Core Training, Micro Topics & Compliance

Search the course library by title, description, and category

PhishingBox gives security teams a flexible course catalog they can browse before rollout. Use the category icons below or search the library to find cybersecurity courses tied to phishing, business email compromise, AI security, mobile device security, privacy and PII, ransomware, and more. If you want to compare delivery models like training moments, annual programs, KillPhish, and SecurityTips, visit our Cybersecurity Training page.

Browse by Category

Use the category carousel to jump the Course Library to matching courses faster.

Course Library

Find the right cybersecurity course fast

Search by course title or description and combine it with course and category filters for a quick path into the PhishingBox catalog. When you are ready to see how these courses support recurring assignments, phishing-triggered remediation, and embedded coaching, take a look at our Cybersecurity Training page.

32 searchable course cards

Showing all 32 courses.

Browsing all categories.
Core Training 5 categories

Phishing Awareness

Teach employees to recognize deceptive emails, malicious links, attachment tricks, and urgency cues before they click.

  • Phishing
  • Safe Emailing
  • +3 more
Core Training 6 categories

Social Engineering

Help employees recognize manipulation techniques across email, phone, text, and in-person interactions before trust is exploited.

  • Social Engineering
  • Phishing
  • +4 more
Core Training 7 categories

Information Security Awareness

Cover the core behaviors behind a stronger security culture, including safe handling, reporting, authentication, and incident awareness.

  • Information Security
  • Security Hygiene
  • +5 more
Core Training 5 categories

Business Email Compromise

Show teams how to spot impersonation, invoice fraud, urgent wire requests, and executive spoofing before funds or credentials are exposed.

  • Payment Security
  • Phishing
  • +3 more
Core Training 3 categories

Password Security

Promote stronger passwords, password managers, and better credential hygiene to reduce account takeovers and reuse risk.

  • Password Security
  • Information Security
  • +1 more
Core Training 3 categories

Multi-Factor Authentication

Show why MFA matters, how prompt fatigue and bypass tactics work, and what safer authentication habits look like.

  • Password Security
  • Information Security
  • +1 more
Core Training 4 categories

Data Privacy

Help employees handle personal and sensitive data responsibly, reduce oversharing, and support privacy obligations across everyday work.

  • Privacy and PII
  • Compliance
  • +2 more
Core Training 4 categories

HIPAA Training for End Users

Help employees understand HIPAA responsibilities, protect patient information, and handle healthcare data more safely in day-to-day work.

  • Compliance
  • Privacy and PII
  • +2 more
Core Training 1 category

Sexual Harassment Prevention

Train employees to understand what sexual harassment is, how to recognize it, and how to respond using the right reporting and intervention procedures.

  • Compliance
Core Training 4 categories

Understanding GDPR: A Guide for End Users

Give employees a concise, practical overview of GDPR so they can handle personal data more responsibly and respond appropriately to privacy-related requests or incidents.

  • Compliance
  • Privacy and PII
  • +2 more
Core Training 5 categories

Mobile Device Security

Train employees to secure phones and tablets used for work with safe apps, device controls, and cautious network behavior.

  • Mobile Device Security
  • Information Security
  • +3 more
Core Training 4 categories

Safe Browsing Practices

Reduce exposure to malicious sites, unsafe downloads, and browser-based scams with practical browsing habits employees can use every day.

  • Safe Browsing
  • Malware
  • +2 more
Core Training 5 categories

Malicious Downloads

Explain how fake updates, attachments, and cracked software introduce malware, ransomware, or credential theft into the organization.

  • Malware
  • Ransomware
  • +3 more
Core Training 4 categories

Physical Security

Connect cybersecurity to badges, tailgating, workstation locking, and device protection so physical gaps do not become digital breaches.

  • Physical Security
  • Information Security
  • +2 more
Core Training 5 categories

Clean Desk Policy

Reinforce simple habits for securing printed documents, notes, badges, and unattended devices in shared or public workspaces.

