KnowBe4’s game-changing partnerships with The Security Awareness Company, Securable.io, AwareGO, Popcorn Training, and ThinkHR allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

We offer three Training Access Levels: I, II, and III depending on your subscription level. Because our library is constantly being updated, if you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library! 



Kevin Mitnick Security Awareness Training

Included in Training Access Level I

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks. This module is available in SIX additional language versions: French - European, French - Canadian, German, Polish, Spanish, and British English.

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 26 language versions.




KnowBe4 Training Modules

Also included in Training Access Level II 

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

In this 15-minute module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

a. This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unlimited Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.

Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality, 9-minute course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

KnowBe4 Training Micro-modules

Also included in Training Access Level II  (and each around 5 minutes)

  • CEO Fraud
  • Decision-Maker Email Threats
  • Mobile Device Security
  • Ransomware and Bitcoin
  • Remote and Travel WiFi Dangers
  • Safe Web Browsing With Corporate Devices
  • Secure Destruction of Sensitive Information
  • Securely Working From Home
  • Social Engineering the Executive
  • Social Media Precautions for Executives

This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

This 90 second video shows two of the worst things you can do with your password.

This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.




Security Awareness Company Content Library

Also included in Training Access Level III

Active Shooter & Physical Incident Response
Call Center & Help Desk Awareness
Computer Security & Data Protection
Cross Border Data Protection
Data Classification
Developing an Incident Response Plan
Executive Awareness and Leadership Module
How to be a Human Firewall
Identification & User Authentication
Identity Theft and Data Breaches
Insider Threats for Executives and Managers
Malware
Mobile Security Basics
OWASP Top 10
Password Basics
PCI DSS Retail Store Experience
Phishing Andrew's Inbox
Phishing Awareness
PCI DSS Retail Store Experience
Phishing Andrew's Inbox 
Phishing Awareness
Phishing Post-Assessment
Phishing Pre-Assessment
Privacy Basics
Ransomware
Secure Online Behavior
Security Awareness Fundamentals
Security Awareness Fundamentals Post-Assessment
Security Awareness Fundamentals Pre-assessment
Security Triads
Social Engineering
Social Engineering & Phishing for Executives
The Top 10 Security Awareness Fundamentals
The Top 10 Security Awareness Fundamentals Test Out
Top 10 Security Awareness Issues for New Hires
Understanding and Protecting PII
Workforce Safety & Security Awareness
Workplace Violence and Safety
FERC/NERC for End Users
FERC/NERC for Managers and Executives
FERPA (Education)
FFIEC (Financial Compliance)
GLBA (Finance)
HIPAA (Healthcare)
PCI-DSS (Retail Compliance)
Sarbanes-Oxley (Accounting)
13 Habits of Savvy SM Users
5 Steps to Prevent ID Theft
5 Steps to Prevent ID Theft
5 Traits of a Security Aware Employee
A Real Life Spear Phishing Attack
Access Controls
Advanced Persistent Threats
Are Your Things Part of a Botnet?
Availability
Back to School Security Checklist
Bad Passwords
Bank Secrecy Act
Being a Human Firewall in All Three Domains
Confidentiality
Cross Border Data Protection Overview
DIY Home Internet Security Policy
Data Breaches and You
Data Classification at Home
Data Classification at Work
EU GDPR: The Basics
Forms of Social Engineering
Hey! That’s my pie! Oops, I mean PII
How VPNs Work
How to Identify a Social Engineering Attack
