Skip to content

Hit enter to search or ESC to close

Explore our catalog of security awareness training courses. These materials are regularly updated with new courses and modules published weekly. This training content provides the foundation for a robust and resilient security program tailored to your organization’s needs

Did You Know?

92% drop

in phishing susceptibility with SAT

62%

of employees share passwords

$10.5 trillion

estimated global cybercrime cost

82%

of data breaches involved a human being

TitanHQ SAT Catalog

This is a sample of the training areas we cover including phishing prevention, data protection strategies, social engineering defense, web security, malware prevention, managing mobile and removable devices and maintaining security while working remotely.

Security Awareness Examples.

Security Awareness Explored: This video explores the cybersecurity landscape, explaining the tactics used by cybercriminals and providing expert guidance on how to protect yourself from cyber attacks. Categories: Data Protection; Email Security; Malware Awareness; Mobile Device Security; Working Remotely; Social Engineering; Web Security; Authentication; Removeable Media Security.  Video duration: 10:33

ChatGPT and AI Security : Short video on the topic of ChatGPT and AI security. Categories: Web Security; Data Protection; Coding; Data Breaches. Video duration: 2:55

QR Code Phishing : Explains what QR code phishing is and why it’s becoming a popular tool of cybercriminals as well as providing guidance on how to protect yourself from QR code phishing. Categories: Phishing; Human Firewall; Malware Awareness; Spoofing. Video duration: 2:59

How to be a Human Firewall: Explains what a human firewall is and how they are essential to maintaining an organization’s cybersecurity . Provides guidance and tips on how individuals can secure their personal and company data. Categories: Human Firewall; Social Engineering. Video duration: 6:32

How to Protect Yourself Online : The guidance and techniques you need to stay safe in the modern digital landscape.Categories: Human Firewall; Data Breaches; Incident Response; Social Media, Web Security; Wi-Fi Security. Video duration: 7:04

Incident Response 101 : Explains the importance of responding quickly and effectively to security incidents. Categories: Incident Response. Video duration: 3:06

Internet of Things (IoT Security: Explains why Internet of Things (IoT) security is so important, the challenges posed, real world examples and how to stay safe. Categories: Human Firewall; Malware Awareness; Ransomware; Spyware. Video duration: 4:13

Cyber Security 101: Explains what cyber security is and the importance of security human firewalls in keeping your company data safe. Categories: Human Firewall. Video duration: 3:05

Shadow IT Threats: Explains what Shadow IT is, typical examples, why it's used (benefits), risks involved and how to address or prevent it. Categories: Access Control; Data Protection; Human Firewall; Secure System Configuration; Third Party Apps; Vulnerability Assessments; Web Security; WIFI Security. Video duration: 4:52

Selfie Spoofing: Explains how scammers can use our online photos to trick facial recognition technology and commit identity theft. Categories: Multi-factor Authentication; Social Engineering; Social Media; Spoofing. Video duration: 3:01

Spoofing Attacks: Explains what spoofing is and the techniques used by criminals. It also includes how to help prevent becoming a victim of spoofing. Categories: Spoofing; Social Engineering. Video duration: 2:26

Zero Trust: Explores the main principles of Zero Trust security including the benefits of implementing. Categories: Authentication; Data Breaches; Data Protection; Multi-factor Authentication; Privilege Access; Secure System; Configuration. Video duration: 3:12

Regulatory Compliance vs AI Cybersecurity Threats: Global regulations are evolving to deal with the risks of AI driven cybersecurity threats. Learn how businesses can stay compliant and secure. Categories: Data Protection; GDPR; Vulnerability Assessments. Video duration: 3:37

Authentication Examples.

