KnowBe4’s game-changing partnerships with The Security Awareness Company, Securable.io, AwareGO, Popcorn Training, ThinkHR, exploqii, Canada Privacy Training, Twist & Shout, and Teach Privacy allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

We offer three Training Access Levels: I, II, and III depending on your subscription level. Because our library is constantly being updated, if you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library! 



Kevin Mitnick Security Awareness Training

Included in Training Access Level I (Silver)

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks. This module is available in SIX additional language versions: French - European, French - Canadian, German, Polish, Spanish, and British English.

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 26 language versions.




KnowBe4 Cybersecurity Awareness Posters

Included in Training Access Level I (Silver)

All Your Data Are Belong To Us
Bad Rabbit: Think Before You Click
Be An Email Superhero
Burning Man
Don’t Click on Me
Email Subject Line Red Flags
It Only Takes One
Jaws: Don’t Be a Victim
Keep Calm and Don’t Click
Loose Lips Sink Ships
Loose Clicks Sink Ships
Loose Tweets Sink Fleets
Phishin’ Is Easy
Ransomware Apocalypse is Calling
Ransomware Has No Borders
Ransomware Invaders
Resist the USB Attack
Stop Phishing Attacks Dead in Their Tracks
Stop, Look, Think
Stop, Look, Think Signs
The Clickers
Think Before You Click
Think Before You Click Boy
Think Before You Click Brain
Think Before You Click Eye Chart
Think Before You Click Monster
Think Before You Click Pop-Up
This is My Ransomware Killing Poster
Tron Ransomware
Uncle Sam: I Want You to Stop Clicking
Why Security Awareness Training?
You Can’t Go Back



KnowBe4 Training Modules

Also included in Training Access Level II (Gold & Platinum)

This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise" and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.

Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality, 9-minute course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

KnowBe4 Training Micro-modules

Also included in Training Access Level II (Gold & Platinum)

CEO Fraud
Decision-Maker Email Threats
Mobile Device Security
Ransomware and Bitcoin
Remote and Travel WiFi Dangers
Safe Web Browsing With Corporate Devices
Secure Destruction of Sensitive Information
Securely Working From Home
Social Engineering the Executive
Social Media Precautions for Executives

This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

This 90 second video shows two of the worst things you can do with your password.

This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.




The Security Awareness Company Content Library

Also included in Training Access Level III (Diamond)