In Case of Emergency
Incident Response in Action
Incident Response in All Three Domains
Integrity
IoT Gone Rogue
Keeping Kids Safe on Social Media + 10 Tips for Parents
LinkedIn Scams & It’s a Spammer’s World
Malware on the go!
Mined Your Data
Non-technical Security in ALL THREE DOMAINS
PII: To Prominent Constant of Information Security
Passphrases: The Smart Alternative
Phishing In Action
Privacy vs. Security
Proven Password Policies
Ransomware Security One Sheet
Redefining What it Means to be a Human Firewall
Securing Smart Devices
Security Awareness Newsletter
Security Incidents and Where to Report Them
Shipshape SM Behavior
Smishing: Phishing Gone Mobile
The CIA Triad: Security to the Power of Three
The Cloud Is Not Yours
The Domains Triad: Mind, Body, and Soul
The Future of Identification and Authentication
The Horrors of Malware
The Importance of Data Classification
The Internet of Things and the Concerns of Convenience
The Journey to Being Anonymous on the Internet
The Many Lives Triad
The Many Lives of PII
The Physical Side of Security Awareness
The Rule of Three
The Three Domains of Social Engineering
The Three Lives of Incident Response
The Underground Marketplace and Common Cyber Attacks
Tis the Season..... for Scams
Top 10 Security Practices for Work
Top 10 Ways to Stay Safe at Home
Top 10 Ways to Stay Secure on the Go
Understanding Compliance Standards
What is A Human Firewall?
What is NIST Cybersecurity Framework?
What is Privacy Shield?
What’s the WiFi Password?
Where Do You Hide Your Passwords?
Where in the World is Ransomware
Where's the Remote
Who are Cybercriminals
10 ways to avoid phishing scams
10 ways to keep PII private
10 ways to stay safe on social media
A Day of Bad Passwords
Backup
Being a Human Firewall
Beyond Phishing
Catching malware
Cyber Crime Starts with You
Dangers of USBs
Data Breach Overview
Data Breaches and You
Data Classification Overview
Data Loss and Insiders
Definition of Social Engineering
Dumpster Diving
Email Spoofing
Executives Mitigating Insider Threats
Hide your passwords
Human Firewall and Data Classification
Incident Response 101
Introduction to Ransomware
Introduction to the cloud
Low-Tech Hacks to Steal Your ID
Mobile Cyber Crime
Mobile Security Overview
Mouse Overs
Non-Technical Security Skills
Non-Technical and Physical security tips and tricks
PII and Compliance
Phishing Contest Winner
Phishing From Facebook
Phishing From Netflix
Phishing From Your Bank
Phishing in Action
Physical Security Threats
Pretexting 1 (Fake Fraud Protection)
Pretexting 2 (Fake Help Desk)
Pretexting From Fake I.T.
Pretexting: Fake Employee to Help Desk
Pretexting: Fake Executive to I.T.
Pretexting: From Fake Credit Card Company
Protecting Data
Privacy Vs. Security
Road Warriors
Safe Surfing 1: HTTP vs HTTPS & Online Authentication
Security Myths Busted
Social Media
Social Media Data Mining
Social Networking Do's and Dont's
The CIA Triad
The Domains Triad
The Human Firewall's Top Concerns in All Three Domains
The Many Lives Triad
The Many Lives of PII
Understanding Encryption
Welcome to Security Awareness Training
Welcome to Security Awareness Training - Animated
What are APT’s?
What Does a Social Engineer Look Like?
What is I.D. Theft
What is PII?
Why Executives Need Awareness
Why Security Awareness?
Your Security Awareness Journey
Human Firewall Alpine Skiing
Human Firewall Big Business
Human Firewall Trivia
Human Firewall World Race
Password Alpine Skiing Game
Password Big Business Game
Password World Race Game
Phishing Awareness Alpine Skiing
Phishing Awareness Big Business
Phishing Awareness Trivia
Phishing Awareness World Race
Security Awareness World Race
Security Awareness Alpine Skiing
Security Awareness Big Business
Security Awareness Card Stack
Security Awareness Casino Challenge
Security Awareness Trivia
Social Engineering & Phishing Millionaire Challenge
Social Engineering Alpine Skiing Game
Social Engineering Big Business Game