Authentication Explored: Explores the history of user authentication and password hacking. Provides guidance on how to create a strong password, and illustrates the benefits of password managers and multi-factor authentication. Categories: Access Control; Data Protection; Passwords; Social Engineering; Authentication; Data Breaches; Human Firewall; Multi-factor Authentication. Video duration: 8:40

Brute Force Attacks: Explains how hackers use brute force to crack passwords, and how to ensure your password is strong enough to defeat brute force. Categories: Authentication; Passwords. Video duration: 2:43

Password Security Training: Video explains the importance of having strong passwords. Categories: Passwords; Authentication; Multi- factor Authentication; Human Firewall. Video duration: 1:13

Staying Safe with a Strong Password: Explains how to stay safe by using strong passwords. Categories: Passwords; Authentication; Multi-factor Authentication. Video duration: 1:17

Passwords 101: Explains the importance of strong passwords in cybersecurity and how to create strong, unique but memorable passwords. Categories: Authentication; Passwords. Video duration: 3:10

Password Handling: Explains the importance of having different passwords for different accounts. Categories: Authentication; Passwords; Physical Security. Video duration: 1:11

Multi-factor Authentication 101: Explains what multi-factor authentication is and the benefits of using it to secure your devices and online accounts. Categories: Authentication; Multi-factor Authentication. Video duration: 3:41

Secure Passwords: Explains the importance of strong passwords and provides and easy method of creating secure memorable passwords. Categories: Access Control; Authentication. Video duration: 1:29

Credential Stuffing: Hackers will try stolen login credentials on every account and platform they can in order to maximize the effectiveness of their attacks. Learn how to stay safe from credential stuffing with unique passwords. Categories: Authentication. Video duration: 1:40

Dictionary Attacks: Explains the dictionary method of brute force password hacking, and how you can stay safe by creating a strong unique password. Categories: Authentication; Passwords. Video duration: 1:15

Email Security Examples.

Email Security Explored: Explores the tactics cybercriminals use to exploit email communication and the dangers of sending emails to unintended recipients. Categories: Email Security; Phishing; Spear Phishing; Whaling; CEO Fraud; Business Email Compromise; Spoofing. Video duration: 7:10

Anatomy of a Whaling Attack: Video telling the true story of a real world whaling cyber attack . Categories: Email Security; CEO Fraud, Ransomware; Whaling; Spear Phishing; Business Email Compromise; Spoofing. Video duration: 5:30

CEO Fraud - Business Email Compromise: Video explains what is CEO Fraud/BEC and how to identify such scams. Categories: Business Email Compromise; CEO Fraud; Email Security; Phishing; Whaling; Spear Phishing; Spoofing. Video duration: 1:34

Clues for Spotting a Phishing Attack: Video explains how to spot a phishing attack. Categories: Phishing; Spear Phishing; Whaling; Email Security. Video duration: 1:45

How to Protect Against Phishing: Covers the tactics and techniques hackers use in phishing attacks, how to spot them and how to protect yourself from future attacks. Categories: Phishing; Business Email Compromise; Vishing; Smishing. Video duration: 12:00

Clues for Spotting Business Email Compromise Attacks: Explains how to spot business email compromise attacks. Categories: Business Email Compromise; CEO Fraud, Email Security; Phishing; Spear Phishing; Whaling. Video duration: 1:34

Social Media Phishing: Explains the tactics of phishing targets through the use of fake social media profiles and posts. Covers what steps you can take to stay safe from this form of cyber attack. Categories: Phishing; Social Media; Social Engineering; Web Security. Video duration: 2:40

Staying Safe from Whaling Attacks: Explains how to stay safe from whaling attacks. Categories: Whaling; Phishing; Email Security; Spear Phishing. Video duration: 2:02

Spear Phishing Standards: Explains how hackers use your habits and hobbies to carry out phishing attacks. Categories: Phishing; Spear Phishing; Email Security; Social Engineering. Video duration: 1:18

What Happens When You Click: Explores the potential consequences of clicking on a malicious link in a phishing mail, text or social media message. Categories: Email Security; Phishing; Incident Response. Video duration: 10:33

Business Email Compromise 101: Explains the tactics cybercriminals use when carrying out targeted spear phishing attacks using compromised email accounts and how to stay safe from them. Categories: Phishing. Video duration: 5:25

Staying Safe from Quishing: Explains what QR code phishing is and provides practical guidance on how to avoid becoming a victim of a fradulent QR code. Categories: Phishing; Mobile Device Security. Video duration: 1:30

