1. <cite id="0wadh"></cite>
      1. <rt id="0wadh"></rt>

        KnowBe4’s game-changing partnerships with The Security Awareness Company, Securable.io, Popcorn Training, ThinkHR, exploqii, Canada Privacy Training, Twist & Shout, TeachPrivacy, Syntrio, and El Pescador allows you to significantly better manage the ongoing problem of social engineering. We offer you the best-in-class phishing platform combined with the world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Think of us as the Netflix of awareness training.

        To easily deliver this new content library to customers, KnowBe4 has a ‘Module Store’. As a customer, you can use the ModStore to search, browse and preview content and -- depending on their subscription level -- move modules to their KnowBe4 account. 

        We offer three Training Access Levels: I, II, and III depending on your subscription level. Because our library is constantly being updated, if you want to get a real-time view of all the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library! 



        Kevin Mitnick Security Awareness Training

        Included in Training Access Level I (Silver)

        This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. Kevin Mitnick then takes you behind the scenes to see how the bad guys do what they do. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks. 

        This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. You’ll learn how to spot red flags that alert you to possible danger in an email and then you’ll help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

        This module is a condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spoofing, malware hidden in files, and advanced persistent threats (APTs). This module is available in 26 language versions.




        KnowBe4 Cybersecurity Awareness Posters

        Included in Training Access Level I (Silver)

        2019 Common Threats
        2019 Social Engineering Red Flags
        Captain Awareness
        Captain Awareness: Conquering Internet Safety for Kids
        Captain Awareness: Securing Your Mobile Devices
        Risks of Social Media Sharing
        All Your Data Are Belong To Us
        Bad Rabbit: Think Before You Click
        Be An Email Superhero
        Burning Man
        CEO Fraud
        Don't Let Your Strings Get Pulled
        Don’t Click on Me
        Email Subject Line Red Flags
        Give Us the Bitcoin
        It only takes one
        Jaws: Don’t Be a Victim
        Keep Calm and Don’t Click
        Loose Clicks Sink Ships
        Loose Lips Sink Ships
        Loose Tweets Sink Fleets
        Phishin’ Is Easy
        Poster: 2019 Your Role: Internet Security and You
        Poster: Captain Awareness: Triumph over the Reuse of Passwords
        Ransomware Apocalypse is Calling
        Ransomware Has No Borders
        Ransomware Invaders
        Resist the USB Attack
        Stop Phishing Attacks Dead in Their Tracks
        Stop, Look, Think
        Stop, Look, Think Signs
        The Clickers
        There's Something Phishy in Your Inbox
        Think Before You Click
        Think Before You Click Boy
        Think Before You Click Brain
        Think Before You Click Eye Chart
        Think Before You Click Monster
        Think Before You Click Pop-Up
        This is My Ransomware Killing Poster
        Tron Ransomware
        Uncle Sam: I Want You to Stop Clicking
        Why Security Awareness Training?
        You Can’t Go Back



        KnowBe4 Training Modules

        Also included in Training Access Level II (Gold & Platinum)

        This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you. Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned when you help Jake Saunders, a typical computer user, steer clear of six real-world social engineering attacks.

        This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Different types of cards are covered, which specific elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends off this module.

        In this engaging and interactive module, you will learn how to defend yourself against what the FBI calls business email compromise" and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.

        In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

        In this module you’ll learn about strategies and techniques hackers use to trick people just like you. We introduce you to Kyle Montgomery as he deals with three real-world-based scenarios: Ransomware, Spearphishing, and a Snapchat attack to show you how these common threats can take place. At the end of each scenario, Kevin Mitnick will take you behind the scenes and reveal exactly how each type of hack is accomplished.

        In this interactive course you will learn about the important rules for creating strong passwords, you’ll test a password to see how strong it is, and learn about the latest trend in password security, the passphrase, and how to create one.