Active Shooter & Physical Incident Response
Call Center & Help Desk Awareness
Computer Security & Data Protection
Cross Border Data Protection
Data Classification
Developing an Incident Response Plan
Empowering Your Employees for Better Security
Executive Awareness Leadership
How to be a Human Firewall
Identification & User Authentication
Identity Theft and Data Breaches
Insider Threats for Executives and Managers
Malware
Mobile Security Basics
Non-technical Security Basics
OWASP Top 10
PCI DSS Retail Store Experience
Password Basics
Phishing Andrew's Inbox
Phishing Awareness
Phishing Fundamentals
Privacy Basics
Ransomware
Secure Online Behavior
Security Awareness Fundamentals
Security Triads
Social Engineering
Social Engineering & Phishing for Executives
Social Engineering Basics
The Top 10 Security Awareness Fundamentals Test Out
Top 10 Security Awareness Fundamentals for New Hires
Understanding and Mitigating Security Risks for Executives
Understanding and Protecting PII
Workforce Safety & Security Awareness
Workplace Violence and Safety
FERC/NERC for End Users
FERC/NERC for Managers and Executives
FERPA (Education)
FFIEC (Financial Compliance)
GLBA (Finance)
HIPAA (Healthcare)
PCI-DSS (Retail Compliance)
Sarbanes-Oxley (Accounting)
13 Habits of Savvy SM Users
5 Examples of Social Engineering
5 Steps to Prevent ID Theft
5 Steps to Prevent ID Theft
5 Traits of a Security Aware Employee
7 Tips for Travelers
A Real Life Spear Phishing Attack
Access Controls
Advanced Persistent Threats
April 2018 Security Awareness Newsletter
Are Your Things Part of a Botnet?
August 2018 Security Awareness Newsletter
Availability
Back to School Security Checklist
Bad Passwords
Bank Secrecy Act
Being a Human Firewall in All Three Domains
China's Cybersecurity Law
Click With Care
Confidentiality
Cross Border Data Protection Overview
DIY Home Internet Security Policy
Data Breaches and You
Data Classification at Home
Data Classification at Work
December 2017 Security Awareness Newsletter
EU GDPR: The Basics
February 2018 Security Awareness Newsletter
Field Guide to Phishing Emails
Following Policy and Reporting Incidents
Forms of Social Engineering
Hey! That’s my pie! Opps, I mean PII
How VPNs Work
How to Identify a Social Engineering Attack
In Case of Emergency
Incident Response in Action
Incident Response in All Three Domains
Integrity
IoT Gone Rogue
January 2018 Security Awareness Newsletter
July 2018 Security Awareness Newsletter
June 2018 Security Awareness Newsletter
Keeping Kids Safe on Social Media + 10 Tips for Parents
LinkedIn Scams & It’s a Spammer‚Äôs World
Malware on the go!
March 2018 Security Awareness Newsletter
May 2018 Security Awareness Newsletter
Mined Your Data
Non-technical Security in ALL THREE DOMAINS
November 2017 Security Awareness Newsletter
October 2017 Security Awareness Newsletter
PHI stands for Protected Health Information
PII: To Prominent Constant of Information Security
Passphrases: The Smart Alternative
Phishing In Action
Privacy vs. Security
Proven Password Policies
Ransomware Security One Sheet
Redefining What it Means to be a Human Firewall
Regulations Near and Far
Respecting Privileged Access
Securing Mobile Devices
Securing Smart Devices
Security Incidents and Where to Report Them
September 2017 Security Awareness News
Shipshape SM Behavior
Simple Steps to Online Safety
Smishing: Phishing Gone Mobile
Spam Emails vs Phishing Emails
The CIA Triad: Security to the Power of Three
The Cloud Is Not Yours
The Domains Triad: Mind, Body, and Soul
The Future of Identification and Authentication
The Horrors of Malware
The Importance of Data Classification
The Internet of Things and the Concerns of Convenience
The Journey to Being Anonymous on the Internet
The Many Lives Triad
The Many Lives of PII
The Physical Side of Security Awareness
The Rule of Three
The Three Domains of Social Engineering
The Three Lives of Incident Response
The Underground Marketplace and Common Cyber Attacks
Tis the Season..... for Scams
Top 10 Security Practices for Work
Top 10 Ways to Stay Safe at Home
Top 10 Ways to Stay Secure on the Go
Understanding BEC
Understanding Compliance Standards
Understanding Insider Threats
Understanding Insider Threats & Offboarding
Understanding the Attackers
Whale and Spear Phishing
What is A Human Firewall?
What is NIST Cybersecurity Framework?
What is Privacy Shield?
What’s the WiFi Password?
Where Do You Hide Your Passwords?
Where in the World is Ransomware
Where's the Remote
Who are Cybercriminals
Why Does Compliance Matter
You Need a PW Manager
10 ways to avoid phishing scams
10 ways to keep PII private
10 ways to stay safe on social media
A Day of Bad Passwords
Backup
Being a Human Firewall
Beyond Phishing
Catching malware
Cyber Crime Starts with You
Dangers of USBs
Data Breach Overview
Data Breaches and You
Data Classification Overview
Data Loss and Insiders
Definition of Social Engineering
Dumpster Diving
Email Spoofing
Executives Mitigating Insider Threats
Hide your passwords
Human Firewall and Data Classification
Incident Response 101
Introduction to Ransomware
Introduction to the cloud
Low-Tech Hacks to Steal Your ID
Mouse Overs
Non-Technical Security Skills
Non-Technical and Physical security tips and tricks
PII and Compliance
Phishing Contest Winner
Phishing From Facebook
Phishing From Netflix
Phishing From Your Bank
Phishing in Action
Physical Security Threats
Pretexting: (Fake Fraud Protection)
Pretexting: (Fake Help Desk)
Pretexting: Fake Employee to Help Desk
Pretexting: Fake Executive to I.T.
