• <s id="xh950"><b id="xh950"><samp id="xh950"></samp></b></s>
  • <button id="xh950"></button>
  • <li id="xh950"></li>

    <th id="xh950"><source id="xh950"></source></th>

    KnowBe4’s game-changing partnerships with The Security Awareness Company, Popcorn Training, ThinkHR, exploqii, Canada Privacy Training, Twist & Shout, TeachPrivacy, Syntrio, and El Pescador allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library 1000+ security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

    To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

    We offer three Training Access Levels: I, II, and III depending on your subscription level. Because our library is constantly being updated, if you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library! 

    Kevin Mitnick Security Awareness Training

    Included in Training Access Level I (Silver)

    This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks. 

    This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

    This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 26 language versions.

    KnowBe4 Cybersecurity Awareness Posters

    Included in Training Access Level I (Silver)

    2019 Common Threats
    2019 Social Engineering Red Flags
    Captain Awareness
    Captain Awareness: Conquering Internet Safety for Kids
    Captain Awareness: Securing Your Mobile Devices
    Risks of Social Media Sharing
    All Your Data Are Belong To Us
    Bad Rabbit: Think Before You Click
    Be An Email Superhero
    Burning Man
    CEO Fraud
    Don't Let Your Strings Get Pulled
    Don’t Click on Me
    Email Subject Line Red Flags
    Give Us the Bitcoin
    It only takes one
    Jaws: Don’t Be a Victim
    Keep Calm and Don’t Click
    Loose Clicks Sink Ships
    Loose Lips Sink Ships
    Loose Tweets Sink Fleets
    Phishin’ Is Easy
    Poster: 2019 Your Role: Internet Security and You
    Poster: Captain Awareness: Triumph over the Reuse of Passwords
    Ransomware Apocalypse is Calling
    Ransomware Has No Borders
    Ransomware Invaders
    Resist the USB Attack
    Stop Phishing Attacks Dead in Their Tracks
    Stop, Look, Think
    Stop, Look, Think Signs
    The Clickers
    There's Something Phishy in Your Inbox
    Think Before You Click
    Think Before You Click Boy
    Think Before You Click Brain
    Think Before You Click Eye Chart
    Think Before You Click Monster
    Think Before You Click Pop-Up
    This is My Ransomware Killing Poster
    Tron Ransomware
    Uncle Sam: I Want You to Stop Clicking
    Why Security Awareness Training?
    You Can’t Go Back

    KnowBe4 Training Modules

    Also included in Training Access Level II (Gold & Platinum)

    This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

    This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

    In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

    In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

    In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

    In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

    This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

    This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

    In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

    This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

    This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

    This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

    This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

    Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

    In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

    This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

    In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.

    Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality, 9-minute course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

    KnowBe4 Training Micro-modules

    Also included in Training Access Level II (Gold & Platinum)

    CEO Fraud
    Decision-Maker Email Threats
    Mobile Device Security
    Ransomware and Bitcoin
    Remote and Travel WiFi Dangers
    Safe Web Browsing With Corporate Devices
    Secure Destruction of Sensitive Information
    Securely Working From Home
    Social Engineering the Executive
    Social Media Precautions for Executives

    Be a Human Firewall
    Conquer Internet Safety for Kids
    Securing Your Mobile Devices
    Triumph over the Reuse of Passwords
    Understanding GDPR
    Securely Working from Home
    Be Vigilant with USB Drives
    Outwit Dumpster Divers
    Travel Securely
    Handling Printouts
    Understanding Data Breaches
    Safeguard Social Media
    Protect Your Web Browser
    Guardians of Sensitive Information
    Vanquish Malicious Attachments
    Outwit Social Engineering
    Conquer Open WiFi
    Foil Phishing

    This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

    This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

    This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

    This 90 second video shows two of the worst things you can do with your password.

    This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

    This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

    This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

    The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

    This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

    This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

    This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

    This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

    This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

    This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.