        This 20-minute module covers the protection of your employees, your customers and their funds, the premises, any security devices, computers, and networks, from physical circumstances and events that could cause serious losses or damage. This includes protection from robbery, kidnap/extortion, bomb threat, fire, natural disasters, burglary, and nuclear emergencies.

        This interactive module provides an overview the General Data Protection Regulation. The goal of this module is to familiarize you with the General Data Protection Regulation, also known as the GDPR; what it means to your organization; and what it means to your job function. There are ungraded knowledge checks along the way to help you retain information for real-life scenarios, followed by a graded quiz at the end.

        In this module, employees of financial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee's role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

        This 15-minute module of the Kevin Mitnick Security Awareness Training series specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations. A version for Canada is also available.

        This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

        This 15-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualifies as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. The training covers topics like Merchant levels, Merchant types, Self Assessment Questionnaires, new changes in the industry, chip cards, TIP Program, Qualified Integrated Resellers and the key security requirements for any organization.

        This fun and engaging course will show you what ransomware is, how it works, and how to steer clear of potential threats. You’ll meet Sergeant Vasquez, head of our cyber security task force as he takes you through a line-up of the top attack vectors that bad guys use to hold your computer systems hostage until you pay the ransom.

        Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient files with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

        In this fun, fully interactive course you will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.

        This totally interactive module shows you the seven areas of an email to pay attention to if you don’t want to be hacked. Once you know where to look, it shows seven real-life examples, and you’ll be asked to spot the red flags in each.

        In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user, through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.

        Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality, 9-minute course takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.

        KnowBe4 Training Micro-modules

        Also included in Training Access Level II (Gold & Platinum)

        CEO Fraud
        Decision-Maker Email Threats
        Mobile Device Security
        Ransomware and Bitcoin
        Remote and Travel WiFi Dangers
        Safe Web Browsing With Corporate Devices
        Secure Destruction of Sensitive Information
        Securely Working From Home
        Social Engineering the Executive
        Social Media Precautions for Executives

        Be a Human Firewall
        Conquer Internet Safety for Kids
        Securing Your Mobile Devices
        Triumph over the Reuse of Passwords
        Understanding GDPR
        Securely Working from Home
        Be Vigilant with USB Drives
        Outwit Dumpster Divers
        Travel Securely
        Handling Printouts
        Understanding Data Breaches
        Safeguard Social Media
        Protect Your Web Browser
        Guardians of Sensitive Information
        Vanquish Malicious Attachments
        Outwit Social Engineering
        Conquer Open WiFi
        Foil Phishing

        This 5-minute micro-module covers why it's so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

        This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

        This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner's responses. There are two versions of this course, one with sound and one without.

        This 90 second video shows two of the worst things you can do with your password.

        This 5-minute micro-module covers the very important topic of email spoofing. It defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spoofing can be.

        This 5-minute micro-module covers the basics of safely handling sensitive information and goes into Personally Identifiable Information (PII).

        This 5-minute micro-module covers part 2 of safely handling sensitive information and goes into Protected Health Information (PHI).

        The holidays are a time of great joy and celebration for people around the world...and for cyber criminals. In this video we will go over 5 practices to follow to make yourself a hard target.

        This powerful 5-minute micro-module takes an employee through the basics of ransomware, the different methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected files.

        This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the "dos and don'ts" of safe web browsing. This module is fully interactive with a quiz at the end.

        This 5-minute micro-module defines social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

        This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

        This 5-minute micro-module covers the rules of how to create and use strong passwords in both an office environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

        This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.




