BullPhish ID Training Course Library
Short, engaging training videos that mitigate human risk
The BullPhish ID training course library contains 100+ video lessons on topics such as common cybersecurity threats, phishing, security best practices and compliance regulations. Fresh courses are added on a regular basis to keep up with the changes in the cybersecurity landscape.
Most courses are available in multiple languages and are accompanied by a six-question quiz to measure knowledge retention.
Security Awareness
- Security for Remote/Hybrid Workforce
- Internet Safety and Social Media
- Mobile Security: Introduction
- Mobile Security: Securing Mobile Devices
- Mobile Security: Mobile Wi-Fi Security
- Mobile Security: Mobile Device Management
- Mobile Security: Mobile Backups
- Bring Your Own Device (BYOD) Policy
- Physical Office Security
- Physical Security: Lock Screens
- Physical Security: Loose Lips Sink Ships
- Physical Security: Removable Devices
- Physical Security: Tailgating
- Physical Security: Shoulder Surfing
- Clean Desk Policy
- Zero-Trust Security: Introduction & Definition
- Internet of Things (IoT) Awareness
Compliance Regulations Education
- What Is PHI/ePHI?
- PHI Policy
- PHI: Consequences of PHI Release
- PHI: Physical Security
- EU GDPR: What Is GDPR?
- EU GDPR: Consequences of GDPR Release
- EU GDPR: Important Definitions
- EU GDPR for Data Processors
- EU GDPR: GDPR for Data Breach Notifications
- EU GDPR: Rights of Data Subjects Stored Processed Destroyed
- Intro to the UK General Data Protection Regulation (GDPR)
- UK GDPR vs. EU GDPR
- PCI-DSS: Overview
- PCI-DSS: Best Practices for Maintaining PCI DSS Compliance
- Sarbanes-Oxley (SOX) Overview
- HIPAA: Overview
- HIPAA: Overview of the Privacy Rule and Security Rule
- NIST 800-171 Overview
- NIST 800-871: Who Is Required to Comply & What Information Is Protected
- NIST CSF Manager: Introduction
- NIST: Incident Response Overview
- Introduction to CMMC
- CMMC: What Information Is Protected and Why
- CMMC: Understanding the 5 Maturity Levels
- CMMC: Level One Compliance
- PIPEDA Overview
- PIPEDA: 10 Principles
- PIPEDA and Provincial Privacy Statutes
Data Breach Prevention and Data Handling Best Practices
- Secure Data Storage
- Privacy and Data Classification
- Understanding Common Types of Data Breaches
- Data Privacy in the U.S.
- Data Protection: Secure Connections
- Data Protection: Data Encryption
- Data Protection: Data Backup
Cyberthreat Education
- Malware Awareness
- What Is Account Takeover?
- What Is an Insider Threat?
- Insider Risk: Spotting Malicious Insiders
- Ransomware Basics
- Ransomware: Downloads and Attachments
- Ransomware/Malware: Malicious Links & Websites
- Ransomware for Healthcare
- Nation-State Cybercrime: How Employees May Encounter Nation-State Threats
- Nation-State Cybercrime: Industrial and Infrastructure Targets
- COVID-19 — Government Spoofing
- Safe Web Browsing: Domain Spoofing, Website Forgery
- Introduction to Business Email Compromise
- Business Email Compromise (BEC): Invoice/Urgent Payment Required
- Business Email Compromise (BEC): Gift Card Scams
- BEC: Credential & Data Theft Scams
- BEC: Techniques & Red Flags
- Avoiding Cryptocurrency Risk — Crypto Mining
- Social Media Safety
- Introduction to Social Engineering
- Pretexting
Phishing
- Introduction to Phishing
- Common Attack Types
- Common Attack Methods
- Business Email Compromise
- Spotting & Reporting Phishing
- How to Avoid Phishing Scams
- Phishing: CEO Scams
- Phishing: Dangers of Malicious Attachments
- Phishing: Brand Fraud and Spoofing
- Phishing: Whaling/Executive Impersonation
- Phishing Scams: Cryptocurrency, Military and Romance
- Social Media Phishing (Angler Phishing)
- Introduction to Vishing/Smishing
Password Protection and Best Practices
- Good Password Practices
- Multifactor Authentication
- The Basics of Multifactor Authentication
- The Benefits of Password Managers
- The Dangers of Password Sharing
- Introduction to Password Security
- Introduction to Protecting Credentials
- How to Protect Credentials with Multifactor Authentication
- Choosing Strong MFA Second Factors
- Creating Strong Passwords
- Dangers of Password Reuse
- Credential Exposure: Brand Impersonation