardholder Data
PCI-DSS POS Security
PW Smoothie
Password Expiration
Passwords Hard to Crack
Perils of the Internet
Protect Company Data (No personal data on company devices)
Protected Health Information
Protecting Data Across Borders
Protecting PHI
Ransomware - Just One Click
Ransomware Encrypts Your Data
Ransomware Is A Malicious Program
Recognize and Protect PII
Report Anything Unusual
Report Strange Incidents
Report Strange Things!
Report it Immediately
SHHH Keep Company Conversations Private
Secure Network
Secure Your Devices
Security Doesn't End With Software
Security Is Not a Vacuum
Security Leader Lighthouse
See Something Strange... Report It
Shred
Simple Steps to Staying Safe Online
Social Engineering
Social Engineering
Social Engineers Target People
Social Media
Something Out of the Ordinary
Stop Think Connect
Stop and Shred
Strong Passwords (Woman)
Tax Season Checklist
Tax Season got you Flustered?
The Cloud is Someone Else's Computer
The Universe is Expanding
These Keys Lock Your Computer
They Don't Wear Name Tags
Tips To Avoid Ransomware
Today's Predictions for Tomorrow's Internet
Together We Are Human Firewalls
Transferring Data Across Borders
Treat Passwords Like Your Underpants
Treat Your Password Like A Toothbrush Photographic
Treat Your Password Like Underwear
Treat Your Passwords Like Your Toothbrush - Silhouette
Triad Classic
Triad Many Lives
Triad SNL Passwords
Triad Security Domains
USB
Understanding Compliance
Unfamiliar Persons
Use Mobile Devices Safely
Watch Out for Tailgaters
Watch out for Shoulder Surfers
What is PII?
Whiteboard Security
Wifi Hot Spot
Work Phone lost or Stolen?
Wrong Way

​

 

 

 

Also included in Training Access Level III (Diamond)

 

Popcorn Training Modules
Something Phishy Series Videos & Quiz (Animated)
Something Phishy Introduction
Mobile Mayhem (mobile threats)
Pass the Password (passwords, social engineering)
Breaking the Barrier (physical, clean desk)
Phishous Malicious (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)


Cyber Heroes Series Videos & Quiz (Live Action)
Cyber Heroes Introduction
Don't take the bait (spear phishing, social engineering, vishing)
Mobile Mayhem (mobile threats)
Pass the Password (pass word, social engineering)
Internet Threats (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)


Security Moment Short Clip Videos & Quiz (Motion Graphic)
The Big Phish
Social Engineering
Ransomware
Spot the fake attachment
Spot the fake link
Privileged user access management (PAM)
Hacking Emotions

Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
Secure Transactions and Secure Deployments
Authentication and Authorization
Data Security
Injection Attacks and How to Avoid Them
Introduction to Web Application Security
Secure Session Management

Compliance Series (Animated)
PCI DSS for Merchants
PCI DSS for Corporate Office
PCI DSS for Retail Stores
SupaPOPI (RSA)
Consumer Protection Act (RSA)
Treating Customer Fairly (RSA)
Conflict of interest policy
Business Continuity / Business Resilience


Privacy Series Videos and Quiz (Live Action)
Personal Information–Currency of the 21st Century
Identity Theft–Protect your Personal Information
Privacy Principles–Handling Personal Information at Work
Protecting Personal Information–Security & Safeguards
General Data Protection Regulation (GDPR)–User Rights

Building Secure Software Series

 * Ep 1 - Very Early and Often

 * Ep 2 - Leverage Security Frameworks and Libraries

 * Ep 3 - Secure Database Access

Cyber Essentials Series
Information Security 101

Standups 4 Security Series: (Live Action)
Cybercrime Promo
A Goliath Hack
Behind the Scam with Loyiso Madinga
Open Secrets - A Password Exhibition
Spear phishing - Catching the Big Phish
Don't Trust Anybody - CEO Scam
Social Media Oversharing
The Dark Web Pop-up

​

Popcorn Training Posters and Security Docs
Cyber Heroes Series
Cloudy with a Chance of Phish
Dicey Devicey
Don't Take the Bait
Freaky Leaky
Internet Threats
Mobile Mayhem
Pass the Password
Social Media Fever

​

Security Moments Series
Hacking Emotions
Privileged User Access Management
Ransomware
Social Engineering 101
Spot the Bad Attachment
Spot the Bad Link
The Big Phish

