Available courses



















Information Classifications

An overview of Information Classifications including, confidential, restricted, internal, and public information.

Risk Management

An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.


An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.

Mobile Devices

An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.

Be Careful with Information

An overview of Information safety including the use of public networks, securely disposing of information, encrypting data, as well as, keeping personal and business information separate.

Social Engineering

An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.


An overview of Ransomware including a short video and knowledge check.

Phishing vs. Spear Phishing

An overview of Phishing versus Spear Phishing including a short video and knowledge check.

Phishing and Emotions

An overview of Phishing and Emotions including a short video and knowledge check.


An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.


An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.

Working Outside the Office

An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.

General Phishing

An overview of General Phishing including a short video and knowledge check.


An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.

Brand Impersonation

An overview of brand impersonation including popular narratives from online shopping, shared documents, social networking, shipping, and banking.

To Catch a Threat

Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.

Resiliency Quiz

Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails.

Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.

Indicators of a Phish

Investigate the email and answer the prompts. If you score more than 80% you win the game.

Honey Comb Challenge

Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.

Phishing Category Challenge

Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.