  • Physical Security
  • Privacy and PII
  • +3 more
Core Training 5 categories

Safe Remote Work Practices

Prepare hybrid and remote teams to work securely with home Wi-Fi, VPNs, collaboration tools, and shared-device safeguards.

  • Working Remote Securely
  • Safe Browsing
  • +3 more
Core Training 5 categories

Insider Threat Awareness

Teach users how insider risk shows up, what warning signs matter, and how to report suspicious behavior without creating friction.

  • Incident Response
  • Information Security
  • +3 more
Core Training 4 categories

Social Media Security

Show how public oversharing, impersonation, and social reconnaissance can be used against employees and the organization.

  • Social Media Security
  • Social Engineering
  • +2 more
Core Training 5 categories

AI Security Practices

Teach employees how generative AI and everyday AI tools change cyber risk, from prompt leakage to unsafe sharing and unverified outputs.

  • AI Security
  • Privacy and PII
  • +3 more
Micro Topic 5 categories

Business Email Compromise

A focused micro lesson on executive impersonation, vendor fraud, and suspicious payment requests.

  • Payment Security
  • Phishing
  • +3 more
Micro Topic 4 categories

CAPTCHA Scams

Train users to spot fake verification pages and browser prompts used to deliver malware or steal credentials.

  • Phishing
  • Safe Browsing
  • +2 more
Micro Topic 4 categories

Deepfakes

Teach employees how AI-generated audio, video, and images can be used in fraud, impersonation, and social engineering.

  • AI Security
  • Social Engineering
  • +2 more
Micro Topic 5 categories

Phishing Attachments

A quick lesson on suspicious file types, macro-enabled documents, cloud-share lures, and safe handling steps.

  • Phishing
  • Malware
  • +3 more
Micro Topic 5 categories

QR Code Scams

Help users treat QR codes like links, verify destinations, and avoid quishing scams in physical and digital settings.

  • Phishing
  • Mobile Device Security
  • +3 more
Micro Topic 4 categories

Phishing in the Cloud

A quick refresher on phishing lures delivered through cloud apps, shared files, and everyday collaboration tools.

  • Phishing
  • Safe Browsing
  • +2 more
Micro Topic 5 categories

Ransomware

A short lesson on how ransomware spreads, what warning signs matter, and how fast reporting helps reduce damage.

  • Ransomware
  • Malware
  • +3 more
Micro Topic 4 categories

Recognizing Insider Threats

Help employees spot risky internal behavior, unusual access patterns, and warning signs that should be escalated early.

  • Incident Response
  • Information Security
  • +2 more
Micro Topic 3 categories

Reporting Incidents

Teach employees what to report, when to escalate, and how fast action supports investigation and containment.

  • Incident Response
  • Information Security
  • +1 more
Micro Topic 5 categories

Sensitive Info in Email

A focused lesson on reducing privacy and data exposure when sending confidential or regulated information through email.

  • Safe Emailing
  • Privacy and PII
  • +3 more
Micro Topic 4 categories

Smishing

A quick refresher on text-message phishing, fake delivery notices, and malicious links sent to mobile devices.

  • Smishing
  • Phishing
  • +2 more
Micro Topic 4 categories

Update to Stay Safe

Reinforce why timely software and device updates matter for closing security gaps before attackers can exploit them.

  • Security Hygiene
  • Information Security
  • +2 more
Micro Topic 4 categories

Vishing

Show employees how attackers use phone calls and voicemail to create urgency, collect data, or steal access.

  • Vishing
  • Phishing
  • +2 more

Note: All searchable courses below are available inside the PhishingBox learning experience so visitors can browse categories publicly, then launch training from a free trial account. This search does not include third-party training content that is also available for purchase through the PhishingBox Content Library. If you want to see how these courses fit into training moments, scheduled programs, KillPhish, and SecurityTips, visit our Cybersecurity Training page.