Pretexting: From Fake Credit Card Company
Pretexting: From Fake I.T.
Privacy Vs. Security
Protecting Data
Road Warriors
Safe Surfing 1: HTTP vs HTTPS & Online Authentication
Security Myths Busted
Social Media
Social Media Data Mining
Social Networking Do's and Don’ts
The CIA Triad
The Domains Triad
The Human Firewall's Top Concerns in All Three Domains
The Many Lives Triad
The Many Lives of PII
Understanding Encryption
Welcome to Security Awareness Training
Welcome to Security Awareness Training - Animated
What Are APTs
What Does a Social Engineer Look Like?
What is I.D. Theft
What is PII?
Why Executives Need Awareness Training
Why Security Awareness?
Workplace Physical Awareness
Your Security Awareness Journey
End of the Day Security Challenge
Human Firewall Big Business
Human Firewall Trivia
Human Firewall World Race
Password Big Business Game
Password World Race Game
Phishing Awareness Big Business
Phishing Awareness Trivia
Phishing Awareness World Race
Security Awareness World Race
Security Awareness Big Business
Security Awareness Card Stack
Security Awareness Casino Challenge
Security Awareness Trivia
Social Engineering & Phishing Millionaire Challenge
Social Engineering Big Business Game
Social Engineering Trivia
Social Engineering World Race Game
Anatomy Of A Phishing Email
Are You The Weakest Link?
Back Up
Bad Guys don't always wear Masks
Be Alert
Be a Human Firewall
Be a Human Firewall- Always Follow Policy
Break Up With Your Password
Buckle Up
Can you Spot a Social Engineer?
Changed your Password?
Confidential Documents
Confused By our Security Policies?
Confused about policy?
Critical Assets In Your Hands
Ctrl+Alt+Delete
Cyber Security in the Workplace
Data Protection Life Cycle
Decorate Your Devices
Definition: Click Happy
Definition: Phish Face
Did You Click A Phishing Link?
Did You Forget To Backup?
Did you follow Policy?
Digital Signature
Do You Know FERC/NERC?
Do You Know Malware? (Spider)
Do You Know Malware? (Warning)
Do You Know Our Policies?
Do You Know Your Security Responsibilities
Do You Think Before You Click?
Do You Think Before You Click? Ask!
Do you Download Apps?
Do you Trust the Delivery Man?
Do you know what you are Downloading?
Don't Leave Us In the Dark
Don't Turn Off the Lights
Don't Use your Dog's Name for a Password
Don't be Fooled(IRS)
Don't be Phishing Bait
Don't get hooked on Phishing Scams
Don’t Be Phishing Bait
Don’t Be a Puppet
Don’t Let Social Engineers In Your Head
EU-US Privacy Shield
Fishing Bait Click Bait
Forget Passwords
GDPR is Here
GLBA Pretexting Protection
GLBA Safeguards Rule
Got A Problem?
HIPAA Penalties
HIPAA is More Than Just Compliance
HIPAA isn't just for medical professionals
Have You Been Social Engineered Lately?
Health Care Requires Data Care
How Do You Know If Your ID Has Been Stolen
How Much Information Can Be Stolen From Your Laptop?
Human Firewall Details
I Know What I Am Downloading
I know what you did last Friday
IRS will never threaten with Law Enforcement
Incident Response Is All About Time
Incident Response LifeGuard
InfoSec Is Your Responsibility
InfoSec Is Your Responsibility World
Information Security Is All Of Us
Insider Threat Malicious or Unintentional
Isn't Their Business (Sunset)
Keep A Clean Desk!
Keep Calm Ask if you don't know
Keep Calm Change Your Password
Keep Calm Delete Phishing Emails
Keep Calm Follow Policy
Keep Calm Report Security Issues
Keep Calm Think Before You Click
Keep Secrets Secret
Keys to the Kingdom
Kiss your Data Goodbye
Laptop Security
Leaks Make Us Weak - Caller
Leaks Make Us Weak - Click
Leaks Make Us Weak - Password
Login Info Is Private
Messy Desk? Clean Up Your Act!
Mixed Up Password
Mobile Phones - Personal Data
My Password is Complex and Creative
NIST Cybersecurity Framework
Need Help with your Password?
Never Share Passwords
No Piggybacking Zone
No Thru Traffic
No information without Protection
Not All Insider Threats Are Obvious
PCI-DSS Cardholder Data
PCI-DSS POS Security
PW Smoothie
Password Expiration
Passwords Hard to Crack
Perils of the Internet
Protect Company Data (No personal data on company devices)
Protected Health Information
Protecting Data Across Borders
Protecting PHI
Ransomware - Just One Click
Ransomware Encrypts Your Data
Ransomware Is A Malicious Program
Recognize and Protect PII
Report Anything Unusual
Report Strange Incidents
Report Strange Things!
Report it Immediately
SHHH Keep Company Conversations Private
Secure Network
Secure Your Devices
Security Doesn't End With Software
Security Is Not a Vacuum
Security Leader Lighthouse
See Something Strange... Report It
Shred
Simple Steps to Staying Safe Online
Social Engineering
Social Engineering
Social Engineers Target People
Social Media
Something Out of the Ordinary
Stop Think Connect
Stop and Shred
Strong Passwords (Woman)
Tax Season Checklist
Tax Season got you Flustered?
The Cloud is Someone Else's Computer
The Universe is Expanding
These Keys Lock Your Computer
They Don't Wear Name Tags
Tips To Avoid Ransomware
Today's Predictions for Tomorrow's Internet
Together We Are Human Firewalls
Transferring Data Across Borders
Treat Passwords Like Your Underpants
Treat Your Password Like A Toothbrush Photographic
Treat Your Password Like Underwear
Treat Your Passwords Like Your Toothbrush - Silhouette
Triad Classic
Triad Many Lives
Triad SNL Passwords
Triad Security Domains
USB
Understanding Compliance
Unfamiliar Persons
Use Mobile Devices Safely
Watch Out for Tailgaters
Watch out for Shoulder Surfers
What is PII?
Whiteboard Security
Wifi Hot Spot
Work Phone lost or Stolen?
Wrong Way