Social Engineering Trivia
Social Engineering World Race Game
Anatomy Of A Phishing Email
Are You The Weakest Link?
Back Up
Bad Guys don't always wear Masks
Be Alert
Be a Human Firewall
Be a Human Firewall- Always Follow Policy
Break Up With Your Password
Buckle Up
Can you Spot a Social Engineer?
Changed your Password?
Confidential Documents
Confused By our Security Policies?
Confused about policy?
Critical Assets In Your Hands
Ctrl+Alt+Delete
Cyber Security in the Workplace
Definition: Click Happy
Definition: Phish Face
Did You Click A Phishing Link?
Did You Forget To Backup?
Did you follow Policy?
Digital Signature
Do You Know FERC/NERC?
Do You Know Malware? (Spider)
Do You Know Malware? (Warning)
Do You Know Our Policies?
Do You Know Your Security Responsibilities
Do You Think Before You Click?
Do You Think Before You Click? Ask!
Do you Download Apps?
Do you Trust the Delivery Man?
Do you know what you are Downloading?
Don't Leave Us In the Dark
Don't Turn Off the Lights
Don't Use your Dog's Name for a Password
Don't be Fooled (IRS)
Don't be Phishing Bait
Don't get hooked on Phishing Scams
Don’t Be Phishing Bait
Don’t Be a Puppet
Don’t Let Social Engineers In Your Head
EU-US Privacy Shield
Fishing Bait Click Bait
Forget Passwords
GDPR is coming May 2018
GLBA Pretexting Protection
GLBA Safeguards Rule
Got A Problem?
HIPAA Penalties
HIPAA is More Than Just Compliance
HIPAA isn't just for medical professionals
Have You Been Social Engineered Lately?
Health Care Requires Data Care
How Do You Know If Your ID Has Been Stolen
Human Firewall Details
I Know What I Am Downloading
I know what you did last Friday
IRS will never threaten with Law Enforcement
Incident Response Is All About Time
Incident Response LifeGuard
InfoSec Is Your Responsibility
InfoSec Is Your Responsibility World
Information Security Is All Of Us
Insider Threat Malicious or Unintentional
Isn't Their Business (Sunset)
Keep A Clean Desk!
Keep Calm Ask if you don't know
Keep Calm Change Your Password
Keep Calm Delete Phishing Emails
Keep Calm Follow Policy
Keep Calm Report Security Issues
Keep Calm Think Before You Click
Keep Secrets Secret
Keys to the Kingdom
Kiss your Data Goodbye
Login Info Is Private
Messy Desk? Clean Up Your Act!
Mixed Up Password
Mobile Phones - Personal Data
My Password is Complex and Creative
Need Help with your Password?
Never Share Passwords
No Piggybacking Zone
No Thru Traffic
No information without Protection
PCI-DSS Cardholder Data
PCI-DSS POS Security
PW Smoothie
Password Expiration
Passwords Hard to Crack
Perils of the Internet
Protect Company Data (No personal data on company devices)
Protected Health Information
Protecting Data Across Borders
Protecting PHI
Ransomware - Just One Click
Ransomware Encrypts Your Data
Ransomware Is A Malicious Program
Recognize and Protect PII
Report Anything Unusual
Report Strange Incidents
Report Strange Things!
Report it Immediately
SHHH Keep Company Conversations Private
Secure Network
Secure Your Devices
Security Doesn't End With Software
Security Is Not a Vacuum
Security Leader Lighthouse
See Something Strange... Report It
Shred
Simple Steps to Staying Safe Online
Social Engineering
Social Engineering
Social Engineers Target People
Social Media
Something Out of the Ordinary
Stop Think Connect
Stop and Shred
Strong Passwords (Woman)
Tax Season Checklist
Tax Season got you Flustered?
The Cloud is Someone Else's Computer
The Universe is Expanding
Tips To Avoid Ransomware
Today's Predictions for Tomorrow's Internet
Together We Are Human Firewalls
Transferring Data Across Borders
Treat Passwords Like Your Underpants
Treat Your Password Like A Toothbrush
Treat Your Password Like Underwear
Treat Your Passwords Like Your Toothbrush
Triad Classic
Triad Many Lives
Triad SNL Passwords
Triad Security Domains
USB
Unfamiliar Persons
Use Mobile Devices Safely
Watch Out for Tailgaters
Watch out for Shoulder Surfers
What is PII?
Wifi Hot Spot
Work Phone lost or Stolen?
Wrong Way