        The Security Awareness Company Content Library

        Also included in Training Access Level III (Diamond)

        Active Shooter & Physical Incident Response
        Call Center & Help Desk Awareness
        Computer Security & Data Protection
        Cross Border Data Protection
        Data Classification
        Developing an Incident Response Plan
        Empowering Your Employees for Better Security
        Executive Awareness Leadership
        How to be a Human Firewall
        Identification & User Authentication
        Identity Theft and Data Breaches
        Insider Threats for Executives and Managers
        Malware
        Mobile Security Basics
        Non-technical Security Basics
        OWASP Top 10
        PCI DSS Retail Store Experience
        Password Basics
        Phishing Andrew's Inbox
        Phishing Awareness
        Phishing Fundamentals
        Privacy Basics
        Ransomware
        Secure Online Behavior
        Security Awareness Fundamentals
        Security Triads
        Social Engineering
        Social Engineering & Phishing for Executives
        Social Engineering Basics
        The Top 10 Security Awareness Fundamentals Test Out
        Top 10 Security Awareness Fundamentals for New Hires
        Understanding and Mitigating Security Risks for Executives
        Understanding and Protecting PII
        Workforce Safety & Security Awareness
        Workplace Violence and Safety
        FERC/NERC for End Users
        FERC/NERC for Managers and Executives
        FERPA (Education)
        FFIEC (Financial Compliance)
        GLBA (Finance)
        HIPAA (Healthcare)
        PCI-DSS (Retail Compliance)
        Sarbanes-Oxley (Accounting)
        13 Habits of Savvy SM Users
        5 Examples of Social Engineering
        5 Steps to Prevent ID Theft
        5 Steps to Prevent ID Theft
        5 Traits of a Security Aware Employee
        7 Tips for Travelers
        A Real Life Spear Phishing Attack
        Access Controls
        Advanced Persistent Threats
        April 2018 Security Awareness Newsletter
        Are Your Things Part of a Botnet?
        August 2018 Security Awareness Newsletter
        Availability
        Back to School Security Checklist
        Bad Passwords
        Bank Secrecy Act
        Being a Human Firewall in All Three Domains
        China's Cybersecurity Law
        Click With Care
        Confidentiality
        Cross Border Data Protection Overview
        DIY Home Internet Security Policy
        Data Breaches and You
        Data Classification at Home
        Data Classification at Work
        December 2017 Security Awareness Newsletter
        EU GDPR: The Basics
        February 2018 Security Awareness Newsletter
        Field Guide to Phishing Emails
        Following Policy and Reporting Incidents
        Forms of Social Engineering
        Hey! That???s my pie! Opps, I mean PII
        How VPNs Work
        How to Identify a Social Engineering Attack
        In Case of Emergency
        Incident Response in Action
        Incident Response in All Three Domains
        Integrity
        IoT Gone Rogue
        January 2018 Security Awareness Newsletter
        July 2018 Security Awareness Newsletter
        June 2018 Security Awareness Newsletter
        Keeping Kids Safe on Social Media + 10 Tips for Parents
        LinkedIn Scams & It’s a Spammer???s World
        Malware on the go!
        March 2018 Security Awareness Newsletter
        May 2018 Security Awareness Newsletter
        Mined Your Data
        Non-technical Security in ALL THREE DOMAINS
        November 2017 Security Awareness Newsletter
        October 2017 Security Awareness Newsletter
        PHI stands for Protected Health Information
        PII: To Prominent Constant of Information Security
        Passphrases: The Smart Alternative
        Phishing In Action
        Privacy vs. Security
        Proven Password Policies
        Ransomware Security One Sheet
        Redefining What it Means to be a Human Firewall
        Regulations Near and Far
        Respecting Privileged Access
        Securing Mobile Devices
        Securing Smart Devices
        Security Incidents and Where to Report Them
        September 2017 Security Awareness News
        Shipshape SM Behavior
        Simple Steps to Online Safety
        Smishing: Phishing Gone Mobile
        Spam Emails vs Phishing Emails
        The CIA Triad: Security to the Power of Three
        The Cloud Is Not Yours
        The Domains Triad: Mind, Body, and Soul
        The Future of Identification and Authentication
        The Horrors of Malware
        The Importance of Data Classification
        The Internet of Things and the Concerns of Convenience
