PhishingBox Logo
Request Demo Sign Up 14-Day Free TrialNo Credit Card Required.
Core Training & Micro Topics

Search the course library by title, description, and training topic

PhishingBox gives security teams a flexible course catalog they can browse before rollout. Use the topic cards below or search the library to find cybersecurity courses tied to phishing, business email compromise, AI security, mobile device security, privacy and PII, ransomware, and more. If you want to compare delivery models like training moments, annual programs, KillPhish, and SecurityTips, visit our Cybersecurity Training page.

Note: All searchable courses below are available inside the PhishingBox learning experience so visitors can browse topics publicly, then launch training from a free trial account. This search does not include third-party training content that is also available for purchase through the PhishingBox Content Library.

Training Topics

Browse cybersecurity courses by topic

Select a topic to filter the course library below. Courses can appear in multiple categories so teams can find training the way they naturally search for it.

Course Library

Find the right cybersecurity course fast

Search by course title or description and combine it with topic and format filters for a quick path into the PhishingBox catalog.

21 searchable course cards

Showing all 21 courses.

Browsing all topics.
Core Training 5 topics

Phishing Awareness

Teach employees to recognize deceptive emails, malicious links, attachment tricks, and urgency cues before they click.

  • Phishing
  • Safe Emailing
  • +3 more
Core Training 6 topics

Social Engineering

Help employees recognize manipulation techniques across email, phone, text, and in-person interactions before trust is exploited.

  • Social Engineering
  • Phishing
  • +4 more
Core Training 7 topics

Information Security Awareness

Cover the core behaviors behind a stronger security culture, including safe handling, reporting, authentication, and incident awareness.

  • Information Security
  • Security Hygiene
  • +5 more
Core Training 5 topics

Business Email Compromise

Show teams how to spot impersonation, invoice fraud, urgent wire requests, and executive spoofing before funds or credentials are exposed.

  • Payment Security
  • Phishing
  • +3 more
Core Training 3 topics

Password Security

Promote stronger passwords, password managers, and better credential hygiene to reduce account takeovers and reuse risk.

  • Password Security
  • Information Security
  • +1 more
Core Training 3 topics

Multi-Factor Authentication

Show why MFA matters, how prompt fatigue and bypass tactics work, and what safer authentication habits look like.

  • Password Security
  • Information Security
  • +1 more
Core Training 4 topics

Data Privacy

Help employees handle personal and sensitive data responsibly, reduce oversharing, and support privacy obligations across everyday work.

  • Privacy and PII
  • Compliance
  • +2 more
Core Training 5 topics

Mobile Device Security

Train employees to secure phones and tablets used for work with safe apps, device controls, and cautious network behavior.

  • Mobile Device Security
  • Information Security
  • +3 more
Core Training 4 topics

Safe Browsing Practices

Reduce exposure to malicious sites, unsafe downloads, and browser-based scams with practical browsing habits employees can use every day.

  • Safe Browsing
  • Malware
  • +2 more
Core Training 5 topics

Malicious Downloads

Explain how fake updates, attachments, and cracked software introduce malware, ransomware, or credential theft into the organization.

  • Malware
  • Ransomware
  • +3 more
Core Training 4 topics

Physical Security

Connect cybersecurity to badges, tailgating, workstation locking, and device protection so physical gaps do not become digital breaches.

  • Physical Security
  • Information Security
  • +2 more
Core Training 5 topics

Clean Desk Policy

Reinforce simple habits for securing printed documents, notes, badges, and unattended devices in shared or public workspaces.

  • Physical Security
  • Privacy and PII
  • +3 more
Core Training 5 topics

Safe Remote Work Practices

Prepare hybrid and remote teams to work securely with home Wi-Fi, VPNs, collaboration tools, and shared-device safeguards.

  • Working Remote Securely
  • Safe Browsing
  • +3 more
Core Training 5 topics

Insider Threat Awareness

Teach users how insider risk shows up, what warning signs matter, and how to report suspicious behavior without creating friction.

  • Incident Response
  • Information Security
  • +3 more
Core Training 4 topics

Social Media Security

Show how public oversharing, impersonation, and social reconnaissance can be used against employees and the organization.

  • Social Media Security
  • Social Engineering
  • +2 more
Core Training 5 topics

AI Security Practices

Teach employees how generative AI and everyday AI tools change cyber risk, from prompt leakage to unsafe sharing and unverified outputs.

  • AI Security
  • Privacy and PII
  • +3 more
Micro Topic 5 topics

Business Email Compromise

A focused micro lesson on executive impersonation, vendor fraud, and suspicious payment requests.

  • Payment Security
  • Phishing
  • +3 more
Micro Topic 4 topics

CAPTCHA Scams

Train users to spot fake verification pages and browser prompts used to deliver malware or steal credentials.

  • Phishing
  • Safe Browsing
  • +2 more
Micro Topic 4 topics

Deepfakes

Teach employees how AI-generated audio, video, and images can be used in fraud, impersonation, and social engineering.

  • AI Security
  • Social Engineering
  • +2 more
Micro Topic 5 topics

Phishing Attachments

A quick lesson on suspicious file types, macro-enabled documents, cloud-share lures, and safe handling steps.

  • Phishing
  • Malware
  • +3 more
Micro Topic 5 topics

QR Code Scams

Help users treat QR codes like links, verify destinations, and avoid quishing scams in physical and digital settings.

  • Phishing
  • Mobile Device Security
  • +3 more