    The Security Awareness Company Content Library

    Also included in Training Access Level III (Diamond)

    Active Shooter & Physical Incident Response
    Call Center & Help Desk Awareness
    Computer Security & Data Protection
    Cross Border Data Protection
    Data Classification
    Developing an Incident Response Plan
    Empowering Your Employees for Better Security
    Executive Awareness Leadership
    How to be a Human Firewall
    Identification & User Authentication
    Identity Theft and Data Breaches
    Insider Threats for Executives and Managers
    Mobile Security Basics
    Non-technical Security Basics
    OWASP Top 10
    PCI DSS Retail Store Experience
    Password Basics
    Phishing Andrew's Inbox
    Phishing Awareness
    Phishing Fundamentals
    Privacy Basics
    Secure Online Behavior
    Security Awareness Fundamentals
    Security Triads
    Social Engineering
    Social Engineering & Phishing for Executives
    Social Engineering Basics
    The Top 10 Security Awareness Fundamentals Test Out
    Top 10 Security Awareness Fundamentals for New Hires
    Understanding and Mitigating Security Risks for Executives
    Understanding and Protecting PII
    Workforce Safety & Security Awareness
    Workplace Violence and Safety
    FERC/NERC for End Users
    FERC/NERC for Managers and Executives
    FERPA (Education)
    FFIEC (Financial Compliance)
    GLBA (Finance)
    HIPAA (Healthcare)
    PCI-DSS (Retail Compliance)
    Sarbanes-Oxley (Accounting)
    13 Habits of Savvy SM Users
    5 Examples of Social Engineering
    5 Steps to Prevent ID Theft
    5 Steps to Prevent ID Theft
    5 Traits of a Security Aware Employee
    7 Tips for Travelers
    A Real Life Spear Phishing Attack
    Access Controls
    Advanced Persistent Threats
    April 2018 Security Awareness Newsletter
    Are Your Things Part of a Botnet?
    August 2018 Security Awareness Newsletter
    Back to School Security Checklist
    Bad Passwords
    Bank Secrecy Act
    Being a Human Firewall in All Three Domains
    China's Cybersecurity Law
    Click With Care
    Cross Border Data Protection Overview
    DIY Home Internet Security Policy
    Data Breaches and You
    Data Classification at Home
    Data Classification at Work
    December 2017 Security Awareness Newsletter
    EU GDPR: The Basics
    February 2018 Security Awareness Newsletter
    Field Guide to Phishing Emails
    Following Policy and Reporting Incidents
    Forms of Social Engineering
    Hey! That???s my pie! Opps, I mean PII
    How VPNs Work
    How to Identify a Social Engineering Attack
    In Case of Emergency
    Incident Response in Action
    Incident Response in All Three Domains
    IoT Gone Rogue
    January 2018 Security Awareness Newsletter
    July 2018 Security Awareness Newsletter
    June 2018 Security Awareness Newsletter
    Keeping Kids Safe on Social Media + 10 Tips for Parents
    LinkedIn Scams & It’s a Spammer???s World
    Malware on the go!
    March 2018 Security Awareness Newsletter
    May 2018 Security Awareness Newsletter
    Mined Your Data
    Non-technical Security in ALL THREE DOMAINS
    November 2017 Security Awareness Newsletter
    October 2017 Security Awareness Newsletter
    PHI stands for Protected Health Information
    PII: To Prominent Constant of Information Security
    Passphrases: The Smart Alternative
    Phishing In Action
    Privacy vs. Security
    Proven Password Policies
    Ransomware Security One Sheet
    Redefining What it Means to be a Human Firewall
    Regulations Near and Far
    Respecting Privileged Access
    Securing Mobile Devices
    Securing Smart Devices
    Security Incidents and Where to Report Them
    September 2017 Security Awareness News
    Shipshape SM Behavior
    Simple Steps to Online Safety
    Smishing: Phishing Gone Mobile
    Spam Emails vs Phishing Emails
    The CIA Triad: Security to the Power of Three
    The Cloud Is Not Yours
    The Domains Triad: Mind, Body, and Soul
    The Future of Identification and Authentication
    The Horrors of Malware
    The Importance of Data Classification
    The Internet of Things and the Concerns of Convenience
