KnowBe4’s game-changing partnerships with The Security Awareness Company, Popcorn Training, exploqii, Canada Privacy Training, Twist & Shout, El Pescador, CLTRe, Saya University, lawpilots, MediaPRO, and Kontra allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library 1000+ security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

We offer three Training Access Levels: I, II, and III depending on your subscription level. Compliance Plus is also available for your compliance training needs as an optional add-on to any Training Access Level. The KnowBe4 content library is constantly being updated with fresh new content. Content listed below are examples from the KnowBe4 ModStore by subscription level and subject to change. If you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library!

Kevin Mitnick Security Awareness Training

Included in Training Access Level I (Silver)

Cybercrime happens way more often than you realize, and you are a target! This fully interactive course is based on three modules: Common Threats, Social Engineering Red Flags, and Your Role: Internet Security and You. Discover the most common threats you and your organization face, as well as the warning signs (or red flags) that can make you aware of potential threats. Kevin Mitnick (KnowBe4's Chief Hacking Officer and "The World's Most Famous Hacker") will take you behind the scenes and show you how a phishing attack is carried out. Additionally, Jenny Radcliffe (a social engineer) will use real-life examples to fill you in on how you can minimize the risks you and your organization face from these cyberthreats.

This module is a condensed version of the full 45-minute training, often assigned to management. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Kevin Mitnick (Chief Hacking Officer at KnowBe4) as he takes you behind the scenes to show you how the bad guys do what they do. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. This module is available in 36 language versions.

KnowBe4 Cybersecurity Awareness Posters

Included in Training Access Level I (Silver)

All Your Data Are Belong To Us
Bad Rabbit: Think Before You Click
Be An Email Superhero
Burning Man
CEO Fraud
Don't Let Your Strings Get Pulled
Don’t Click on Me
Email Subject Line Red Flags
Give Us the Bitcoin
It only takes one
Jaws: Don’t Be a Victim
Keep Calm and Don’t Click
Loose Clicks Sink Ships
Loose Lips Sink Ships
Loose Tweets Sink Fleets
Phishin’ Is Easy
Ransomware Apocalypse is Calling
Ransomware Has No Borders
Ransomware Invaders
Resist the USB Attack
Stop Phishing Attacks Dead in Their Tracks
Stop, Look, Think
Stop, Look, Think Signs
The Clickers
There's Something Phishy in Your Inbox
Think Before You Click
Think Before You Click Boy
Think Before You Click Brain
Think Before You Click Eye Chart
Think Before You Click Monster
Think Before You Click Pop-Up
This is My Ransomware Killing Poster
Tron Ransomware
Uncle Sam: I Want You to Stop Clicking
Why Security Awareness Training?
You Can’t Go Back

KnowBe4 Training Modules

Also included in Training Access Level II (Gold & Platinum)

This fully interactive course takes you through two modules: Social Engineering Red Flags and Your Role*. Recognizing the tricks and techniques hackers are using against you and your organization is critical to staying safe. Join Sparr0w (a hacker) as he shares his insider knowledge and takes you behind the scenes to show you how it's done. Along the way, you’ll become familiar with the signs of danger you should look for and the steps you can take to avoid becoming a victim of cybercrime. Additionally, you will practice your security awareness skills through a number of engaging scenarios. * Abridged for inclusion in the 30-minute course.

This 20-minute module covers the basics of credit card security. It is meant for all employees in your organization who handle credit cards and/or credit card data. Employees will learn what the hackers are after, the techniques hackers use to try and gain access, and the best practices they can take to protect the organization and its valuable credit card data.

In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

This totally interactive module covers the social engineering “red flags” that can be found in emails, digital messages, over the phone, and through in-person social engineering attacks. To engage the learner, common “hacking tricks” are presented from the viewpoint of a hacker as he explains what he does, why he does it—and most importantly, how an educated user might spot the red flags in each of the hacker’s methods. By knowing what to look for, the employee becomes able to spot a social engineering attack and not be tricked.