Securable.io Videos

Also included in Training Access Level III (Diamond)

FISMA- Federal Information Security Management Act
Intro to Phishing
LinkedIn Security
Monitoring Facebook Services
Protect Your Kids Online
Public WIFI Safety
Ransomware Attacks
Traveling Abroad
Twitter Security
USB Safety



AwareGO Videos

Also included in Training Access Level III (Diamond)

CEO Scam
Chain Mail
Clean Desk
Dumpster Diving
Free WiFi
Handling Confidential Material
Home WiFi
HTTPS
Keylogger
Malicious Attachments
Password Handling
Passwords
Phishing
Pop Ups
Printouts
Removable Media
Shoulder Surfing
Social Engineering
Software Installs
Spear Phishing
Spyware
Tailgating
Think Twice
USB Key Drop



Popcorn Training

Also included in Training Access Level III (Diamond)

Something Phishy Series Videos & Quiz (Animated)
Something Phishy Introduction
Mobile Mayhem (mobile threats)
Pass the Password (passwords, social engineering)
Breaking the Barrier (physical, clean desk)
Phishous Malicious (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)


Cyber Heroes Series Videos & Quiz (Live Action)
Cyber Heroes Introduction
Don't take the bait (spear-phishing, social engineering, vishing)
Mobile Mayhem (mobile threats)
Pass the Password (pass word, social engineering)
Internet Threats (Internet use)
Dicey Devicey (BYOD Security)
Freaky Leaky (DLP)
Cloudy with a chance of Phish (Cloud Apps)
Social Media Fever (Social Network Security)


Security Moment Short Clip Videos & Quiz (Motion Graphic)
The Big Phish
Social Engineering
Ransomware
Spot the fake attachment
Spot the fake link
Privileged user access management (PAM)
Hacking Emotions
Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
Secure Transactions and Secure Deployments
Authentication and Authorization
Data Security
Injection Attacks and How to Avoid Them
Introduction to Web Application Security
Secure Session Management

Compliance Series (Animated)
PCI DSS for Merchants
PCI DSS for Corporate Office
PCI DSS for Retail Stores
SupaPOPI (RSA)
Consumer Protection Act (RSA)
Treating Customer Fairly (RSA)
Conflict of interest policy
Business Continuity / Business Resilience


Privacy Series Videos and Quiz (Live Action)
Personal Information–Currency of the 21st Century
Identity Theft–Protect your Personal Information
Privacy Principles–Handling Personal Information at Work
Protecting Personal Information–Security & Safeguards
General Data Protection Regulation (GDPR)–User Rights
Building Secure Software Series
Ep 1 - Very Early and Often
Cyber Essentials Series
Information Security 101
Cyber Heroes Series
Cloudy with a Chance of Phish
Dicey Devicey
Don't Take the Bait
Freaky Leaky
Internet Threats
Mobile Mayhem
Pass the Password
Social Media Fever