        The Journey to Being Anonymous on the Internet
        The Many Lives Triad
        The Many Lives of PII
        The Physical Side of Security Awareness
        The Rule of Three
        The Three Domains of Social Engineering
        The Three Lives of Incident Response
        The Underground Marketplace and Common Cyber Attacks
        Tis the Season..... for Scams
        Top 10 Security Practices for Work
        Top 10 Ways to Stay Safe at Home
        Top 10 Ways to Stay Secure on the Go
        Understanding BEC
        Understanding Compliance Standards
        Understanding Insider Threats
        Understanding Insider Threats & Offboarding
        Understanding the Attackers
        Whale and Spear Phishing
        What is A Human Firewall?
        What is NIST Cybersecurity Framework?
        What is Privacy Shield?
        What’s the WiFi Password?
        Where Do You Hide Your Passwords?
        Where in the World is Ransomware
        Where's the Remote
        Who are Cybercriminals
        Why Does Compliance Matter
        You Need a PW Manager
        10 ways to avoid phishing scams
        10 ways to keep PII private
        10 ways to stay safe on social media
        A Day of Bad Passwords
        Backup
        Being a Human Firewall
        Beyond Phishing
        Catching malware
        Cyber Crime Starts with You
        Dangers of USBs
        Data Breach Overview
        Data Breaches and You
        Data Classification Overview
        Data Loss and Insiders
        Definition of Social Engineering
        Dumpster Diving
        Email Spoofing
        Executives Mitigating Insider Threats
        Hide your passwords
        Human Firewall and Data Classification
        Incident Response 101
        Introduction to Ransomware
        Introduction to the cloud
        Low-Tech Hacks to Steal Your ID
        Mouse Overs
        Non-Technical Security Skills
        Non-Technical and Physical security tips and tricks
        PII and Compliance
        Phishing Contest Winner
        Phishing From Facebook
        Phishing From Netflix
        Phishing From Your Bank
        Phishing in Action
        Physical Security Threats
        Pretexting: (Fake Fraud Protection)
        Pretexting: (Fake Help Desk)
        Pretexting: Fake Employee to Help Desk
        Pretexting: Fake Executive to I.T.
        Pretexting: From Fake Credit Card Company
        Pretexting: From Fake I.T.
        Privacy Vs. Security
        Protecting Data
        Road Warriors
        Safe Surfing 1: HTTP vs HTTPS & Online Authentication
        Security Myths Busted
        Social Media
        Social Media Data Mining
        Social Networking Do's and Don’ts
        The CIA Triad
        The Domains Triad
        The Human Firewall's Top Concerns in All Three Domains
        The Many Lives Triad
        The Many Lives of PII
        Understanding Encryption
        Welcome to Security Awareness Training
        Welcome to Security Awareness Training - Animated
        What Are APTs
        What Does a Social Engineer Look Like?
        What is I.D. Theft
        What is PII?
        Why Executives Need Awareness Training
        Why Security Awareness?
        Workplace Physical Awareness
        Your Security Awareness Journey
        End of the Day Security Challenge
        Human Firewall Big Business
        Human Firewall Trivia
        Human Firewall World Race
        Password Big Business Game
        Password World Race Game
        Phishing Awareness Big Business
        Phishing Awareness Trivia
        Phishing Awareness World Race
        Security Awareness World Race
        Security Awareness Big Business
        Security Awareness Card Stack
        Security Awareness Casino Challenge
        Security Awareness Trivia
        Social Engineering & Phishing Millionaire Challenge
        Social Engineering Big Business Game
        Social Engineering Trivia
        Social Engineering World Race Game
        Anatomy Of A Phishing Email
        Are You The Weakest Link?
        Back Up
        Bad Guys don't always wear Masks
        Be Alert
        Be a Human Firewall
        Be a Human Firewall- Always Follow Policy
        Break Up With Your Password
        Buckle Up
        Can you Spot a Social Engineer?
        Changed your Password?
        Confidential Documents
        Confused By our Security Policies?
        Confused about policy?
        Critical Assets In Your Hands
        Ctrl+Alt+Delete
        Cyber Security in the Workplace
        Data Protection Life Cycle
        Decorate Your Devices
        Definition: Click Happy
        Definition: Phish Face
        Did You Click A Phishing Link?
        Did You Forget To Backup?
        Did you follow Policy?
