Complete Learning Ecosystem
Cybercriminals target end-users. Ongoing cybersecurity education and training for employees is a must for every business to remain secure.

Amazing Course Catalog
Over 100 live-action, short videos that highlight a single topic within the modules. Followed by quizzes, we make training both effective and memorable.
Password Handling
Think Twice
Unattended Computer
Tailgating
Data Leaks
Same Password
Other Subjects Include:
- Tailgating
- Phishing
- HTTPS
- Spear Phishing
- Think Twice
- Clean Desk
- Passwords
- Pop ups
- Removable Media
- Password Handling
- Free WiFi
- Malicious Attachments
- Printouts
- Spyware
- Handling Confidential Material
- Shoulder Surfing
- USB Key Drop
- Home WiFi
- Software installs
- Chain Mail
- Dumpster Diving
- Valuables in the car
- CEO Scam
- Key logger
- Ransomware
- Data leaks
- Vishing
- Phonelocking
- Unattended computer
- Same passwords
- Think before you post
- Privacy screens
- Correct Links
- Social Engineering
- Sharing Information
- Multi factor auth
- Unnecessary Data
- Mobile listening
- Unknown network
- Auto-fill
- Network printers
- Check Account Number
- Update your software
- Doublecheck