Staying Safe from Vishing: Explains vishing with the use of an example and provides tips on how to stay safe from vishing attacks. Categories: Human Firewall; Mobile Device Security; Vishing. Video duration: 1:30

Email Communication Standards: Covers the workplace standards which all employees should apply when using company email. Categories: Email Security. Video duration: 1:09

Malicious Attachments Standards: Explains how malicious attachments are delivered through email. Categories: Malware Awareness; Email Security; Phishing; Spyware. Video duration: 0:51

Phishing Video Training: Explores a phishing email. Categories: Phishing; Email Security; Social Engineering. Video duration: 0:51

Phishing 101: Explains what phishing is, how to spot its red flags and how to protect yourself from phishing attacks. Categories: Email Security; Phishing. Video duration: 3:56

Data Protection Examples.

Data Protection Explored: Explores the concept of data protection and why it’s necessary. Covers the security awareness techniques and legal regulations which can help you protect your data. Categories: Data Protection; Social Media; Web Security; Data Breaches; Privilege Access; Third Party Cookies; Access Control. Video duration: 7:47

Handling Confidential Data Standards: Explains how to handle confidential data from work. Categories: Data Protection; Human Firewall; Working Remotely; Email Security. Video duration: 1:27

How to Protect Confidential Data: Illustrates the different types of confidential data and the secure practices that keep this information private and secure. Categories: Data Protection; Access Control. Video duration: 13:27

Staying Safe from Identity Theft: Explains how to stay safe from identity theft. Categories: Data Protection; Social Engineering. Video duration: 1:46

Workplace Confidentiality 101: Explains how to differentiate between confidential and public information and how to secure confidential information from loss or theft. Categories: Data Protection; Access Control. Video duration: 3:44

Insider Threats: Explains what insider threats are including the different types of insider threats, how to help prevent them and also how to report them anonymously. Categories: Access Control; Authentication; Data Protection; Human Firewall; Physical Security; Social Engineering. Video duration: 4:29

Personally Identifiable Information (PII): Explains what Personally Identifiable Information (PII) is and the measures we can take to help protect it. Categories: CCPA; Data Breaches; Data Protection; GDPR; HIPAA; Human Firewall; Social Engineering; Social Media; Web Security. Video duration: 4:19

HIPAA Overivew: Explains how the Health Insurance Portability and Accountability Act or HIPAA helps protect patients' sensitive data. It also covers who the Act applies to, compliance requirements, best practices, and patients' rights. Categories: Access Control; Data Protection; HIPAA. Video duration: 2:31

SOC 2 Overview: Explains how the SOC 2 compliance framework is used to help ensure service providers store and process client data in a secure manner. Categories: Data Protection; Third Party Vendors. Video duration: 1:58

Social Engineering Explored.

Social Engineering Examples: Explores the types of social engineering attacks cybercriminals use to obtain login credentials and unauthorized access.  Categories: Social Engineering; Passwords; Phishing; Clean Desk. Video duration: 8:04

Social Engineering 101: Explains how cybercriminals use social engineering to steal credentials, confidential data and money, and how to protect against social engineering attacks. Categories: Social Engineering. Video duration: 5:50

Staying Safe from Smishing: Explains how to stay safe from SMS phishing attacks. Categories: Mobile Device Security; Phishing; Malware Awareness; Social Engineering; Smishing. Video duration: 1:33

Staying Safe when Starting a New Job: Explains how to stay safe when starting a new job. Categories: Social Engineering; Passwords. Video duration: 1:28

Advanced Persistent Threat (APT): Explains what Advanced Persistent Threats are the 3 stages of an APT attack. Categories: Phishing. Video duration: 5:23

Gift Card Scams: Explores some common scams associate with gift cards. Categories: Authentication; Phishing; Physical Security; Social Engineering. Video duration🔢25

AI Imposter Scams: Explains how Artificial Intelligence (AI) has made imposter scams more sophisticated and harder to detect. It specifically examines phishing, voice cloning and deepfake scams and provides advice on how to avoid getting scammed. Categories: Authentication; Phishing; Smishing; Spoofing; Social Engineering; Vishing. Video duration: 3:50

Deepfakes: Explains how images, videos or audio can be manipulated to exploit human trust and ultimately expose victims to cyber crime. Categories: Authentication; Phishing; Social Engineering. Video duration: 2:02

Web Security Explored.