Keep your organization safe by successfully answering questions and preventing a hacker from reaching an unlocked workstation. This gamified assessment is designed as a post-training activity, meant to be taken after completing the 2020 Your Role, 2020 Social Engineering Red Flags, and 2020 Common Threats modules.

Your Role discusses today’s threat landscape and an employee’s role in keeping their organization secure against these threats. Current cybercrime strategies are introduced, followed by an exploration of 12 common types of digital and in-person threats used by today’s cybercriminals to trick employees into taking an action. By learning how to recognize these threats, an employee can make smarter security decisions every day and help prevent a cybercrime attack that would put their organization, and themselves, at risk.

KnowBe4 Training Micro-modules

Also included in Training Access Level II (Gold & Platinum)

CEO Fraud
Decision-Maker Email Threats
Mobile Device Security
Ransomware and Bitcoin
Remote and Travel WiFi Dangers
Safe Web Browsing With Corporate Devices
Secure Destruction of Sensitive Information
Securely Working From Home
Social Engineering the Executive
Social Media Precautions for Executives

Be a Human Firewall
Conquer Internet Safety for Kids
Securing Your Mobile Devices
Triumph over the Reuse of Passwords
Understanding GDPR
Securely Working from Home
Be Vigilant with USB Drives
Outwit Dumpster Divers
Travel Securely
Handling Printouts
Understanding Data Breaches
Safeguard Social Media
Protect Your Web Browser
Guardians of Sensitive Information
Vanquish Malicious Attachments
Outwit Social Engineering
Conquer Open WiFi
Foil Phishing
Voice Activated Device
Detecting Suspicious Activity
Perils of Pretexting
Beware of Disinformation

This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

Oh no! A hacker is inside your organization and has spotted an unlocked workstation. Answer security awareness training-related questions correctly, and you will move closer to the workstation. Answer incorrectly, and the hacker will move closer. Stop the hacker, get to that workstation, and save the organization. Game on!

This 90 second video shows two of the worst things you can do with your password.

This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.

The Security Awareness Company Content Library

Also included in Training Access Level III (Diamond)

