KnowBe4’s new game-changing partnership with The Security Awareness Company allows you to significantly better manage the ongoing problem of social engineering. We can now offer you the best-in-class phishing platform combined with the world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

To easily deliver this new content library to customers, KnowBe4 has launched a new ‘Module Store’. Customers will be able to use the ModStore to search, browse and preview this new content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

We offer three Training Access Levels: I, II, and Unlimited depending on your subscription level.

Kevin Mitnick Security Awareness Training

Included in Training Access Level I

This is a high quality, 45-minute web-based interactive training using common traps, live demonstration videos, short tests and the new scenario-based Danger Zone exercise. Kevin Mitnick Security Awareness Training specializes in making sure employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering, and are able to apply this knowledge in their day-to-day job. The training is split in 4 modules that an employee can do over time. This module is available in English, Spanish, German, and British.

This 25-minute module is a shorter version of the full 45-minute training session. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, with an interactive test at the end, as well as a fresh videos.

This 15-minute module is an advanced, condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and Advanced Persistent Threats with an interactive “Red Flags” phishing test at the end, including email best practices. This module is now available in 26 languages.

KnowBe4 Training Modules

Also included in Training Access Level II 

Our new KnowBe4 Security Awareness Training is 30 minutes long. It has the Your Role section from our 45 min. course. It also contains the shortened Red Flags section and a new "Common Threats" section that covers the Fake Excel/CEO fraud threat as well as ransomware, and has a 10-question assessment at the end.

In this 10-minute module, employees are quickly brought up to speed to inoculate them against what the FBI calls "Business Email Compromise" and what is commonly known as CEO Fraud. Concepts like social engineering, email spoofing, and the two ways that CEO Fraud is being perpetrated are covered. There is a short video with a live demo of an infected Excel file, and a short quiz to test understanding at the end. Downloadable PDF Resources: Social Engineering Red Flags, and Security Awareness: Best Practices.

This course takes an employee through the basics of what ransomware is, how it came to be, and what the risks of ransomware are. It has a lot of the information of the immensely popular Ransomware Hostage Rescue Manual that KnowBe4 publishes for free. It's 25 minutes long and has a 10-question assessment at the end that needs to be passed with an 80% score.

Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

This 30-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

This 15-minute module covers the rules of how to create and use strong passwords in both an office environment and at the house. Employees learn the 10 important rules for safer passwords, minimum password length, how to remember long passwords, get trained in best practices like using pass phrases and how to use a different password for every website.

This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unlimited Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

This 10-minute module takes employees through the basics of safe web browsing. They will learn how to avoid common dangers and the "do's and "don'ts" of safe web browsing. This module is set up to be fully interactive and could be presented as a quiz to take and "see how much you know".

This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

KnowBe4 Training Micro-modules

Also included in Training Access Level II  (and each around 5 minutes)

This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.

