Sign in Book a demo →
Training Catalog

Micro-learning that actually
changes behaviour.

85+ modules across every attack vector. Auto-deployed at the exact moment of failure. Available in 35+ languages. Completion certificates for GDPR, HIPAA, ISO 27001, DORA.

Request full catalog How auto-enrolment works
85+
Training modules
35+
Languages
<60s
Enrolment after click
94%
Avg completion rate
Guided Learning Paths
🚀
New Employee Onboarding
8 MODULES · 45 MIN TOTAL

Security foundation for new hires: phishing recognition, password hygiene, data handling, incident reporting. Compliance-ready with certificates.

GDPRISO 27001Certificate
Request access →
🏆
Security Champion Certification
12 MODULES · 90 MIN TOTAL

Advanced programme for security champions and high-risk employees. Attack techniques, social engineering psychology, and incident response.

AdvancedCISM alignedCertificate
Request access →
⚖️
Compliance Essentials Track
10 MODULES · 60 MIN TOTAL

GDPR, HIPAA, PCI DSS, DORA, and NIS2 compliance training. Regulator-ready audit trails. Updated whenever regulations change.

GDPRHIPAAPCI DSS
Request access →
🎣

Phishing Awareness

24 MODULES · EMAIL, SMS, QR, VOICE
📧
BEGINNER
Email Phishing Fundamentals
Identify red flags: sender spoofing, urgency tactics, suspicious links. Includes live simulated inbox exercise.
⏱ 7 minQuiz + cert
📱
BEGINNER
Smishing & Vishing Awareness
Recognise phishing via SMS and phone calls, including fake IT support and bank fraud call scenarios.
⏱ 6 minQuiz included
📷
INTERMEDIATE
QR Code & Quishing Threats
Why QR codes bypass email gateways, how to verify URLs before scanning, real quishing examples from 2025.
⏱ 8 minQuiz included
🔗
INTERMEDIATE
URL Inspection & Link Safety
Homograph attacks, URL shorteners, subdomain abuse, redirect chains — advanced URL analysis for all employees.
⏱ 9 minQuiz included
🤖
ADVANCED
AI-Powered Phishing Recognition
How AI-generated phishing differs from templates, why intuition fails against it, and new cognitive detection strategies.
⏱ 11 minQuiz included
🚨
BEGINNER
How & Why to Report Suspicious Emails
Using the PhishAlert button, what happens when you report, and why near-misses matter as much as clicks.
⏱ 5 minQuiz included
🎭

Social Engineering & Psychology

19 MODULES
🧠
INTERMEDIATE
The Psychology of Deception
Cialdini's six principles of influence, cognitive biases attackers exploit, and how to build a naturally sceptical mindset.
⏱ 10 minInteractive
🚪
BEGINNER
Tailgating & Physical Security
How physical access is gained through social engineering — and why holding the door open is a cybersecurity risk.
⏱ 6 minScenario-based
🤳
ADVANCED
Deepfake & AI Impersonation
Voice cloning, video deepfakes, real examples from 2025 incidents, and verification protocols for high-risk roles.
⏱ 12 minVideo module
🔒

Ransomware Defense

14 MODULES
🎬
BEGINNER
Ransomware Explained
What ransomware is, how it spreads via phishing, and what every employee can do to prevent and slow it.
⏱ 8 minQuiz included
🆘
INTERMEDIATE
What To Do If You're Infected
Immediate actions: disconnect, don't pay, preserve evidence, contact your IR team — with a step-by-step decision tree.
⏱ 7 minScenario-based
🌐
ADVANCED
Ransomware-as-a-Service Deep Dive
How RaaS groups operate, affiliate programmes, double extortion tactics, and enterprise IR planning implications.
⏱ 14 minFor security teams
⚖️

Regulatory Compliance

18 MODULES · GDPR, HIPAA, PCI DSS, DORA, NIS2
🇪🇺
BEGINNER
GDPR Essentials for Employees
Data subject rights, lawful processing, breach reporting, and employee obligations under GDPR. Certificate included.
⏱ 12 minCertificate
🏥
BEGINNER
HIPAA Security Awareness
PHI handling, access controls, breach notification, and security rule requirements for healthcare organisations.
⏱ 10 minCertificate
🏦
INTERMEDIATE
DORA & NIS2 Obligations
Digital Operational Resilience Act and NIS2 requirements for financial and critical infrastructure employees.
⏱ 11 minCertificate

85+ modules. 35+ languages.
All included, all plans.

The full catalog also includes password security, data handling, remote working, insider threat, cloud security, and BEC awareness. All auto-updated as new threats emerge.

Request full catalog access