    The Journey to Being Anonymous on the Internet
    The Many Lives Triad
    The Many Lives of PII
    The Physical Side of Security Awareness
    The Rule of Three
    The Three Domains of Social Engineering
    The Three Lives of Incident Response
    The Underground Marketplace and Common Cyber Attacks
    Tis the Season..... for Scams
    Top 10 Security Practices for Work
    Top 10 Ways to Stay Safe at Home
    Top 10 Ways to Stay Secure on the Go
    Understanding BEC
    Understanding Compliance Standards
    Understanding Insider Threats
    Understanding Insider Threats & Offboarding
    Understanding the Attackers
    Whale and Spear Phishing
    What is A Human Firewall?
    What is NIST Cybersecurity Framework?
    What is Privacy Shield?
    What’s the WiFi Password?
    Where Do You Hide Your Passwords?
    Where in the World is Ransomware
    Where's the Remote
    Who are Cybercriminals
    Why Does Compliance Matter
    You Need a PW Manager
    10 ways to avoid phishing scams
    10 ways to keep PII private
    10 ways to stay safe on social media
    A Day of Bad Passwords
    Being a Human Firewall
    Beyond Phishing
    Catching malware
    Cyber Crime Starts with You
    Dangers of USBs
    Data Breach Overview
    Data Breaches and You
    Data Classification Overview
    Data Loss and Insiders
    Definition of Social Engineering
    Dumpster Diving
    Email Spoofing
    Executives Mitigating Insider Threats
    Hide your passwords
    Human Firewall and Data Classification
    Incident Response 101
    Introduction to Ransomware
    Introduction to the cloud
    Low-Tech Hacks to Steal Your ID
    Mouse Overs
    Non-Technical Security Skills
    Non-Technical and Physical security tips and tricks
    PII and Compliance
    Phishing Contest Winner
    Phishing From Facebook
    Phishing From Netflix
    Phishing From Your Bank
    Phishing in Action
    Physical Security Threats
    Pretexting: (Fake Fraud Protection)
    Pretexting: (Fake Help Desk)
    Pretexting: Fake Employee to Help Desk
    Pretexting: Fake Executive to I.T.
    Pretexting: From Fake Credit Card Company
    Pretexting: From Fake I.T.
    Privacy Vs. Security
    Protecting Data
    Road Warriors
    Safe Surfing 1 - HTTP vs HTTPS & Online Authentication
    Security Myths Busted
    Social Media
    Social Media Data Mining
    Social Networking Do's and Don’ts
    The CIA Triad
    The Domains Triad
    The Human Firewall's Top Concerns in All Three Domains
    The Many Lives Triad
    The Many Lives of PII
    Understanding Encryption
    Welcome to Security Awareness Training
    Welcome to Security Awareness Training - Animated
    What Are APTs
    What Does a Social Engineer Look Like?
    What is I.D. Theft
    What is PII?
    Why Executives Need Awareness Training
    Why Security Awareness?
    Workplace Physical Awareness
    Your Security Awareness Journey
    End of the Day Security Challenge
    Human Firewall Big Business
    Human Firewall Trivia
    Human Firewall World Race
    Password Big Business Game
    Password World Race Game
    Phishing Awareness Big Business
    Phishing Awareness Trivia
    Phishing Awareness World Race
    Security Awareness World Race
    Security Awareness Big Business
    Security Awareness Card Stack
    Security Awareness Casino Challenge
    Security Awareness Trivia
    Social Engineering & Phishing Millionaire Challenge
    Social Engineering Big Business Game
    Social Engineering Trivia
    Social Engineering World Race Game
    Anatomy Of A Phishing Email
    Are You The Weakest Link?
    Back Up
    Bad Guys don't always wear Masks
    Be Alert
    Be a Human Firewall
    Be a Human Firewall- Always Follow Policy
    Break Up With Your Password
    Buckle Up
    Can you Spot a Social Engineer?
    Changed your Password?
    Confidential Documents
    Confused By our Security Policies?
    Confused about policy?
    Critical Assets In Your Hands
    Cyber Security in the Workplace
    Data Protection Life Cycle
    Decorate Your Devices
    Definition: Click Happy
    Definition: Phish Face
    Did You Click A Phishing Link?
    Did You Forget To Backup?
    Did you follow Policy?