Security Awareness Company Content Library

Also included in Training Access: Unlimited

Data Classification ILM
Human Firewall ILM
Understanding and Protecting PII ILM
Computer Security & Data Protection - ILM
Call Center & Help Desk Awareness - ILM
Phishing Andrew's Inbox - ILM
Ransomware ILM
Data Classification
Human Firewall
Identification & User Authentication
Mobile Security Basics
Non-Technical Security
Password Basics
Secure Online Behavior
Security Triads
Social Engineering
The Top 10 Security Awareness Fundamentals
Call Center & Help Desk Awareness
Phishing Awareness
Understanding and Protecting PII
Top Ten Security Awareness Issues for New Hires
Computer Security & Data Protection
Executive Awareness and Leadership Module
Workplace Violence and Safety
Active Shooter & Physical Incident Response
FERPA (Education)
FFIEC (Financial Compliance)
GLBA (Finance)
HIPAA (Healthcare)
PCI-DSS (Retail Compliance)
Sarbanes-Oxley (Accounting)
Workforce Safety & Security Awareness
A Day of Bad Passwords
Back Up
Being a Human Firewall
Beyond Phishing
Cyber Crime Starts with You
Data Breaches and You
Data Classification Overview
Data Loss and Insider
Dumpster Diving
Email Spoofing
Examples of Insider Jobs
Examples of Phishing
Free Wifi
Human Firewall and Data Classification
Introduction to the Cloud
Making Strong Passwords
Mobile Cyber Crime
Mobile Security Overview
Mouse Overs
Non Technical Security Skills
Password Security
Phishing Contest Winner
Phishing From Facebook
Phishing From Netflix
Phishing From Your Bank
Phishing in Action
Physical Security Threats
PII and Compliance
Pretexting 1 (Fake Fraud Protection)
Pretexting 2 (Fake Help Desk)
Pretexting: Fake Executive to I.T.
Pretexting: From Fake Credit Card Company
Pretexting: Fake Employee to Help Desk
Pretexting From Fake I.T.
Privacy Vs. Security
Proper Hard Drive Disposal
Safe Surfing 1: HTTP vs HTTPS & Online Authentication
Security Myths Busted
Definition of Social Engineering
Social Media Data Mining
The CIA Triad
The Domains Triad
The Many Lives Triad
Types of Social Engineering
What Does a Social Engineer Look Like?
What is I.D. Theft
What is PII?
Why Security Awareness?
Low-Tech Hacks to Steal Your ID
The Many Lives of PII
Social Networking Do's and Don’t's
Social Media
Understanding Encryption
10 Ways to Avoid Phishing Scams
10 Ways to Keep PII Private
10 Ways to Stay Safe on Social Media
Incident Response 101
Your Security Awareness Journey
NonTech and Phys security tips and tricks
Dangers of USBs
Catching Malware
Hide Your Passwords
Introduction to Ransomware
Data Breach Overview
The Human Firewall's Top Concerns in All Three Domains
Security Awareness 101 Trivia
Security Awareness 102 Trivia
Human Firewall Trivia
Social Engineering Trivia
Password Trivia
Phishing Awareness Trivia
Security Awareness 101 Big Business
Security Awareness 102 Big Business Game
Human Firewall Big Business
Phishing Awareness Big Business
Social Engineering Big Business Game
Password Big Business Game
Security Awareness 101 Alpine Skiing
Security Awareness 102 Alpine Skiing
Human Firewall Alpine Skiing
Phishing Awareness Alpine Skiing
Social Engineering Alpine Skiing Game
Password Alpine Skiing Game
Social Engineering & Phishing Millionaire Challenge
SA101 Casino Challenge
SA101 Card Stack
Security Awareness 101 World Race
Security Awareness 102 World Race
Human Firewall World Race
Phishing Awareness World Race
Social Engineering World Race Game
Password World Race Game
Security Awareness 101 Balloon Pop
Security Awareness 102 Balloon Pop Game
Human Firewall Balloon Pop
Phishing Awareness Balloon Pop
Social Engineering Balloon Pop Game
Password Balloon Pop Game
Leopard Password
Lying King
Buckle Up
Confused By Policies
Did You Click Phishing
Did You Follow Policy
Did You Forget Backup
Do You Know Our Policies
Do You Know Your Security Responsibilities
Don’t Be Phishing Bait
Downloading Apps
Facebook Sharing
How Do You Know If Your ID Has Been Stolen
Human Firewall
Shed Shred Business Man
Shed Shred Shredder
Lost Laptops
Lost Mobile Devices
Messy Desk Clean Up Your Act
Messy Desk Are Security Risks
Never Share Passwords
Password Help
Treat Your Password Like A Toothbrush
Perils Of Internet
Report Anything Unusual
Report Strange Incidents
Safe Surfing
Secure Network
Shoulder Surfers
Strong Passwords Dude
Strong Passwords Lady
Think Before You Click
Treat Your Password Like Underwear
Types Of Malware
What Can You Say On Social Media
What Is The Cloud Anyway
What Should You Do If Lose Phone
What Should You Do If You GetP hished
When Was the Last Time You Changed Your Password
PCI-DSS POS Security
Social Engineering
Human Firewall With Tips
Malware Spider Guy
Malware Red Screen
What is PII
Recognize Protect PII
Stop Think Connect
Keep Secrets Secret
Forget Passwords
Lock Your Workstation
See Something Strange Report It
SHH Keep Company Convorsations Private
Login Info Is Private
Ransomware Encrypts Your Data
Ransomware Just One Click
Ransomware Is A Malicious Program
Tips To Avoid Ransomware
Incident Response All About Time
Don’t Be a Puppet
Together We Are Human Firewalls
Something Out of Ordinary
Don’t Let Social Engineers In Your Head
Got A Problem
Unfamiliar Persons Badge
Dogs Name Password
Information Security Is All Of Us
Be Alert
No Thru Traffic
Wrong Way
Do You Think Before Click City
Have You Been Social Engineered Lately
InfoSec Is Your Responsbility
InfoSec Is Your Responsibility World
Keep Clean Desk
Mobile Devices Personal Data
Social Engineers Target People
Someone Elses Computer
Treat Password Like Underwear
Use Mobile Devices Safely
PCI-DSS Cardholder Data
Do You Think Before You Click Hands
HIPAA Penalties
Always Follow Policy
Always Stay In Touch
What is a Man In The Middle?
Phishing Scam
Social Engineering
Social Media
Wifi Hot Spot
Digital Signature
Anatomy Of A Phishing Email
Human Firewall Words
Protecting PHI
Triad Classic
Triad Many Lives
Triad SNL Passwords
Triad Domains
Keep Calm Think Before You Click
Keep Calm Change Your Password
Keep Calm Report Security Incidents
Keep Calm Ask
Keep Calm Follow Policy
Keep Calm Delete Phishing Emails


Want to see all our great security awareness training content?

It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 300+ interactive modules, videos, games, posters and newsletters.

Get Started



Related Pages: Social EngineeringKevin Mitnick

Get the latest about social engineering

Subscribe to CyberheistNews