Every second without proper cyber security leaves your business vulnerable.

The digital world is constantly changing, so it’s more important than ever to secure your tech. This superb collection will teach you how to mitigate cyber threats and secure your data from theft and corruption. Use this bite-sized content to turn the tide in the cyber security war! This collection is useful to anyone that uses any digital system in the workplace or simply for leisure activities. In short, that’s everyone!

Cyber Security Collection Images

A glimpse at some of the courses

Train yourself to keep that tech under your control and stop hackers in their tracks with our engaging, up-to-date cyber security collection. These courses cover a myriad of topics, including email security, phishing, viruses & malware, using a strong password, spoofing attacks, and special courses with clear language and no unexplained jargon designed to help keep you compliant with GDPR rules. Check out further details for our most popular courses below.

GDPR Awareness

GDPR is a fairly complex subject, although the idea is straightforward. The fact is, this is one regulation that we are all affected by daily, whether you realise it or not. And so, understanding it is key. This course explains GDPR and its main points, and will help you demonstrate an understanding of the 7 core principles of data protection, identify the key tasks of a Data Protection Officer, and explain how to report a data breach, including details of what it should include.

Virus & Malware

This course offers an introduction to common types of virus and malware that cyber criminals use to gain control of your devices and steal sensitive information. It touches on the motivations behind these attacks, because understanding why they are launched gives you a better sense of the angles they come from. If you know what the attacker is trying to get you to do, you can avoid falling victim to their tricks. By following the simple guidance this training provides, you can build your defences to be solid, protecting both yourself and your organization.

Staying Safe Online

This course will help you secure your personal data while you’re using the internet. The first step is to identify the most common online threats. Once you know what to look out for, you can take action to avoid those threats, and implement computer security improvements that’ll help you stay safe online.

Using a Strong Password

We all love films about hacking. Like when a detective is trying to get access to a secret computer and manages to crack the code just before the criminal comes through the door. These films can be exciting. But did you know, hacking isn’t just about glamorous cases like taking over government schemes or robbing banks? Usually, it’s pretty run-of-the-mill stuff like accessing your email or your online shopping account.

Email Security

Hackers and cybercriminals are always trying to find a way into your systems for their own personal gain. An obvious way in for them is through your emails. Malware sent as links or attachments could wreak havoc, as could phishing attacks, which try to con you into clicking links and giving away your data on bogus websites.

You need to be savvy when it comes to protecting your emails. A securely set up email system is your shield from these bad guys. Using passwords, encryption, and common sense, you put a metaphorical bouncer on the door and beef them up to repel attackers.


Ever heard of Phishing? We’re not talking about an angler baiting their rod and casting to see what they can hook. Oh, hang on. We sort of are. Phishing is a type of cyberattack that a criminal might use to get something from you. Personal information, money directly, or something else entirely. They lure you in and hope you bite.

Alright, it’s a lazy analogy, but it’s an appropriate one. Phishing techniques are becoming more sophisticated, and if you don’t know how to protect yourself, you too could become another victim of this fast-growing weapon in a cybercriminal’s armoury.

Full course list

Global courses
The GDPR Guru      30 mins
Using a Strong Password      15 mins
Viruses & Malware      15 mins
Staying Safe Online      15 mins
Phishing      15 mins
Protection & Infection Control      15 mins
The Internet of Things      10 mins
Email Security      10 mins
Spoofing Attacks      15 mins
Denial of Service Attack      10 mins
Some of our customers

More than just a compliance tool.
This is a partnership.

Clayesmore logo
Kent logo
bathandwells Logo
Shireland logo
Wellington logo
Clayesmore logo
Kent logo
bathandwells Logo
Shireland logo
Wellington logo