    Digital Signature
    Do You Know FERC/NERC?
    Do You Know Malware? (Spider)
    Do You Know Malware? (Warning)
    Do You Know Our Policies?
    Do You Know Your Security Responsibilities
    Do You Think Before You Click?
    Do You Think Before You Click? Ask!
    Do you Download Apps?
    Do you Trust the Delivery Man?
    Do you know what you are Downloading?
    Don't Leave Us In the Dark
    Don't Turn Off the Lights
    Don't Use your Dog's Name for a Password
    Don't be Fooled(IRS)
    Don't be Phishing Bait
    Don't get hooked on Phishing Scams
    Don’t Be Phishing Bait
    Don’t Be a Puppet
    Don’t Let Social Engineers In Your Head
    EU-US Privacy Shield
    Fishing Bait Click Bait
    Forget Passwords
    GDPR is Here
    GLBA Pretexting Protection
    GLBA Safeguards Rule
    Got A Problem?
    HIPAA Penalties
    HIPAA is More Than Just Compliance
    HIPAA isn't just for medical professionals
    Have You Been Social Engineered Lately?
    Health Care Requires Data Care
    How Do You Know If Your ID Has Been Stolen
    How Much Information Can Be Stolen From Your Laptop?
    Human Firewall Details
    I Know What I Am Downloading
    I know what you did last Friday
    IRS will never threaten with Law Enforcement
    Incident Response Is All About Time
    Incident Response LifeGuard
    InfoSec Is Your Responsibility
    InfoSec Is Your Responsibility World
    Information Security Is All Of Us
    Insider Threat Malicious or Unintentional
    Isn't Their Business (Sunset)
    Keep A Clean Desk!
    Keep Calm Ask if you don't know
    Keep Calm Change Your Password
    Keep Calm Delete Phishing Emails
    Keep Calm Follow Policy
    Keep Calm Report Security Issues
    Keep Calm Think Before You Click
    Keep Secrets Secret
    Keys to the Kingdom
    Kiss your Data Goodbye
    Laptop Security
    Leaks Make Us Weak - Caller
    Leaks Make Us Weak - Click
    Leaks Make Us Weak - Password
    Login Info Is Private
    Messy Desk? Clean Up Your Act!
    Mixed Up Password
    Mobile Phones - Personal Data
    My Password is Complex and Creative
    NIST Cybersecurity Framework
    Need Help with your Password?
    Never Share Passwords
    No Piggybacking Zone
    No Thru Traffic
    No information without Protection
    Not All Insider Threats Are Obvious
    PCI-DSS Cardholder Data
    PCI-DSS POS Security
    PW Smoothie
    Password Expiration
    Passwords Hard to Crack
    Perils of the Internet
    Protect Company Data (No personal data on company devices)
    Protected Health Information
    Protecting Data Across Borders
    Protecting PHI
    Ransomware - Just One Click
    Ransomware Encrypts Your Data
    Ransomware Is A Malicious Program
    Recognize and Protect PII
    Report Anything Unusual
    Report Strange Incidents
    Report Strange Things!
    Report it Immediately
    SHHH Keep Company Conversations Private
    Secure Network
    Secure Your Devices
    Security Doesn't End With Software
    Security Is Not a Vacuum
    Security Leader Lighthouse
    See Something Strange... Report It
    Simple Steps to Staying Safe Online
    Social Engineering
    Social Engineering
    Social Engineers Target People
    Social Media
    Something Out of the Ordinary
    Stop Think Connect
    Stop and Shred
    Strong Passwords (Woman)
    Tax Season Checklist
    Tax Season got you Flustered?
    The Cloud is Someone Else's Computer
    The Universe is Expanding
    These Keys Lock Your Computer
    They Don't Wear Name Tags
    Tips To Avoid Ransomware
    Today's Predictions for Tomorrow's Internet
    Together We Are Human Firewalls
    Transferring Data Across Borders
    Treat Passwords Like Your Underpants
    Treat Your Password Like A Toothbrush Photographic
    Treat Your Password Like Underwear
    Treat Your Passwords Like Your Toothbrush - Silhouette
    Triad Classic
    Triad Many Lives
    Triad SNL Passwords
    Triad Security Domains
    Understanding Compliance
    Unfamiliar Persons
    Use Mobile Devices Safely
    Watch Out for Tailgaters
    Watch out for Shoulder Surfers
    What is PII?
    Whiteboard Security
    Wifi Hot Spot
    Work Phone lost or Stolen?
    Wrong Way