Web Security Explored : Covers the origins of the web, the current cyber threats users face, and how to stay safe when browsing the web. Categories: Web Security; Malware Awareness; HTTPS. Video duration: 9:06

Staying Safe when Using Social Media: Explains how to stay safe when using social media. Categories: Social Media; Web Security; Social Engineering; Human Firewall. Video duration: 1:33

How to Browse the Web Securely:  Explains the techniques and practices that can keep you safe while browsing the web. Categories: Web Security; Wi-Fi Security. Video duration: 14:45

Staying Safe when Banking Online: Explains how to stay safe when banking online. Categories: Web Security; Mobile Device Security; HTTPS; Human Firewall. Video duration: 1:19

Staying Safe when Shopping Online: Explains how to stay safe when shopping online. Categories:Web Security; HTTPS; Human Firewall. Video duration: 1:30

HTTP Standards: Explains the importance of using HTTPS protocol while browsing the web. Categories: HTTPS; Web Security. Video duration: 1:18

Staying Safe from Pop-ups: Explains the dangers associated with pop-ups. Categories: HTTPS; Human Firewall; Malware Awareness; Web Security. Video duration: 1:47

Staying Safe from Man in the Middle Attacks: Explains how to stay safe from man in the middle attacks. Categories: HTTPS; Human Firewall; Web Security. Video duration: 1:23

Cloud Security: Explains what cloud computing is, risks involved, responsibilities and best practices organizations should follow to help stay safe in the cloud. Categories: Malware Awareness; Web Security. Video duration: 4:11

Public WiFi 101: Covers the risks involved with using un-secure public WiFi and how to stay safe when working on the move. Categories: Web Security; WiFi Security. Video duration: 5:16

Secure Browsing 101: Covers the cyber security risks associated with browsing the web and how to combat those risks using smart security habits. Categories: Security Updates; Social Media; Web Security. Video duration: 2:54

Social Media Security 101: Explains the importance of security when using social media apps and how you can remain safe from social media phishing. Categories: Social Media; Web Security. Video duration: 4:12

Online Baiting: Covers the types of bait cyber criminals use to try to trap you in downloading malware or revealing confidential information when you're browsing online. Categories: Malware Awareness; Social Engineering; Web Security. Video duration: 1:30

Malware Explored.

Malware Explored: Explores the different types of malware, how they are distributed and how to protect your devices from infection. Categories: Spyware; Malware Awareness; Attachments; Email Security; Phishing; Web Security; Security Updates; Ransomware. Video duration: 9:15

Keyloggers: Keyloggers can track every keystroke entered into your computer or mobile device. This short video provides an overview of the types of keyloggers being used by cybercriminals and guidance on how to keep yourself and your devices safe. Categories: Physical Security; Spyware; Removeable Media Security; Malware Awareness; Wi-Fi Security. Video duration: 2:00

Malware 101: Explains the danger that malicious software poses to your personal devices and work networks along with providing guidance on how to protect against malware attacks. Categories: Malware Awareness. Video duration: 4:02

Ransomware: Explains how to stay safe from ransomware. Categories: Email Security; Malware Awareness; Ransomware; Web Security. Video duration: 1:54

Spyware Attacks: Explains what spyware is and how it affects a person. Categories: Malware Awareness; Spyware. Video duration: 1:34

Mobile Banking Trojans: Explains how mobile banking trojans target sensitive data and compromise mobile app security. Categories: Malware Awareness; Spyware. Video duration: 2:10

Ransomware Attacks: Explores how ransomware works and why the additional layers of extortion that can be applies through ransomware make it one of the most dangerous forms of malicious software. Categories: Malware Awareness. Video duration: 2:44

Working Remotely Explored.