Security Moments Series
Hacking Emotions
Privileged User Access Management
Ransomware
Social Engineering 101
Spot the Bad Attachment
Spot the Bad Link
The Big Phish
Something Phishy Series
Breaking the Barrier
Cloudy With A Chance of Phish
Dicey Devicey
Freaky Leaky
Mobile Mayhem
Pass The Password
Phishious Malicious
Social Media Fever
Something Phishy

Privacy Series
GDPR
Identity Theft
Personal Information
Privacy Principles
Protecting Personal Information



ThinkHR Training Modules

Also included in Training Access Level III (Diamond)

A Manager's Guide to Discipline and Documentation
A Manager's Guide to Diversity, Inclusion and Accommodation
Active Shooter
Bullying and Hazing on Campus
Bullying and Violence in the Workplace
Campus Security Obligations Under Federal Law
EEO and Lawful Hiring
FERPA for Higher Education
FMLA Leave and More: An Overview of Legally Protected Leave
HIPAA - Privacy Essentials
HIPAA - Privacy Rules for Business Associates
HIPAA - Security Rules for Business Associates
HIPAA for Non-Medical Employees
Optimizing Your Work/Life Balance: Maintaining Your Life Balance
Optimizing Your Work/Life Balance: Taking Control of Your Stress
Pandemic Flu Awareness
Preventing Harassment in the Global Workplace - Employee Edition
Preventing Harassment in the Global Workplace - Manager Edition
Promoting a Substance-Free Workplace
Rightful Employment Termination
Sexual Harassment Prevention for Employees
Title IX for Higher Education
Wage and Hour Awareness for Managers
Workplace Harassment Prevention for Employees (Title VII)
Workplace Harassment Prevention for Managers - Multi-State Edition, Version 3.0
Workplace Management: Employment Laws and Regulations



exploqii Videos

Also included in Training Access Level III (Diamond)

Anti Trust 1 - Basic Regulations & Risks
Basic Rules of Secure Communication
Bluetooth & WiFi
Business Partner Compliance
CEO Fraud - Fake President
Clean Desk Policy
Cloud Services
Code of Conduct
Compliance Checklist
Compliance Management System
Conflict of Interest
Corruption
Crisis Management
Data Protection
Disinformation
EU GDPR
Export Control
Fairness & Respect in the Workplace
Gifts & Hospitality
IT Security in the Workplace
Identity Theft
Industrial Espionage
Information Classification
Information Security @ Mobile Devices
Information Security @ Remote Workplaces
Information Security @ Social Media
Insider Threat
Internal Investigations
Know-How Security
Money Laundering
Payment Fraud
Phishing Attacks on Companies
Phone Scam
Price Rigging
Proxy Servers & Data Privacy
Ransomware Micro-module
Secure Passwords
Security-Oriented Personnel Selection
Sexual Harassment
Social Engineering Micro-module
Social Media Guidelines
Threat Management
Travel Security
USB Attacks
Visitor Management
4Whistleblower



Canada Privacy Training Modules

Also included in Training Access Level III (Diamond)

Canadian Private Sector Privacy
 



Twist & Shout Video Modules

Also included in Training Access Level III (Diamond)

Restricted Intelligence Series
Season 1

Episode 1:The Test (passwords and passes)
Episode 2: Browsing (safe surfing)
Episode 3: A Cry for Help (email hacking and phishing)
Episode 4: The Journey (portable storage devices)
Episode 5: The Leak (beware what you share
Episode 6: The Lesson (mobile devices)
Restricted Intelligence Privacy Edition
Season 2

Episode 1: Nothing To Do With Me (What Is PI?)
Episode 2: Nobody Reads That Stuff (Privacy by Design)
Episode 3: Once More Unto the Breach (Retention & Disposal)
Episode 4: The Heart of the Matter (Purpose & Minimisation)
Episode 5: Mr. Cellophane (Transparency)
Episode 6: Partners (Third Party Partners)
Bonus: GDPR Intro (GDPR is Coming

 

 

KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 700+ interactive modules, videos, games, posters and newsletters.

Get Started

 


Get the latest about social engineering

Subscribe to CyberheistNews