        Digital Signature
        Do You Know FERC/NERC?
        Do You Know Malware? (Spider)
        Do You Know Malware? (Warning)
        Do You Know Our Policies?
        Do You Know Your Security Responsibilities
        Do You Think Before You Click?
        Do You Think Before You Click? Ask!
        Do you Download Apps?
        Do you Trust the Delivery Man?
        Do you know what you are Downloading?
        Don't Leave Us In the Dark
        Don't Turn Off the Lights
        Don't Use your Dog's Name for a Password
        Don't be Fooled(IRS)
        Don't be Phishing Bait
        Don't get hooked on Phishing Scams
        Don’t Be Phishing Bait
        Don’t Be a Puppet
        Don’t Let Social Engineers In Your Head
        EU-US Privacy Shield
        Fishing Bait Click Bait
        Forget Passwords
        GDPR is Here
        GLBA Pretexting Protection
        GLBA Safeguards Rule
        Got A Problem?
        HIPAA Penalties
        HIPAA is More Than Just Compliance
        HIPAA isn't just for medical professionals
        Have You Been Social Engineered Lately?
        Health Care Requires Data Care
        How Do You Know If Your ID Has Been Stolen
        How Much Information Can Be Stolen From Your Laptop?
        Human Firewall Details
        I Know What I Am Downloading
        I know what you did last Friday
        IRS will never threaten with Law Enforcement
        Incident Response Is All About Time
        Incident Response LifeGuard
        InfoSec Is Your Responsibility
        InfoSec Is Your Responsibility World
        Information Security Is All Of Us
        Insider Threat Malicious or Unintentional
        Isn't Their Business (Sunset)
        Keep A Clean Desk!
        Keep Calm Ask if you don't know
        Keep Calm Change Your Password
        Keep Calm Delete Phishing Emails
        Keep Calm Follow Policy
        Keep Calm Report Security Issues
        Keep Calm Think Before You Click
        Keep Secrets Secret
        Keys to the Kingdom
        Kiss your Data Goodbye
        Laptop Security
        Leaks Make Us Weak - Caller
        Leaks Make Us Weak - Click
        Leaks Make Us Weak - Password
        Login Info Is Private
        Messy Desk? Clean Up Your Act!
        Mixed Up Password
        Mobile Phones - Personal Data
        My Password is Complex and Creative
        NIST Cybersecurity Framework
        Need Help with your Password?
        Never Share Passwords
        No Piggybacking Zone
        No Thru Traffic
        No information without Protection
        Not All Insider Threats Are Obvious
        PCI-DSS Cardholder Data
        PCI-DSS POS Security
        PW Smoothie
        Password Expiration
        Passwords Hard to Crack
        Perils of the Internet
        Protect Company Data (No personal data on company devices)
        Protected Health Information
        Protecting Data Across Borders
        Protecting PHI
        Ransomware - Just One Click
        Ransomware Encrypts Your Data
        Ransomware Is A Malicious Program
        Recognize and Protect PII
        Report Anything Unusual
        Report Strange Incidents
        Report Strange Things!
        Report it Immediately
        SHHH Keep Company Conversations Private
        Secure Network
        Secure Your Devices
        Security Doesn't End With Software
        Security Is Not a Vacuum
        Security Leader Lighthouse
        See Something Strange... Report It
        Shred
        Simple Steps to Staying Safe Online
        Social Engineering
        Social Engineering
        Social Engineers Target People
        Social Media
        Something Out of the Ordinary
        Stop Think Connect
        Stop and Shred
        Strong Passwords (Woman)
        Tax Season Checklist
        Tax Season got you Flustered?
        The Cloud is Someone Else's Computer
        The Universe is Expanding
        These Keys Lock Your Computer
        They Don't Wear Name Tags
        Tips To Avoid Ransomware
        Today's Predictions for Tomorrow's Internet
        Together We Are Human Firewalls
        Transferring Data Across Borders
        Treat Passwords Like Your Underpants
        Treat Your Password Like A Toothbrush Photographic
        Treat Your Password Like Underwear
        Treat Your Passwords Like Your Toothbrush - Silhouette
        Triad Classic
        Triad Many Lives
        Triad SNL Passwords
        Triad Security Domains
        USB
        Understanding Compliance
        Unfamiliar Persons
        Use Mobile Devices Safely
        Watch Out for Tailgaters
        Watch out for Shoulder Surfers
        What is PII?
        Whiteboard Security
        Wifi Hot Spot
        Work Phone lost or Stolen?
        Wrong Way



