Courses

  • 1 Module

    Anti-Bribery and Corruption

    Embracing Anti-Bribery: Your Vigilance Matters!

  • 1 Module

    Anti-Bullying & Harassment

    Bullying within the workplace can be hard to spot, but for the person being bullied, it can be emotional and physical turmoil. When you or…
  • 1 Module

    Anti-Money Laundering

    This course is your gateway to the world of anti-money laundering (AML) in the UK, and it’s designed for those who are new to the…
  • 1 Module

    Data Protection

    Data protection should be obvious, but unfortunately, our data continues to be taken advantage of worldwide every single day. If you run a business and…
  • 1 Module

    Distributed Working

    The world has changed. Gone are the days of being forced to sit in a tall slab of concrete from 9-5. Today’s working environment is…
  • 1 Module

    Health & Safety

    Your organisation’s mission is to stand side-by-side with businesses to manage the demands and rewards of today’s ‘always-on’ digital world. At the core of this…
  • 1 Module

    Online Safety

    Unlock digital safety in this comprehensive course. Dive deep into defending against cyber threats like malware, hacking, and social engineering. Learn the art of secure…
  • 1 Module

    Passwords

    A password is more than just something you blindly type in when logging into a system at work or home. Passwords are the first line…
  • 1 Module

    Phishing

    Cyber criminals are intelligent individuals. They are notorious for hoodwinking even the savviest of CEOs and bigwigs from high-end organisations and governments all around the…
  • 1 Module

    Physical Security

    Cyber criminals never rest. They sleep with one eye open to continually find new ways to penetrate your home and workplace’s shields, working hard to…
  • 1 Module

    Security Essentials

    Great cyber security is the only thing that stands between us and the criminals on the internet. Without it, our personal data would be left…
  • 1 Module

    Telephone Attacks

    Cyber criminals target using our most trusted form of communication: our phone. The technology behind telecommunications is open for exploitation – and cyber criminals know…