Working Remotely Explored: This section explores the potential cybersecurity risks of remote working and provides guidance on how to stay safe while working on the move.  Categories: Social Media; Wi-Fi Security; Web Security; Working Remotely; Physical Security; Passwords; Multi-factor Authentication; Mobile Device Security; Removeable Media Security; Access Control. Video duration: 7:05

Staying Safe when Working from Home or on the Move : Explains how to stay safe when working from home or on the move.  Categories: Working Remotely; Wi-Fi Security; Removeable Media Security; Mobile Device Security; Human Firewall. Video duration: 1:21

Staying Safe when Using Public Wi-Fi: Explains how to stay safe when using public Wi-Fi. Categories: Wi-Fi Security; Working Remotely; Human Firewall; Spoofing. Video duration: 1:3.

Wi-Fi Standards: Video explains the risk of using open Wi-Fi . Categories: Wi-Fi Security; Web Security; Working Remotely. Video duration: 1:05 

Home Wi-Fi Standards: Explains the importance of keeping home Wi-Fi secure. Categories: Authentication; Passwords; Physical Security; Web Security; Wi-Fi Security; Working Remotely. Video duration: 1:11

Mobile and Removable Device Security Explored.

Mobile and Removable Device Security Explored: This selection of training videos explores the benefits and risks of using mobile devices and provides best practice on how to secure your devices. Categories: Mobile Device Security; Working Remotely; Wi-Fi Security; Web Security; Physical Security; Social Engineering; Multi-factor Authentication. Video duration: 6:15

Removable Media: Video explains the importance of treating all external data storage devices as potentially dangerous. Categories: Removeable Media Security; Pretexting; Social Engineering; Mobile Device Security. Video duration: 1:38

Staying Safe when Using your Mobile Phone: Explains how to stay safe when using your mobile phone. Categories: Mobile Device Security; Wi-Fi Security. Video duration: 1:33

Malicious USB: Explores the cyber crime tactic of juice jacking: Infecting USB charging ports or using malicious USB charging cables to hijack a targets device. Categories: Malware Awareness; Mobile Device Security. Video duration: 2:11

Vishing 101: Covers voicemail phishing, what they are, why they are often effective and how to stay safe from them. Categories: Phishing; Vishing. Video duration: 5:00

Bluetooth Hijacking: Covers the range of cyber attacks hackers commit on bluetooth devices and how to protect against them. Categories: Access Control; Mobile Device Security; Removable Media Security. Video duration: 2:35

Mobile Devices 101: Explainss the potential security risks involved in using mobile devices and how to protect your mobile and removable media devices. Categories: Mobile Device Security; Wi-Fi Security. Video duration: 4:21

SIM Swapping: Explains how cybercriminals can manipulate cellular service providers to transfer a victim's phone service to a SIM card under their control. Topic: Mobile/Removable Devices. Categories: Mobile Device Security; Social Engineering.

One of the best awareness training tools.

One of the best awareness training tools I have seen and used. One of the benefits that I loved was the fact that I did not have to make any change to my current environment to get the software running, as everything is Cloud based. For us it was really important that the solution catered for more than just phishing.

Paul P.

CEO

SafeTitan reduces security risks.

SafeTitan reduces security risks by creating end-user awareness of critical security threats such as phishing emails. It can tailor the training specific to the employee’s needs, rather than training the whole organization. Reporting employee security training is perfect for compliance requirements.

Marie T.

CEO

SafeTitan is the tool to use.

If you are looking for a diverse cybersecurity training platform, then look no further, SafeTitan is the tool to use. With the simple ease-of-use, I can set up my whole year of security training in a day or two, and know that it will execute without fail. We should have used this a long time ago.

John D.

Software Enginner

A great all round product

Comments: Its a good product for the price, easy to use and setup. Its a low upkeep product, once its setup and you have scheduled in your training campaigns, its all automatic from there.

Lewis

IT Technician

Easy to use and at a great price point!