        Securable.io Videos

        Also included in Training Access Level III (Diamond)

        FISMA- Federal Information Security Management Act
        Intro to Phishing
        LinkedIn Security
        Monitoring Facebook Services
        Protect Your Kids Online
        Public WIFI Safety
        Ransomware Attacks
        Traveling Abroad
        Twitter Security
        USB Safety



        Popcorn Training

        Also included in Training Access Level III (Diamond)

        Something Phishy Series Videos & Quiz (Animated)
        Something Phishy Introduction
        Mobile Mayhem (mobile threats)
        Pass the Password (passwords, social engineering)
        Breaking the Barrier (physical, clean desk)
        Phishous Malicious (Internet use)
        Dicey Devicey (BYOD Security)
        Freaky Leaky (DLP)
        Cloudy with a chance of Phish (Cloud Apps)
        Social Media Fever (Social Network Security)


        Cyber Heroes Series Videos & Quiz (Live Action)
        Cyber Heroes Introduction
        Don't take the bait (spear phishing, social engineering, vishing)
        Mobile Mayhem (mobile threats)
        Pass the Password (pass word, social engineering)
        Internet Threats (Internet use)
        Dicey Devicey (BYOD Security)
        Freaky Leaky (DLP)
        Cloudy with a chance of Phish (Cloud Apps)
        Social Media Fever (Social Network Security)


        Security Moment Short Clip Videos & Quiz (Motion Graphic)
        The Big Phish
        Social Engineering
        Ransomware
        Spot the fake attachment
        Spot the fake link
        Privileged user access management (PAM)
        Hacking Emotions
        Secure Coding Series for Developers Videos & Quiz: (Animated and Motion Graphic)
        Secure Transactions and Secure Deployments
        Authentication and Authorization
        Data Security
        Injection Attacks and How to Avoid Them
        Introduction to Web Application Security
        Secure Session Management

        Compliance Series (Animated)
        PCI DSS for Merchants
        PCI DSS for Corporate Office
        PCI DSS for Retail Stores
        SupaPOPI (RSA)
        Consumer Protection Act (RSA)
        Treating Customer Fairly (RSA)
        Conflict of interest policy
        Business Continuity / Business Resilience


        Privacy Series Videos and Quiz (Live Action)
        Personal Information–Currency of the 21st Century
        Identity Theft–Protect your Personal Information
        Privacy Principles–Handling Personal Information at Work
        Protecting Personal Information–Security & Safeguards
        General Data Protection Regulation (GDPR)–User Rights

        Building Secure Software Series
        Ep 1 - Very Early and Often
        Ep 2 - Leverage Security Frameworks and Libraries
        Ep 3 - Secure Database Access

        Cyber Essentials Series
        Information Security 101

        Standups 4 Security Series: (Live Action)
        Cybercrime Promo
        A Goliath Hack
        Behind the Scam with Loyiso Madinga
        Open Secrets - A Password Exhibition
        Spear phishing - Catching the Big Phish
        Don't Trust Anybody - CEO Scam
        Social Media Oversharing
        The Dark Web Pop-up
        Cyber Heroes Series
        Cloudy with a Chance of Phish
        Dicey Devicey
        Don't Take the Bait
        Freaky Leaky
        Internet Threats
        Mobile Mayhem
        Pass the Password
        Social Media Fever