Active Shooter & Physical Incident Response
Call Center & Help Desk Awareness
Computer Security & Data Protection
Cross Border Data Protection
Data Classification
Developing an Incident Response Plan
Empowering Your Employees for Better Security
Executive Awareness Leadership
How to be a Human Firewall
Identification & User Authentication
Identity Theft and Data Breaches
Insider Threats for Executives and Managers
Mobile Security Basics
Non-technical Security Basics
OWASP Top 10
PCI DSS Retail Store Experience
Password Basics
Phishing Andrew's Inbox
Phishing Awareness
Phishing Fundamentals
Privacy Basics
Secure Online Behavior
Security Awareness Fundamentals
Security Triads
Social Engineering
Social Engineering & Phishing for Executives
Social Engineering Basics
The Top 10 Security Awareness Fundamentals Test Out
Top 10 Security Awareness Fundamentals for New Hires
Understanding and Mitigating Security Risks for Executives
Understanding and Protecting PII
Workforce Safety & Security Awareness
Workplace Violence and Safety
FERC/NERC for End Users
FERC/NERC for Managers and Executives
FERPA (Education)
FFIEC (Financial Compliance)
GLBA (Finance)
HIPAA (Healthcare)
PCI-DSS (Retail Compliance)
Sarbanes-Oxley (Accounting)
13 Habits of Savvy SM Users
5 Examples of Social Engineering
5 Steps to Prevent ID Theft
5 Steps to Prevent ID Theft
5 Traits of a Security Aware Employee
7 Tips for Travelers
A Real Life Spear Phishing Attack
Access Controls
Advanced Persistent Threats
Are Your Things Part of a Botnet?
Back to School Security Checklist
Bad Passwords
Bank Secrecy Act
Being a Human Firewall in All Three Domains
China's Cybersecurity Law
Click With Care
Cross Border Data Protection Overview
DIY Home Internet Security Policy
Data Breaches and You
Data Classification at Home
Data Classification at Work
EU GDPR: The Basics
Field Guide to Phishing Emails
Following Policy and Reporting Incidents
Forms of Social Engineering
Hey! That's my pie! Oops, I mean PII
How VPNs Work
How to Identify a Social Engineering Attack
In Case of Emergency
Incident Response in Action
Incident Response in All Three Domains
IoT Gone Rogue
Keeping Kids Safe on Social Media + 10 Tips for Parents
LinkedIn Scams & It’s a Spammer's World
Malware on the go!
Mined Your Data
Monthly Security Awareness Newsletter
Monthly Scavenger Hunt Questions for Newsletter
Non-technical Security in ALL THREE DOMAINS
PHI stands for Protected Health Information
PII: To Prominent Constant of Information Security
Passphrases: The Smart Alternative
Phishing In Action
Privacy vs. Security
Proven Password Policies
Ransomware Security One Sheet
Redefining What it Means to be a Human Firewall
Regulations Near and Far
Respecting Privileged Access
Securing Mobile Devices
Securing Smart Devices
Security Incidents and Where to Report Them
Shipshape SM Behavior
Simple Steps to Online Safety
Smishing: Phishing Gone Mobile
Spam Emails vs Phishing Emails
The CIA Triad: Security to the Power of Three
The Cloud Is Not Yours
The Domains Triad: Mind, Body, and Soul
The Future of Identification and Authentication
The Horrors of Malware
The Importance of Data Classification
The Internet of Things and the Concerns of Convenience
The Journey to Being Anonymous on the Internet
The Many Lives Triad
The Many Lives of PII
The Physical Side of Security Awareness
The Rule of Three
The Three Domains of Social Engineering
The Three Lives of Incident Response
The Underground Marketplace and Common Cyber Attacks
Tis the Season..... for Scams
Top 10 Security Practices for Work
Top 10 Ways to Stay Safe at Home
Top 10 Ways to Stay Secure on the Go
Understanding BEC
Understanding Compliance Standards
Understanding Insider Threats
Understanding Insider Threats & Offboarding
Understanding the Attackers
Whale and Spear Phishing
What is A Human Firewall?
What is NIST Cybersecurity Framework?
What is Privacy Shield?
What’s the WiFi Password?
Where Do You Hide Your Passwords?
Where in the World is Ransomware
Where's the Remote
Who are Cybercriminals
Why Does Compliance Matter
You Need a PW Manager
10 ways to avoid phishing scams
10 ways to keep PII private
10 ways to stay safe on social media
A Day of Bad Passwords
Being a Human Firewall
Beyond Phishing
Catching malware
Cyber Crime Starts with You
Dangers of USBs
Data Breach Overview
Data Breaches and You
Data Classification Overview
Data Loss and Insiders
Definition of Social Engineering
Dumpster Diving
Email Spoofing
Executives Mitigating Insider Threats
Hide your passwords
Human Firewall and Data Classification
Incident Response 101
Introduction to Ransomware
Introduction to the cloud
Low-Tech Hacks to Steal Your ID
Mouse Overs
Non-Technical Security Skills
Non-Technical and Physical security tips and tricks
PII and Compliance
Phishing Contest Winner
Phishing From Facebook
Phishing From Netflix
Phishing From Your Bank
Phishing in Action
Physical Security Threats
Pretexting: (Fake Fraud Protection)
Pretexting: (Fake Help Desk)
Pretexting: Fake Employee to Help Desk
Pretexting: Fake Executive to I.T.
Pretexting: From Fake Credit Card Company
Pretexting: From Fake I.T.
Privacy Vs. Security
Protecting Data
Road Warriors
Safe Surfing 1 - HTTP vs HTTPS & Online Authentication
Security Myths Busted
Social Media
Social Media Data Mining