Comments: Our overall experience with SafeTitan has been excellent! The tool provides our organization and customers with the tools required to combat cyber threats. Pros: In today’s cyber environment and proliferation of cyber threats, all SafeTitan’s features are impactful and help prepare our users and customers for the challenges facing all organizations from threat actors. The product was easy to setup and integrate into our operations. Cons: There is really nothing to dislike about SafeTitan and the product is continually being improved. If we ever have a question or issue, support is immediate and first class!

Thomas

Manager

Physical Security

Clean Desk: Explains the importance of keeping confidential documents safe and not leaving items on your office desk. Categories: Clean Desk; Physical Security; Social Engineering. Video Duration: 1:15

Physical Security 101: Explains how to secure physical files, devices, and locations against cyber threats. Categories: Physical Security. Video Duration: 3:58

Shoulder Surfing: Explains why not to share confidential information with people who are not authorized. Categories: Physical Security; Social Engineering. Video Duration: 1:21

Tailgating: Explains what tailgating is and how to prevent it. Categories: Physical Security; Social Engineering; Tailgating. Video Duration: 1:14

USB Baiting: Explains how USB dropping or baiting can give a cybercriminal access to your company's networks, the red flags that indicate a drop attack, and the security precautions you can take to prevent one. Categories: Access Control; Malware Awareness; Physical Security. Video Duration: 3:35 ​

IT Security Professionals

OWASP Top 10: Explains what the Open Web Application Security Project (OWASP) is and lists the current top 10 web application security risks. Categories: Coding; Data Protection; Data Breaches; Patch Management; Secure Development; Vulnerability Assessments; Web Security. Video Duration: 7:01

Supply Chain Attacks: Explores the cyber risks associated with supply chains. Categories: Data Breaches; Secure System Configuration; Third Party Vendors; Vulnerability Assessments. Video duration: 1:35 ​

C-Suite

Stay Safe by Reporting Security Incidents: Covers the tips for reporting security incidents and steps to follow. Categories: C-Suite Stay Safe Series; Data Breaches; Incident Response. Video Duration: 2:30

Stay Safe From Whaling: Covers tips for company executives to stay safe from phishing or other forms of attack. Categories: C-Suite Stay Safe Series; Phishing; Spear Phishing; Social Engineering; Whaling. Video Duration: 3:19

Stay Safe While Working From Home: Covers the tips for staying safe while working from home. Categories: C-Suite Stay Safe Series; Removable Media Security; WiFi Security; Working Remotely. Video Duration: 2:47

Stay Safe With Strong Passwords: Covers easy tips to follow to better protect yourself with a strong password. Categories: Authentication; C-Suite Stay Safe Series; Passwords; Multi-factor Authentication. Video Duration: 3:31

Stay Safe While Working on the Move: Covers the tips for keeping your data safe while outside your office. Categories: C-Suite Stay Safe Series; Mobile Device Security; Social Engineering; WiFi Security; Working Remotely. Video Duration: 3:08

Why choose TitanHQ Security Awareness Training?

TitanHQ Security Awareness Training is powered by 25 years of cutting-edge security innovation and expertise. Our expert team safeguards thousands of organizations and MSPs globally, bringing unparalleled experience to ensure your security training is comprehensive and proactive. Cybercriminals rely on your users falling for their scams and phishing emails but you can fight security threats with TitanHQ Security Awareness Training. Equip your users to recognize and respond to potential security risks with Security Awareness Training.

Remediate Risk with Automated Security Awareness Training!

Traditional security awareness training programs no longer measure up. Maintaining them requires significant effort, yet they don't enhance security. With TitanHQ SAT, you enjoy a hands-off, set-and-forget experience. Our security experts design and schedule security training for your users continually. With TitanHQ SAT you can enable your employees to recognize and report cyber threats through engaging, contextual, and narrative-driven lessons fully managed by TitanHQ. Campaign management and reporting happen automatically in the background.

Want to learn more? Sign up for a demo and we'll show you TitanHQ SAT in action.

Book Free Demo

Geraldine Hunt

Geraldine Hunt

  • SECURITY AWARENESS TRAINING

Talk to our Team today

Talk to our Team today