        Security Moments Series
        Hacking Emotions
        Privileged User Access Management
        Ransomware
        Social Engineering 101
        Spot the Bad Attachment
        Spot the Bad Link
        The Big Phish
        Something Phishy Series
        Breaking the Barrier
        Cloudy With A Chance of Phish
        Dicey Devicey
        Freaky Leaky
        Mobile Mayhem
        Pass The Password
        Phishious Malicious
        Social Media Fever
        Something Phishy

        Privacy Series
        GDPR
        Identity Theft
        Personal Information
        Privacy Principles
        Protecting Personal Information



        ThinkHR Training Modules

        Also included in Training Access Level III (Diamond)

        A Manager's Guide to Discipline and Documentation 
        A Manager's Guide to Diversity, Inclusion and Accommodation 
        Active Shooter 
        Bullying and Hazing on Campus 
        Bullying and Violence in the Workplace 
        Campus Security Obligations Under Federal Law 
        EEO and Lawful Hiring 
        FERPA for Higher Education 
        FMLA Leave and More: An Overview of Legally Protected Leave 
        HIPAA - Privacy Essentials 
        HIPAA - Privacy Rules for Business Associates 
        HIPAA - Security Rules for Business Associates 
        HIPAA for Non-Medical Employees Optimizing Your Work/Life Balance: Maintaining Your Life Balance
        Optimizing Your Work/Life Balance: Taking Control of Your Stress 
        Pandemic Flu Awareness 
        Preventing Harassment in the Global Workplace - Employee Edition 
        Preventing Harassment in the Global Workplace - Manager Edition 
        Promoting a Substance-Free Workplace 
        Rightful Employment Termination 
        Sexual Harassment Prevention for Employees 
        Title IX for Higher Education 
        Wage and Hour Awareness for Managers 
        Workplace Harassment Prevention for Employees, State of New York 
        Workplace Harassment Prevention for Managers, State of New York 
        Workplace Harassment Prevention for Employees (Title VII) 
        Workplace Harassment Prevention for Managers - Multi-State Edition, V3.0 Workplace Management: Employment Laws and Regulations



        exploqii Videos

        Also included in Training Access Level III (Diamond)

        Anti Trust 1 - Basic Regulations & Risks
        Basic Rules of Secure Communication
        Bluetooth & WiFi
        Business Partner Compliance
        CEO Fraud - Fake President
        Clean Desk Policy
        Cloud Services
        Code of Conduct
        Compliance Checklist
        Compliance Management System
        Conflict of Interest
        Corruption
        Crisis Management
        Data Protection
        Disinformation
        EU GDPR
        Export Control
        Fairness & Respect in the Workplace
        Gifts & Hospitality
        IT Security in the Workplace
        Identity Theft
        Industrial Espionage
        Information Classification
        Information Security @ Mobile Devices
        Information Security @ Remote Workplaces
        Information Security @ Social Media
        Insider Threat
        Internal Investigations
        Know-How Security
        Money Laundering
        Payment Fraud
        Phishing Attacks on Companies
        Phone Scam
        Price Rigging
        Proxy Servers & Data Privacy
        Ransomware Micro-module
        Secure Passwords
        Security-Oriented Personnel Selection
        Sexual Harassment
        Social Engineering Micro-module
        Social Media Guidelines
        Threat Management
        Travel Security
        USB Attacks
        Visitor Management
        4Whistleblower



        Canada Privacy Training Modules

        Also included in Training Access Level III (Diamond)

        Canadian Private Sector Privacy
         



        Twist & Shout Video Modules

        Also included in Training Access Level III (Diamond)

