Explore our course library

Browse security awareness training, phishing simulations, and compliance courses tailored by role, industry, and learning need.

See all categories (247)
Course Catalogue Banner Globe Image

New Releases

Course Image Compliance-Related Security
Privileged User Account Security Government Guidelines

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Image Device Security
NZ Privileged User Account Security Government Guidelines

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Image General Security
Credential Harvesting​ General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Image General Security
Bytes: Ep 5 - Ransomware Extortion with Alastair MacGibbon​ Podcast Episodes

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Image General Security
Insider Threats​ General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Image Compliance-Related Security
NZ Information Security for HR & Finance​ Role-Based Program

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

Course Categories

General Security Awareness Image General Security Awareness

Our General Security Awareness training helps your team recognise, respond to, and prevent everyday cyber...

Government Guidelines Image Government Guidelines

Our Government Guidelines training supports teams working with government frameworks, legislation, and sensitive information. These...

Industry-Based Program Image Industry-Based Program

Our Industry-Based courses provide tailored security training that reflects the real risks, regulations, and workflows...

Keep Secure Mini-Series Image Keep Secure Mini-Series

The Keep Secure Mini-Series offers bite-sized modules that introduce core cyber security concepts in a...

Keep Secure Series Image Keep Secure Series

The Keep Secure Series guides learners through a structured journey from security fundamentals to more...

Phishing Evolution Image Phishing Evolution

Our Phishing Evolution training helps staff stay ahead of increasingly sophisticated email and messaging scams....

Podcast Episodes Image Podcast Episodes

Bytes is your go-to cyber security course series. Each short course dives into the digital...

Role-Based Program Image Role-Based Program

Our Role-Based courses deliver focused security training for technical and high-risk roles such as IT,...

S.C.A.M. Phishing Series Image S.C.A.M. Phishing Series

The S.C.A.M. Series uses a simple, memorable framework to help staff assess suspicious messages. By...

Translated/Captioned Courses Image Translated/Captioned Courses

Translated Courses make your security awareness program accessible to multilingual and diverse teams. By offering...

True Cybercrime Stories Image True Cybercrime Stories

A true cybercrime series that brings real-world digital threats to life through immersive visual storytelling....

Featured Courses

Course Image Online Safety
The Settlement Scam True Cybercrime Stories

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Online Safety
MitM & AitM Attacks General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Online Safety
Misinformation and Disinformation General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Online Safety
Malvertising General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Device Security
Laptop Security General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Fraud
Investment Scams General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Course Image Information Security
Introduction to Information Security General Security Awareness

Designed for government staff, contractors, and suppliers who use privileged accounts, this course explains what privileged access is, why it matters, and how to keep information and devices secure in line with the Australian Government ISM, the Privacy Act, the PSPF, and the Cyber Security Act.

5 Hours
Before Image
Not sure which course fits your team?

Get expert guidance to match your people with the right awareness training for maximum impact.

Get Personalised Advice
Phriendly Phishing Logo