Cybersecurity course
What this course covers
The most common cybersecurity threats facing organizations today are not technically sophisticated. They rely on employees making small, entirely understandable mistakes. This course is built around the real-world scenarios that cause the most damage and gives employees the practical knowledge to handle them.
It covers phishing and how to recognize it, social engineering tactics and why they work, password security and what good practice actually looks like in 2026, safe use of devices including personal devices used for work, secure handling of sensitive data and what not to do with it, what to do if something goes wrong, and how to report a suspected incident quickly.
Who it's for
Every employee, regardless of technical background. Cybersecurity awareness is not just an IT concern. The people most likely to be targeted by phishing and social engineering attacks are often those furthest from the IT team, and the breaches that follow are just as damaging regardless of how they started.
Why it matters
Up to 95% of data breaches involve human error. EU NIS2 explicitly requires employee cybersecurity training as part of an organization's risk management obligations, and the UK Cyber Security and Resilience Bill, currently progressing through Parliament, is expected to introduce similar requirements. Beyond regulation, a single successful phishing attack can cost an organization millions. Training is one of the cheapest and most effective defenses available.
Available versions
Delivered as a zipped file in your chosen format. Available as SCORM 1.2, SCORM 2004, xAPI (Tin Can), AICC, or cmi5. Upload directly to your existing LMS. One flat fee, unlimited learners, no platform or login required.
This course is available as a standalone course or as part of our Compliance Essentials bundle.
No update plan required. Content covers evergreen concepts rather than specific legislation.