    Popcorn Training

    Also included in Training Access Level III (Diamond)

    Something Phishy Series Videos & Quiz (Animated)
    Something Phishy Introduction
    Mobile Mayhem (mobile threats)
    Pass the Password (passwords, social engineering)
    Breaking the Barrier (physical, clean desk)
    Phishous Malicious (Internet use)
    Dicey Devicey (BYOD Security)
    Freaky Leaky (DLP)
    Cloudy with a chance of Phish (Cloud Apps)
    Social Media Fever (Social Network Security)

    Cyber Heroes Series Videos & Quiz (Live Action)
    Cyber Heroes Introduction
    Don't take the bait (spear phishing, social engineering, vishing)
    Mobile Mayhem (mobile threats)
    Pass the Password (pass word, social engineering)
    Internet Threats (Internet use)
    Dicey Devicey (BYOD Security)
    Freaky Leaky (DLP)
    Cloudy with a chance of Phish (Cloud Apps)
    Social Media Fever (Social Network Security)

    Security Moment Short Clip Videos & Quiz (Motion Graphic)
    The Big Phish
    Social Engineering
    Spot the fake attachment
    Spot the fake link
    Privileged user access management (PAM)
    Hacking Emotions
    Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
    Secure Transactions and Secure Deployments
    Authentication and Authorization
    Data Security
    Injection Attacks and How to Avoid Them
    Introduction to Web Application Security
    Secure Session Management

    Compliance Series (Animated)
    PCI DSS for Merchants
    PCI DSS for Corporate Office
    PCI DSS for Retail Stores
    SupaPOPI (RSA)
    Consumer Protection Act (RSA)
    Treating Customer Fairly (RSA)
    Conflict of interest policy
    Business Continuity / Business Resilience

    Privacy Series Videos and Quiz (Live Action)
    Personal Information–Currency of the 21st Century
    Identity Theft–Protect your Personal Information
    Privacy Principles–Handling Personal Information at Work
    Protecting Personal Information–Security & Safeguards
    General Data Protection Regulation (GDPR)–User Rights

    Building Secure Software Series
    Ep 1 - Very Early and Often
    Ep 2 - Leverage Security Frameworks and Libraries
    Ep 3 - Secure Database Access

    Cyber Essentials Series
    Information Security 101

    Standups 4 Security Series: (Live Action)
    Cybercrime Promo
    A Goliath Hack
    Behind the Scam with Loyiso Madinga
    Open Secrets - A Password Exhibition
    Spear phishing - Catching the Big Phish
    Don't Trust Anybody - CEO Scam
    Social Media Oversharing
    The Dark Web Pop-up
    Cyber Heroes Series
    Cloudy with a Chance of Phish
    Dicey Devicey
    Don't Take the Bait
    Freaky Leaky
    Internet Threats
    Mobile Mayhem
    Pass the Password
    Social Media Fever

    Security Moments Series
    Hacking Emotions
    Privileged User Access Management
    Social Engineering 101
    Spot the Bad Attachment
    Spot the Bad Link
    The Big Phish
    Something Phishy Series
    Breaking the Barrier
    Cloudy With A Chance of Phish
    Dicey Devicey
    Freaky Leaky
    Mobile Mayhem
    Pass The Password
    Phishious Malicious
    Social Media Fever
    Something Phishy

    Privacy Series
    Identity Theft
    Personal Information
    Privacy Principles
    Protecting Personal Information

    exploqii Videos

    Also included in Training Access Level III (Diamond)

    Anti Trust 1 - Basic Regulations & Risks
    Basic Rules of Secure Communication
    Bluetooth & WiFi
    Business Partner Compliance
    CEO Fraud - Fake President
    Clean Desk Policy
    Cloud Services
    Code of Conduct
    Compliance Checklist
    Compliance Management System
    Conflict of Interest
    Crisis Management
    Data Protection
    Export Control
    Fairness & Respect in the Workplace
    Gifts & Hospitality
    IT Security in the Workplace
    Identity Theft
    Industrial Espionage
    Information Classification
    Information Security @ Mobile Devices
    Information Security @ Remote Workplaces
    Information Security @ Social Media
    Insider Threat
    Internal Investigations
    Know-How Security
    Money Laundering
    Payment Fraud
    Phishing Attacks on Companies
    Phone Scam
    Price Rigging
    Proxy Servers & Data Privacy
    Ransomware Micro-module
    Secure Passwords
    Security-Oriented Personnel Selection
    Sexual Harassment
    Social Engineering Micro-module
    Social Media Guidelines
    Threat Management
    Travel Security
    USB Attacks
    Visitor Management