Social Networking Do's and Don’ts
The CIA Triad
The Domains Triad
The Human Firewall's Top Concerns in All Three Domains
The Many Lives Triad
The Many Lives of PII
Understanding Encryption
Welcome to Security Awareness Training
Welcome to Security Awareness Training - Animated
What Are APTs
What Does a Social Engineer Look Like?
What is I.D. Theft
What is PII?
Why Executives Need Awareness Training
Why Security Awareness?
Workplace Physical Awareness
Your Security Awareness Journey
End of the Day Security Challenge
Human Firewall Big Business
Human Firewall Trivia
Human Firewall World Race
Password Big Business Game
Password World Race Game
Phishing Awareness Big Business
Phishing Awareness Trivia
Phishing Awareness World Race
Security Awareness World Race
Security Awareness Big Business
Security Awareness Card Stack
Security Awareness Casino Challenge
Security Awareness Trivia
Social Engineering & Phishing Millionaire Challenge
Social Engineering Big Business Game
Social Engineering Trivia
Social Engineering World Race Game
Anatomy Of A Phishing Email
Are You The Weakest Link?
Back Up
Bad Guys don't always wear Masks
Be Alert
Be a Human Firewall
Be a Human Firewall- Always Follow Policy
Break Up With Your Password
Buckle Up
Can you Spot a Social Engineer?
Changed your Password?
Confidential Documents
Confused By our Security Policies?
Confused about policy?
Critical Assets In Your Hands
Cyber Security in the Workplace
Data Protection Life Cycle
Decorate Your Devices
Definition: Click Happy
Definition: Phish Face
Did You Click A Phishing Link?
Did You Forget To Backup?
Did you follow Policy?
Digital Signature
Do You Know FERC/NERC?
Do You Know Malware? (Spider)
Do You Know Malware? (Warning)
Do You Know Our Policies?
Do You Know Your Security Responsibilities
Do You Think Before You Click?
Do You Think Before You Click? Ask!
Do you Download Apps?
Do you Trust the Delivery Man?
Do you know what you are Downloading?
Don't Leave Us In the Dark
Don't Turn Off the Lights
Don't Use your Dog's Name for a Password
Don't be Fooled(IRS)
Don't be Phishing Bait
Don't get hooked on Phishing Scams
Don’t Be Phishing Bait
Don’t Be a Puppet
Don’t Let Social Engineers In Your Head
EU-US Privacy Shield
Fishing Bait Click Bait
Forget Passwords
GDPR is Here
GLBA Pretexting Protection
GLBA Safeguards Rule
Got A Problem?
HIPAA Penalties
HIPAA is More Than Just Compliance
HIPAA isn't just for medical professionals
Have You Been Social Engineered Lately?
Health Care Requires Data Care
How Do You Know If Your ID Has Been Stolen
How Much Information Can Be Stolen From Your Laptop?
Human Firewall Details
I Know What I Am Downloading
I know what you did last Friday
IRS will never threaten with Law Enforcement
Incident Response Is All About Time
Incident Response LifeGuard
InfoSec Is Your Responsibility
InfoSec Is Your Responsibility World
Information Security Is All Of Us
Insider Threat Malicious or Unintentional
Isn't Their Business (Sunset)
Keep A Clean Desk!
Keep Calm Ask if you don't know
Keep Calm Change Your Password
Keep Calm Delete Phishing Emails
Keep Calm Follow Policy
Keep Calm Report Security Issues
Keep Calm Think Before You Click
Keep Secrets Secret
Keys to the Kingdom
Kiss your Data Goodbye
Laptop Security
Leaks Make Us Weak - Caller
Leaks Make Us Weak - Click
Leaks Make Us Weak - Password
Login Info Is Private
Messy Desk? Clean Up Your Act!
Mixed Up Password
Mobile Phones - Personal Data
My Password is Complex and Creative
NIST Cybersecurity Framework
Need Help with your Password?
Never Share Passwords
No Piggybacking Zone
No Thru Traffic
No information without Protection
Not All Insider Threats Are Obvious
PCI-DSS Cardholder Data
PCI-DSS POS Security
PW Smoothie
Password Expiration
Passwords Hard to Crack
Perils of the Internet
Protect Company Data (No personal data on company devices)
Protected Health Information
Protecting Data Across Borders
Protecting PHI
Ransomware - Just One Click
Ransomware Encrypts Your Data
Ransomware Is A Malicious Program
Recognize and Protect PII
Report Anything Unusual
Report Strange Incidents
Report Strange Things!
Report it Immediately
SHHH Keep Company Conversations Private
Secure Network
Secure Your Devices
Security Doesn't End With Software
Security Is Not a Vacuum
Security Leader Lighthouse
See Something Strange... Report It
Simple Steps to Staying Safe Online
Social Engineering
Social Engineering
Social Engineers Target People
Social Media
Something Out of the Ordinary
Stop Think Connect
Stop and Shred
Strong Passwords (Woman)
Tax Season Checklist
Tax Season got you Flustered?
The Cloud is Someone Else's Computer
The Universe is Expanding
These Keys Lock Your Computer
They Don't Wear Name Tags
Tips To Avoid Ransomware
Today's Predictions for Tomorrow's Internet
Together We Are Human Firewalls
Transferring Data Across Borders
Treat Passwords Like Your Underpants
Treat Your Password Like A Toothbrush Photographic
Treat Your Password Like Underwear
Treat Your Passwords Like Your Toothbrush - Silhouette
Triad Classic
Triad Many Lives
Triad SNL Passwords
Triad Security Domains
Understanding Compliance
Unfamiliar Persons
Use Mobile Devices Safely
Watch Out for Tailgaters
Watch out for Shoulder Surfers
What is PII?
Whiteboard Security
Wifi Hot Spot
Work Phone lost or Stolen?
Wrong Way