        Restricted Intelligence Series
        Season 1

        Episode 1:The Test (passwords and passes)
        Episode 2: Browsing (safe surfing)
        Episode 3: A Cry for Help (email hacking and phishing)
        Episode 4: The Journey (portable storage devices)
        Episode 5: The Leak (beware what you share
        Episode 6: The Lesson (mobile devices)

        Restricted Intelligence Privacy Edition
        Season 2

        Episode 1: Nothing To Do With Me (What Is PI?)
        Episode 2: Nobody Reads That Stuff (Privacy by Design)
        Episode 3: Once More Unto the Breach (Retention & Disposal)
        Episode 4: The Heart of the Matter (Purpose & Minimisation)
        Episode 5: Mr. Cellophane (Transparency)
        Episode 6: Partners (Third Party Partners)
        Bonus: GDPR Intro (GDPR is Coming
        The Inside Man
        Season 1

        Episode 1: The New Guy (Social Engineering)
        Episode 2: Social Hour (Social Media)
        Episode 3: On Our Side (Phishing Attacks)
        Episode 4: Surprise (Document Disposal)
        Episode 5: Takeaways (Clear Desktop Policy)
        Episode 6: Masquerade (Cloud Services)
        Episode 7: Buying Time (Passwords)
        Episode 8: Taken (Ransomware)
        Episode 9: Where The Wild Things Are (Travel)
        Episode 10: Keep Your Friends Close (App security and permissions)
        Episode 11: The Sound Of Trumpets (External Devices)
        Episode 12: Checkmate (Insider Threats)



        TeachPrivacy Training Modules

        Also included in Training Access Level III (Diamond)

        California Health Privacy
        Canadian Anti-Spam Legislation (CASL)
        Data Breach
        Data Disposal
        Data Retention
        Encryption
        FERPA (K-12)
        General Data Protection Regulation (GDPR)
        Global Privacy and Data Protection
        Secure Workspaces Game
        The Privacy Act for Federal Government Contractors



        Syntrio Training Modules

        Also included in Training Access Level III (Diamond)

        Avoiding Antitrust Violations
        Avoiding Conflicts of Interest
        Avoiding Insider Trading Risk
        Back Injury Prevention
        California Workplace Harassment Prevention for Employees
        California Workplace Harassment Prevention for Managers
        Connecticut Sexual Harassment for Managers
        Controlling Workplace Exposure to Bloodborne Pathogens
        Delaware Sexual Harassment for Employees
        Delaware Sexual Harassment for Managers
        Disability Discrimination and Accommodation
        Employee Privacy: Balancing a Manager's Right to Know
        ErgoNet: A Training Guide for Healthy Office Workers
        Ethics and Code of Conduct
        FCPA Anti-Corruption and Bribery
        Global Anti-Corruption
        Maine Sexual Harassment for Employees
        Maine Sexual Harassment for Managers
        New York Preventing Sexual Harassment for Employees
        New York Preventing Sexual Harassment for Managers
        Personal Protective Equipment: A General Awareness
        Preventing Unlawful Retaliation in the Workplace
        Slip, Trip, and Fall Prevention
        Understanding the Family and Medical Leave Act
        Valuing Diversity for Managers



        El Pescador Training Modules

        Also included in Training Access Level III (Diamond)

        Data Collection
        Data Collection Quiz
        C-Level Phishing
        Finance Sector Phishing
        Lei Geral de Prote??o de Dados
        Phishing: Why Should We Care
        Phishing, The Major Cause of Information Leakage
        Relationship Trust
        The Threat May Be Closer Than You Think

         

        KnowBe4 Mod Store Security Awareness Training LibraryWant to see all our great security awareness training content?

        It's easy! You can now get access to the ModStore Preview Portal to see our full library of security awareness training content; including 900+ interactive modules, videos, games, posters and newsletters.

        Get Started

        Get the latest about social engineering

        Subscribe to CyberheistNews

        四虎影视在线观看2019a