    Canada Privacy Training Modules

    Also included in Training Access Level III (Diamond)

    Canadian Private Sector Privacy

    Twist & Shout Video Modules

    Also included in Training Access Level III (Diamond)

    Restricted Intelligence Series
    Season 1

    Episode 1 - The Test (passwords and passes)
    Episode 2 - Browsing (safe surfing)
    Episode 3 - A Cry for Help (email hacking and phishing)
    Episode 4 - The Journey (portable storage devices)
    Episode 5 - The Leak (beware what you share
    Episode 6 - The Lesson (mobile devices)

    Season 2

    Episode 1 - Impression Points (Travel)
    Episode 2 - What’s in a Name (Phishing)
    Episode 3 - Out of Sight, Out of Mind (Cloud Services)
    Episode 4 - Like A Stargate (BYOD)
    Episode 5 - It Was Nothing (Document Classification)
    Episode 6 - Nobody watches those things (Executive Behavior)
    Episode 7 - New Best Friend (Insider Threats)

    Season 3

    Episode 1 - Leave It To The Master (Social Engineering)
    Episode 2 - Nothing to Concern You (Document Disposal)
    Episode 3 - Ask the Expert (Social Media Phishing)
    Episode 4 - It's Come To My Attention (Homeworking)
    Episode 5 - Did You See That One? (Reporting Incidents)
    Episode 6 - I Know What You Did Last Weekend (App Permissions)

    Season 4

    Episode 1 - Everybody Loves Mia (Third Party Vendors)
    Episode 2 - Elementary (Social Media Safety)
    Episode 3 - One Bad Seed (Physical Access)
    Episode 4 - Just Breathe (Phishing)
    Episode 5 - Hostage Situation (Ransomware)
    Episode 6 - We Could Be Heroes (Public Wifi)

    Season 5

    Episode 1 - Nothing In Life Is Free (Freeware)
    Episode 2 - Besties (Insider Threat)
    Episode 3 - There He Blows (Whaling)
    Episode 4 - The Worst That Could Happen (Ransomware)
    Episode 5 - It's The Latest (Password Safety)
    Episode 6 - The Perfect Storm (Oversharing Social Media)

    Season 6

    Episode 1 - Out of the Shadows (Cloud Services)
    Episode 2 - All About Eve (Reporting Incidents)
    Episode 3 - Getting the Message (Document Classification)
    Episode 4 - Don't Say a Word (Ransomware)
    Episode 5 - Charity Case (Phishing)
    Episode 6 - False Witness (Identity Theft)
    Episode 7 - Bonus: Lionel's Music Video

    Restricted Intelligence Privacy Edition
    Season 1

    Episode 1 - Nothing To Do With Me (What Is PI?)
    Episode 2 - Nobody Reads That Stuff (Privacy by Design)
    Episode 3 - Once More Unto the Breach (Retention & Disposal)
    Episode 4 - The Heart of the Matter (Purpose & Minimisation)
    Episode 5 - Mr. Cellophane (Transparency)
    Episode 6 - Partners (Third Party Partners)
    Bonus: GDPR Intro (GDPR is Coming)

    Season 2

    Episode 1 - Get Off My Cloud (Privacy and The Cloud)
    Episode 2 - Permission To Speak (Access)
    Episode 3 - Hard To Say Goodbye (Legitimate Interest)
    Episode 4 - Existential Crisis (Data Accuracy)
    Episode 5 - Getting It Out There (Accountability)
    Episode 6 - Keep It Secret, Keep It Safe (Privacy and Security)

    Restricted Intelligence - HIPAA Edition Series
    Season 1

    Episode 1 - You'll Get A Kick Out Of This (Social Media Sharing)
    Episode 2 - Those Seconds Add Up (Unapproved Apps)
    Episode 3 - I Hate Surprises (Private Records)
    Episode 4 - A Delicate Dance (Passwords & Access)
    Episode 5 - Ransom Rumours (Ransomware)
    Episode 6 - What's The Worst That Can Happen (Phishing)

    Tuesdays with Bernie Series
    Season 1

    Episode 1 - New Beginnings (Appropriate Workplace Communication)
    Episode 2 - Left Behind (Disclosure of Non-Public Information)
    Episode 3 - The Fixer (Use of Local Agents)
    Episode 4 - Talking a Good Game (External Communications)
    Episode 5 - Sit Up and Take Notice (Anti-Corruption)
    Episode 6 - Smell Test (Counterparty Screening)