Popcorn Training

Also included in Training Access Level III (Diamond)

Something Phishy Series Videos & Quiz (Animated)
Something Phishy Introduction
Mobile Mayhem (mobile threats)
Pass the Password (passwords, social engineering)
Breaking the Barrier (physical, clean desk)
Phishous Malicious (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)

Cyber Heroes Series Videos & Quiz (Live Action)
Cyber Heroes Introduction
Don't take the bait (spear phishing, social engineering, vishing)
Mobile Mayhem (mobile threats)
Pass the Password (pass word, social engineering)
Internet Threats (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)

Security Moment Short Clip Videos & Quiz (Motion Graphic)
The Big Phish
Social Engineering
Spot the fake attachment
Spot the fake link
Privileged user access management (PAM)
Hacking Emotions
Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
Secure Transactions and Secure Deployments
Authentication and Authorization
Data Security
Injection Attacks and How to Avoid Them
Introduction to Web Application Security
Secure Session Management

Compliance Series (Animated)
PCI DSS for Merchants
PCI DSS for Corporate Office
PCI DSS for Retail Stores
Consumer Protection Act (RSA)
Treating Customer Fairly (RSA)
Conflict of interest policy
Business Continuity / Business Resilience

Privacy Series Videos and Quiz (Live Action)
Personal Information–Currency of the 21st Century
Identity Theft–Protect your Personal Information
Privacy Principles–Handling Personal Information at Work
Protecting Personal Information–Security & Safeguards
General Data Protection Regulation (GDPR)–User Rights

Building Secure Software Series
Ep 1 - Very Early and Often
Ep 2 - Leverage Security Frameworks and Libraries
Ep 3 - Secure Database Access