Securable.io Videos

Also included in Training Access Level III

FISMA- Federal Information Security Management Act
Intro to Phishing
LinkedIn Security
Monitoring Facebook Services
Protect Your Kids Online
Public WIFI Safety
Ransomware Attacks
Traveling Abroad
Twitter Security
USB Safety



AwareGO Videos

Also included in Training Access Level III

CEO Scam
Chain Mail
Clean Desk
Dumpster Diving
Free WiFi
Handling Confidential Material
Home WiFi
HTTPS
Keylogger
Malicious Attachments
Password Handling
Passwords
Phishing
Pop Ups
Printouts
Removable Media
Shoulder Surfing
Social Engineering
Software Installs
Spear Phishing
Spyware
Tailgating
Think Twice
USB Key Drop



Popcorn Training Modules

Also included in Training Access Level III

Something Phishy Series Videos & Quiz (Animated)

  1. Something Phishy Introduction
  2. Mobile Mayhem (mobile threats)
  3. Pass the Password (passwords, social engineering)
  4. Breaking the Barrier (physical, clean desk)
  5. Phishous Malicious (Internet use)
  6. Dicey Devicey (BYOD Security)
  7. Freaky Leaky (DLP)
  8. Cloudy with a chance of Phish (Cloud Apps)
  9. Social Media Fever (Social Network Security)

Cyber Heroes Series Videos & Quiz (Live Action)

  1. Cyber Heroes Introduction
  2. Don't take the bait (spear-phishing, social engineering, vishing)
  3. Mobile Mayhem (mobile threats)
  4. Pass the Password (pass word, social engineering)
  5. Internet Threats (Internet use)
  6. Dicey Devicey (BYOD Security)
  7. Freaky Leaky (DLP)
  8. Cloudy with a chance of Phish (Cloud Apps)
  9. Social Media Fever (Social Network Security)

Security Moment Short Clip Videos & Quiz (Motion Graphic)

  1. The Big Phish
  2. Social Engineering
  3. Ransomware
  4. Spot the fake attachment
  5. Spot the fake link
  6. Privileged user access management (PAM)
  7. Hacking Emotions

Secure Coding 6 Module Course for Developers Video & Quiz
(Animated & Motion Graphic)

  1. Web Application Security Basics and Intro
  2. Injection attacks and how to avoid them
  3. Secure Session Management
  4. Authentication and Authorisation
  5. Secure Transactions & Secure Deployments
  6. Data security

 Compliance Series (Animated)

  1. PCI DSS for Merchants
  2. PCI DSS for Corporate Office
  3. PCI DSS for Retail Stores
  4. SupaPOPI (RSA)
  5. Consumer Protection Act (RSA)
  6. Treating Customer Fairly (RSA)
  7. Conflict of interest policy
  8. Business Continuity / Business Resilience

 Privacy Series Videos and Quiz (Live Action)

  1. Personal Information–Currency of the 21st Century
  2. Identity Theft–Protect your Personal Information
  3. Privacy Principles–Handling Personal Information at Work
  4. Protecting Personal Information–Security & Safeguards
  5. General Data Protection Regulation (GDPR)–User Rights



ThinkHR Training Modules

Also included in Training Access Level III

A Manager's Guide to Diversity, Inclusion and Accommodation
Active Shooter
Bullying and Hazing on Campus
Bullying and Violence in the Workplace
Campus Security Obligations Under Federal Law
FERPA for Higher Education
Optimizing Your Work/Life Balance: Maintaining Your Life Balance
Optimizing Your Work/Life Balance: Taking Control of Your Stress
Pandemic Flu Awareness
Preventing Harassment in the Global Workplace - Employee Edition
Preventing Harassment in the Global Workplace - Manager Edition
Promoting a Substance-Free Workplace
Rightful Employment Termination
Sexual Harassment Prevention for Employees
Title IX for Higher Education
Wage and Hour Awareness for Managers
Workplace Harassment Prevention for Employees - Version 2.0 (Title VII)

 

KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 500+ interactive modules, videos, games, posters and newsletters.

Get Started

 


Get the latest about social engineering

Subscribe to CyberheistNews