    Season 2

    Episode 1 - You Scratch My Back (Non-Public Information)
    Episode 2 - Like It Never Happened (HSE Reporting)
    Episode 3 - Seeing The Light (Export)
    Episode 4 - Eye Of The Storm (Business Continuity)
    Episode 5 - No Second Chances (Legal Holds)
    Episode 6 - The Hard Way (Code of Conduct)
    The Inside Man Series
    Season 1

    Episode 1 - The New Guy (Social Engineering)
    Episode 2 - Social Hour (Social Media)
    Episode 3 - On Our Side (Phishing Attacks)
    Episode 4 - Surprise (Document Disposal)
    Episode 5 - Takeaways (Clear Desktop Policy)
    Episode 6 - Masquerade (Cloud Services)
    Episode 7 - Buying Time (Passwords)
    Episode 8 - Taken (Ransomware)
    Episode 9 - Where The Wild Things Are (Travel)
    Episode 10 - Keep Your Friends Close (App security and permissions)
    Episode 11 - The Sound Of Trumpets (External Devices)
    Episode 12 - Checkmate (Insider Threats)

    Season 2

    Episode 1 - A Different Tune (Mobile Devices)
    Episode 2 - Crack Team (Need to Know)
    Episode 3 - It’s a Date (Mobile Devices Continued)
    Episode 4 - The Holy Grail (Internet of Things, Connected Devices)
    Episode 5 - Unlikely BedFellows (Phishing)
    Episode 6 - It’s Complicated (Multi-Factor Authentication/Phone-Phishing)
    Episode 7 - Table for Two (Passwords/Third-Party Apps)
    Episode 8 - The Guy Behind the Guy (External Devices and Physical Access)
    Episode 9 - Behind the Curtain (Social Engineering)
    Episode 10 - Showdown at the AI Corral Part 1 (Social Engineering Continued)
    Episode 11 - Showdown at the AI Corral Part 2 (Insider Threats)
    Episode 12 - A New Day (Internet of Things, Connected Devices)

    TeachPrivacy Training Modules

    Also included in Training Access Level III (Diamond)

    California Health Privacy
    Canadian Anti-Spam Legislation (CASL)
    Data Breach
    Data Disposal
    Data Retention
    FERPA (K-12)
    General Data Protection Regulation (GDPR)
    Global Privacy and Data Protection
    Secure Workspaces Game
    The Privacy Act for Federal Government Contractors

    Syntrio Training Modules

    Also included in Training Access Level III (Diamond)

    Avoiding Antitrust Violations
    Avoiding Conflicts of Interest
    Avoiding Insider Trading Risk
    Back Injury Prevention
    California Workplace Harassment Prevention for Employees
    California Workplace Harassment Prevention for Managers
    Connecticut Sexual Harassment for Managers
    Controlling Workplace Exposure to Bloodborne Pathogens
    Delaware Sexual Harassment for Employees
    Delaware Sexual Harassment for Managers
    Disability Discrimination and Accommodation
    Employee Privacy: Balancing a Manager's Right to Know
    ErgoNet: A Training Guide for Healthy Office Workers
    Ethics and Code of Conduct
    FCPA Anti-Corruption and Bribery
    Global Anti-Corruption
    Maine Sexual Harassment for Employees
    Maine Sexual Harassment for Managers
    New York Preventing Sexual Harassment for Employees
    New York Preventing Sexual Harassment for Managers
    Personal Protective Equipment: A General Awareness
    Preventing Unlawful Retaliation in the Workplace
    Slip, Trip, and Fall Prevention
    Understanding the Family and Medical Leave Act
    Valuing Diversity for Managers

    El Pescador Training Modules

    Also included in Training Access Level III (Diamond)

    Data Collection
    Data Collection Quiz
    C-Level Phishing
    Finance Sector Phishing
    Lei Geral de Prote??o de Dados
    Phishing: Why Should We Care
    Phishing, The Major Cause of Information Leakage
    Relationship Trust
    The Threat May Be Closer Than You Think


    KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

    It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 900+ interactive modules, videos, games, posters and newsletters.

    Get Started

    Get the latest about social engineering

    Subscribe to CyberheistNews