Cyber Essentials Series
Information Security 101

Standups 4 Security Series: (Live Action)
Cybercrime Promo
A Goliath Hack
Behind the Scam with Loyiso Madinga
Open Secrets - A Password Exhibition
Spear phishing - Catching the Big Phish
Don't Trust Anybody - CEO Scam
Social Media Oversharing
The Dark Web Pop-up
Cyber Heroes Series
Cloudy with a Chance of Phish
Dicey Devicey
Don't Take the Bait
Freaky Leaky
Internet Threats
Mobile Mayhem
Pass the Password
Social Media Fever

Security Moments Series
Hacking Emotions
Privileged User Access Management
Social Engineering 101
Spot the Bad Attachment
Spot the Bad Link
The Big Phish
Something Phishy Series
Breaking the Barrier
Cloudy With A Chance of Phish
Dicey Devicey
Freaky Leaky
Mobile Mayhem
Pass The Password
Phishious Malicious
Social Media Fever
Something Phishy

Privacy Series
Identity Theft
Personal Information
Privacy Principles
Protecting Personal Information

exploqii Videos

Also included in Training Access Level III (Diamond)

Anti Trust 1 - Basic Regulations & Risks
Basic Rules of Secure Communication
Bluetooth & WiFi
Business Partner Compliance
CEO Fraud - Fake President
Clean Desk Policy
Cloud Services
Code of Conduct
Compliance Checklist
Compliance Management System
Conflict of Interest
Crisis Management
Data Protection
Export Control
Fairness & Respect in the Workplace
Gifts & Hospitality
IT Security in the Workplace
Identity Theft
Industrial Espionage
Information Classification
Information Security @ Mobile Devices
Information Security @ Remote Workplaces
Information Security @ Social Media
Insider Threat
Internal Investigations
Know-How Security
Money Laundering
Payment Fraud
Phishing Attacks on Companies
Phone Scam
Price Rigging
Proxy Servers & Data Privacy
Ransomware Micro-module
Secure Passwords
Security-Oriented Personnel Selection
Sexual Harassment
Social Engineering Micro-module
Social Media Guidelines
Threat Management
Travel Security
USB Attacks
Visitor Management

Canada Privacy Training Modules

Also included in Training Access Level III (Diamond)

Canadian Private Sector Privacy

Twist & Shout Video Modules

Also included in Training Access Level III (Diamond)

Restricted Intelligence Series
Season 1

Episode 1 - The Test (passwords and passes)
Episode 2 - Browsing (safe surfing)
Episode 3 - A Cry for Help (email hacking and phishing)
Episode 4 - The Journey (portable storage devices)
Episode 5 - The Leak (beware what you share
Episode 6 - The Lesson (mobile devices)

Season 2

Episode 1 - Impression Points (Travel)
Episode 2 - What’s in a Name (Phishing)
Episode 3 - Out of Sight, Out of Mind (Cloud Services)
Episode 4 - Like A Stargate (BYOD)
Episode 5 - It Was Nothing (Document Classification)
Episode 6 - Nobody watches those things (Executive Behavior)
Episode 7 - New Best Friend (Insider Threats)

Season 3

Episode 1 - Leave It To The Master (Social Engineering)
Episode 2 - Nothing to Concern You (Document Disposal)
Episode 3 - Ask the Expert (Social Media Phishing)
Episode 4 - It's Come To My Attention (Homeworking)
Episode 5 - Did You See That One? (Reporting Incidents)
Episode 6 - I Know What You Did Last Weekend (App Permissions)

Season 4

Episode 1 - Everybody Loves Mia (Third Party Vendors)
Episode 2 - Elementary (Social Media Safety)
Episode 3 - One Bad Seed (Physical Access)
Episode 4 - Just Breathe (Phishing)
Episode 5 - Hostage Situation (Ransomware)
Episode 6 - We Could Be Heroes (Public Wifi)