 

Something Phishy Series
Breaking the Barrier
Cloudy With A Chance of Phish
Dicey Devicey
Freaky Leaky
Mobile Mayhem
Pass The Password
Phishious Malicious
Social Media Fever
Something Phishy

 

Privacy Series
GDPR
Identity Theft
Personal Information
Privacy Principles
Protecting Personal Information

​

​

​

 

 

Also included in Training Access Level III (Diamond)

 

exploqii Videos
Anti Trust 1 - Basic Regulations & Risks
Basic Rules of Secure Communication
Bluetooth & WiFi
Business Partner Compliance
CEO Fraud - Fake President
Clean Desk Policy
Cloud Services
Code of Conduct
Compliance Checklist
Compliance Management System
Conflict of Interest
Corruption
Crisis Management
Data Protection
Disinformation
EU GDPR
Export Control
Fairness & Respect in the Workplace
Gifts & Hospitality
IT Security in the Workplace
Identity Theft
Industrial Espionage
Information Classification

Information Security @ Mobile Devices
Information Security @ Remote Workplaces
Information Security @ Social Media
Insider Threat
Internal Investigations
Know-How Security
Money Laundering
Payment Fraud
Phishing Attacks on Companies
Phone Scam
Price Rigging
Proxy Servers & Data Privacy
Ransomware Micro-module
Secure Passwords
Security-Oriented Personnel Selection
Sexual Harassment
Social Engineering Micro-module
Social Media Guidelines
Threat Management
Travel Security
USB Attacks
Visitor Management
4Whistleblower

​

​

​

​

Also included in Training Access Level III (Diamond)

 

Canada Privacy Training Modules

Canadian Private Sector Privacy

​

​

​

​

Also included in Training Access Level III (Diamond)

​

Twist & Shout Video Modules

Restricted Intelligence Series
Season 1

 

Episode 1 - The Test (passwords and passes)
Episode 2 - Browsing (safe surfing)
Episode 3 - A Cry for Help (email hacking and phishing)
Episode 4 - The Journey (portable storage devices)
Episode 5 - The Leak (beware what you share
Episode 6 - The Lesson (mobile devices)

Season 2

Episode 1 - Impression Points (Travel)
Episode 2 - What’s in a Name (Phishing)
Episode 3 - Out of Sight, Out of Mind (Cloud Services)
Episode 4 - Like A Stargate (BYOD)
Episode 5 - It Was Nothing (Document Classification)
Episode 6 - Nobody watches those things (Executive Behavior)
Episode 7 - New Best Friend (Insider Threats)

Season 3

Episode 1 - Leave It To The Master (Social Engineering)
Episode 2 - Nothing to Concern You (Document Disposal)
Episode 3 - Ask the Expert (Social Media Phishing)
Episode 4 - It's Come To My Attention (Homeworking)
Episode 5 - Did You See That One? (Reporting Incidents)
Episode 6 - I Know What You Did Last Weekend (App Permissions)

Season 4

Episode 1 - Everybody Loves Mia (Third Party Vendors)
Episode 2 - Elementary (Social Media Safety)
Episode 3 - One Bad Seed (Physical Access)
Episode 4 - Just Breathe (Phishing)
Episode 5 - Hostage Situation (Ransomware)
Episode 6 - We Could Be Heroes (Public Wifi)

Season 5

Episode 1 - Nothing In Life Is Free (Freeware)
Episode 2 - Besties (Insider Threat)
Episode 3 - There He Blows (Whaling)
Episode 4 - The Worst That Could Happen (Ransomware)
Episode 5 - It's The Latest (Password Safety)
Episode 6 - The Perfect Storm (Oversharing Social Media)

Season 6

Episode 1 - Out of the Shadows (Cloud Services)
Episode 2 - All About Eve (Reporting Incidents)
Episode 3 - Getting the Message (Document Classification)
Episode 4 - Don't Say a Word (Ransomware)
Episode 5 - Charity Case (Phishing)
Episode 6 - False Witness (Identity Theft)
Episode 7 - Bonus: Lionel's Music Video



