March 2, 2026
This Cyber Security course covers today’s most critical security topics, ranging from phishing and ransomware to AI-powered attacks and remote work risks. It provides a practical look at how to recognize common threats — like social engineering and deepfakes — while teaching essential best practices for password security, data protection, and safe internet usage.
Because cyber threats are constantly evolving, this training is designed for every employee across the organization. It is important to take because it outlines your specific role in protecting company assets and provides clear procedures for reporting incidents and preserving evidence. By completing this course, you’ll gain the necessary skills to verify suspicious communications and help maintain a secure environment for everyone.
What's New?
1. Structural Efficiency
Version 6 streamlines the course by consolidating fundamental topics while expanding into modern technical threats.
Integrated Content: Version 5 utilized separate lessons for Social Engineering and Phishing; Version 6 combines these into a single, high-impact module to reflect how these threats overlap in the real world.
Reduced Lessons: This course has been consolidated from 10 lessons down to 9.
Logical Reorganization: Version 6 introduces "Understanding PII" as a dedicated strategic area to explain the value of the data being protected, rather than just the methods of protection.
Modular Reporting: Incident response and policy acknowledgment are now grouped together in the final content lesson, creating a clearer "Call to Action" for the learner.
2. Video Scenarios
The video content has shifted from "office-based mishaps" to "sophisticated threat detection and psychological awareness."
Modern Scenarios: Includes higher-stakes psychological manipulation, such as a vendor using "Authority and Urgency" to bypass security reviews.
Technical Warning Signs: New videos specifically teach users how to spot "Software Update Traps" (malware disguised as official pop-ups) and how to handle urgent bank alerts by trusting instincts and verifying through independent channels.
Device Management: Version 6 adds a specific scenario on "Remote Lock and Wipe" procedures for lost devices containing client data, reflecting the reality of modern remote and hybrid work.
3. Content & Terminology Shifts
Version 6 introduces contemporary terminology and addresses the current 2024-2026 threat landscape, moving away from "Basic Hygiene" toward "Proactive Defense."
Authentication Evolution: Shifts focus from simple "Password Strength" to Modern Authentication, emphasizing MFA (Multi-Factor Authentication), hardware security keys, and authenticator apps.
AI and Synthetic Media: Introduces critical new concepts like AI-Powered Attacks, Deepfakes, and Voice Cloning, which were not present in the Version 5 curriculum.
Security Philosophy: Moves from general compliance to the "Zero Trust" framework—the industry-standard philosophy of "Never trust, always verify."
Modernized Attack Vectors: Updates terminology to include Quishing (QR Code Phishing) and BEC (Business Email Compromise), reflecting how attackers have moved beyond simple text-based emails.
Advanced Malware Concepts: Expands the malware discussion to include RaaS (Ransomware as a Service) and Supply Chain Attacks, helping users understand that threats often come through trusted third-party vendors.
This Course Teaches:
- How to recognize common cyber threats including social engineering, phishing, malware, ransomware, and AI-powered attacks.
- Security best practices for passwords, authentication, data protection, and safe internet usage.
- How to identify and verify suspicious communications, deepfakes, and manipulation attempts before responding.
- Proper incident response procedures — including immediate reporting, evidence preservation, and cooperation with security teams.
- Organizational security policies and employee’s role in protecting company assets and data.
Resources
If you have an LMS-connected account, you can download the SCORM file for the Cyber Security course. For more information, please refer to the Cyber Security content article for additional information.