Season 5

Episode 1 - Nothing In Life Is Free (Freeware)
Episode 2 - Besties (Insider Threat)
Episode 3 - There He Blows (Whaling)
Episode 4 - The Worst That Could Happen (Ransomware)
Episode 5 - It's The Latest (Password Safety)
Episode 6 - The Perfect Storm (Oversharing Social Media)

Season 6

Episode 1 - Out of the Shadows (Cloud Services)
Episode 2 - All About Eve (Reporting Incidents)
Episode 3 - Getting the Message (Document Classification)
Episode 4 - Don't Say a Word (Ransomware)
Episode 5 - Charity Case (Phishing)
Episode 6 - False Witness (Identity Theft)
Episode 7 - Bonus: Lionel's Music Video

Restricted Intelligence Privacy Edition
Season 1

Episode 1 - Nothing To Do With Me (What Is PI?)
Episode 2 - Nobody Reads That Stuff (Privacy by Design)
Episode 3 - Once More Unto the Breach (Retention & Disposal)
Episode 4 - The Heart of the Matter (Purpose & Minimisation)
Episode 5 - Mr. Cellophane (Transparency)
Episode 6 - Partners (Third Party Partners)
Bonus: GDPR Intro (GDPR is Coming)

Season 2

Episode 1 - Get Off My Cloud (Privacy and The Cloud)
Episode 2 - Permission To Speak (Access)
Episode 3 - Hard To Say Goodbye (Legitimate Interest)
Episode 4 - Existential Crisis (Data Accuracy)
Episode 5 - Getting It Out There (Accountability)
Episode 6 - Keep It Secret, Keep It Safe (Privacy and Security)

Restricted Intelligence - HIPAA Edition Series
Season 1

Episode 1 - You'll Get A Kick Out Of This (Social Media Sharing)
Episode 2 - Those Seconds Add Up (Unapproved Apps)
Episode 3 - I Hate Surprises (Private Records)
Episode 4 - A Delicate Dance (Passwords & Access)
Episode 5 - Ransom Rumours (Ransomware)
Episode 6 - What's The Worst That Can Happen (Phishing)

Tuesdays with Bernie Series
Season 1

Episode 1 - New Beginnings (Appropriate Workplace Communication)
Episode 2 - Left Behind (Disclosure of Non-Public Information)
Episode 3 - The Fixer (Use of Local Agents)
Episode 4 - Talking a Good Game (External Communications)
Episode 5 - Sit Up and Take Notice (Anti-Corruption)
Episode 6 - Smell Test (Counterparty Screening)

Season 2

Episode 1 - You Scratch My Back (Non-Public Information)
Episode 2 - Like It Never Happened (HSE Reporting)
Episode 3 - Seeing The Light (Export)
Episode 4 - Eye Of The Storm (Business Continuity)
Episode 5 - No Second Chances (Legal Holds)
Episode 6 - The Hard Way (Code of Conduct)
The Inside Man Series
Season 1

Episode 1 - The New Guy (Social Engineering)
Episode 2 - Social Hour (Social Media)
Episode 3 - On Our Side (Phishing Attacks)
Episode 4 - Surprise (Document Disposal)
Episode 5 - Takeaways (Clear Desktop Policy)
Episode 6 - Masquerade (Cloud Services)
Episode 7 - Buying Time (Passwords)
Episode 8 - Taken (Ransomware)
Episode 9 - Where The Wild Things Are (Travel)
Episode 10 - Keep Your Friends Close (App security and permissions)
Episode 11 - The Sound Of Trumpets (External Devices)
Episode 12 - Checkmate (Insider Threats)