Restricted Intelligence Privacy Edition
Season 1

Episode 1 - Nothing To Do With Me (What Is PI?)
Episode 2 - Nobody Reads That Stuff (Privacy by Design)
Episode 3 - Once More Unto the Breach (Retention & Disposal)
Episode 4 - The Heart of the Matter (Purpose & Minimisation)
Episode 5 - Mr. Cellophane (Transparency)
Episode 6 - Partners (Third Party Partners)
Bonus: GDPR Intro (GDPR is Coming)

Season 2

Episode 1 - Get Off My Cloud (Privacy and The Cloud)
Episode 2 - Permission To Speak (Access)
Episode 3 - Hard To Say Goodbye (Legitimate Interest)
Episode 4 - Existential Crisis (Data Accuracy)
Episode 5 - Getting It Out There (Accountability)
Episode 6 - Keep It Secret, Keep It Safe (Privacy and Security)



Restricted Intelligence - HIPAA Edition Series
Season 1

Episode 1 - You'll Get A Kick Out Of This (Social Media Sharing)
Episode 2 - Those Seconds Add Up (Unapproved Apps)
Episode 3 - I Hate Surprises (Private Records)
Episode 4 - A Delicate Dance (Passwords & Access)
Episode 5 - Ransom Rumours (Ransomware)
Episode 6 - What's The Worst That Can Happen (Phishing)



Tuesdays with Bernie Series
Season 1

Episode 1 - New Beginnings (Appropriate Workplace Communication)
Episode 2 - Left Behind (Disclosure of Non-Public Information)
Episode 3 - The Fixer (Use of Local Agents)
Episode 4 - Talking a Good Game (External Communications)
Episode 5 - Sit Up and Take Notice (Anti-Corruption)
Episode 6 - Smell Test (Counterparty Screening)

Season 2

Episode 1 - You Scratch My Back (Non-Public Information)
Episode 2 - Like It Never Happened (HSE Reporting)
Episode 3 - Seeing The Light (Export)
Episode 4 - Eye Of The Storm (Business Continuity)
Episode 5 - No Second Chances (Legal Holds)
Episode 6 - The Hard Way (Code of Conduct)

​

​

​

​

Also included in Training Access Level III (Diamond)

​

TeachPrivacy Training Modules

California Health Privacy
Canadian Anti-Spam Legislation (CASL)
Data Breach
Data Disposal
Data Retention
Encryption

FERPA (K-12)
General Data Protection Regulation (GDPR)
Global Privacy and Data Protection
Secure Workspaces Game
The Privacy Act for Federal Government Contractors

​

​

​

​

Also included in Training Access Level III (Diamond)

​

Syntrio Training Modules

Avoiding Antitrust Violations
Avoiding Conflicts of Interest
Avoiding Insider Trading Risk
Back Injury Prevention
California Workplace Harassment Prevention for Employees
California Workplace Harassment Prevention for Managers
Connecticut Sexual Harassment for Managers
Controlling Workplace Exposure to Bloodborne Pathogens
Delaware Sexual Harassment for Employees
Delaware Sexual Harassment for Managers
Disability Discrimination and Accommodation
Employee Privacy: Balancing a Manager's Right to Know
ErgoNet: A Training Guide for Healthy Office Workers

Ethics and Code of Conduct
FCPA Anti-Corruption and Bribery
Global Anti-Corruption
Maine Sexual Harassment for Employees
Maine Sexual Harassment for Managers
New York Preventing Sexual Harassment for Employees
New York Preventing Sexual Harassment for Managers
Personal Protective Equipment: A General Awareness
Preventing Unlawful Retaliation in the Workplace

Slip, Trip, and Fall Prevention
Understanding the Family and Medical Leave Act
Valuing Diversity for Managers

​

 

 

Also included in Training Access Level III (Diamond)

 

El Pescador Training Modules

Data Collection
Data Collection Quiz
C-Level Phishing
Finance Sector Phishing
Lei Geral de Proteção de Dados

Phishing: Why Should We Care
Phishing, The Major Cause of Information Leakage
Relationship Trust
The Threat May Be Closer Than You Think

​

Screenshot 2020-11-20 at 13.03.24.png
Screenshot 2020-11-20 at 13.10.00.png
Screenshot 2020-11-20 at 13.03.31.png
Screenshot 2020-11-20 at 13.03.37.png
Screenshot 2020-11-20 at 13.03.47.png
Screenshot 2020-11-20 at 13.03.57.png
Screenshot 2020-11-20 at 13.04.08.png
bottom of page