Season 2

Episode 1 - A Different Tune (Mobile Devices)
Episode 2 - Crack Team (Need to Know)
Episode 3 - It’s a Date (Mobile Devices Continued)
Episode 4 - The Holy Grail (Internet of Things, Connected Devices)
Episode 5 - Unlikely BedFellows (Phishing)
Episode 6 - It’s Complicated (Multi-Factor Authentication/Phone-Phishing)
Episode 7 - Table for Two (Passwords/Third-Party Apps)
Episode 8 - The Guy Behind the Guy (External Devices and Physical Access)
Episode 9 - Behind the Curtain (Social Engineering)
Episode 10 - Showdown at the AI Corral Part 1 (Social Engineering Continued)
Episode 11 - Showdown at the AI Corral Part 2 (Insider Threats)
Episode 12 - A New Day (Internet of Things, Connected Devices)

Season 3

Episode 1 - Getting In (Physical Security)
Episode 2 - Challenge Accepted (Phishing/Passwords)
Episode 3 - Things Unsaid (Disclosing Information in Public)
Episode 4 - Credit Where Credit is Due (Social Media)
Episode 5 - The Truth Shall Set You Free (Personal Information)
Episode 6 - Family Ties (PIN Security)
Episode 7 - You Can’t Choose Your Family (Security Consciousness)
Episode 8 - Escaping the Past (Deepfake/CEO Fraud)
Episode 9 - The Hook (Vishing/Fake Peripherals)
Episode 10 - The Line (Document Security/Hacker Databases)
Episode 11 - The Sinker (Internet Banking)
Episode 12 - Blast from the Past (Social Engineering)

Season 4

Episode 1 - Crash the Party (Spear Phishing, Physical Security)
Episode 2 - Hostage to Fortune (Ransomware, Malware)
Episode 3 - They Always Pay (Ransomware, Malware)
Episode 4 - Appointment with Fate (Phishing, Social Engineering)
Episode 5 - Trust Me (USB, Social Engineering, Human Firewall)
Episode 6 - Under Pressure (Malware, Social Engineering)
Episode 7 - Faking It (Social Media)
Episode 8 - Nuclear Family (Social Engineering, Passwords/Authentication)
Episode 9 - Party On (Social Engineering, Passwords, Social Media)
Episode 10 - Suspicious Minds (Incident Reporting)
Episode 11 - Bittersweet (Ransomware, Email Security, Human Firewall)
Episode 12 - The Morning After (Social Engineering)
California Health Privacy
Canadian Anti-Spam Legislation (CASL)
Data Breach
Data Disposal
Data Retention
FERPA (K-12)
General Data Protection Regulation (GDPR)
Global Privacy and Data Protection
Secure Workspaces Game
The Privacy Act for Federal Government Contractors

El Pescador Training Modules

Also included in Training Access Level III (Diamond)

Data Collection
Data Collection Quiz
C-Level Phishing
Finance Sector Phishing
Lei Geral de Proteção de Dados
Phishing: Why Should We Care
Phishing, The Major Cause of Information Leakage
Relationship Trust
The Threat May Be Closer Than You Think


Also included in Training Access Level III (Diamond)

Anti-Bribery and Anti-Corruption
Data Protection Essentials
Antitrust and Competition Law
Data Protection for Employees
CCPA for Employees


MediaPRO security awareness training content is included in Training Access Level III (Diamond)

Beating Ransomware
(Additional MediaPRO modules are available with a Compliance Plus subscription)


Kontra application security awareness training content is included in Training Access Level III (Diamond)

OWASP Top 10 for Web (Java)
OWASP Top 10 for Web (C#)
AWS Top 10 (Java)
Front-end Top 10 (Vue.js)

Compliance Plus

Available as an add-on subscription with a Silver, Gold, Platinum, or Diamond subscription.

New-school compliance training topics covered:
Diversity, Equity & Inclusion
Sexual Harassment
Business Ethics
Workplace Safety
Data Privacy (PCI, HIPAA, FERPA, CPRA, and more)
Data Protection
Employment Law (FMLA and ADA)

KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 1000+ interactive modules, videos, games, posters and newsletters.

Get Started

Get the latest about social engineering

Subscribe to CyberheistNews