Now available in our content library!

Why Global Learning Systems?


Global Learning Systems (GLS) started nearly 30 years ago, combining two former subsidiaries: Electronic Learning Facilitators (ELF), developers of award-winning custom learning solutions, and Keystone Learning, pioneers of video-based, web-hosted software and business skills training products. Today GLS puts its 30 years of experience providing employee security awareness and compliance training programs, supported by their OnDemand Learning Management System. Their program effectively promotes cybersecurity behavior change, protects your organization, and strengthens the human element.

  • Location Columbia, MD
  • Website
  • Founded 2006
  • Content Focus Phishing Awareness, PCI Compliance, Physical Asset Security
Request a Demo


With over 30 years of experience developing behavior change programs, GLS training experts have designed off-the-shelf learning products focused on changing high-risk employee behaviors. 

Award Winning

Cybersecurity GLS has been recognized in the Gartner Magic Quadrant for Security Awareness Computer-based Training for five consecutive years. 

Content Lineup


Below are training courses that can be assigned to users.

Name Description
Security Short: The Human Firewall™ When it comes to information security, an organization is only as secure as its weakest link. This short video explains this using the concept of Human Firewall™ — that information security depends on the security practices of everyone. It also describes the security measures each employee should take to strengthen the organization’s Human Firewall™.
Security Short: Individual Responsibility A security-minded culture within the organization is critical for information security. This short video helps communicate just that. It points out the common mistakes that employees make when handling data, and more importantly, it lists the simple actions that employees can take in their day-to-day routine to secure information at the workplace.
Security Short: Phishing Emails Organizations are regularly targeted by phishing attacks, and many employees are not aware of how to spot or properly dispose of malicious emails. In this short video, users will learn what phishing is, how to recognize phishing emails, and what to do if they receive a phishing email.
Security Short: Ransomware A common tool that cybercriminals use is ransomware, which is malicious software that infects the victim’s computer, encrypts files, and demands a ransom be paid for decrypting the files. In this short ransomware prevention video, employees will learn the basics of ransomware and how to defend against it. What is it? How does it infect computers? What can you do to avoid being a victim and protecting your organization? This video answers all these questions, and helps ensure that every member of the organization is aware and equipped to deal with a potentially deadly attack.
Security Short: Smishing Phishing is not limited to emails; text message phishing — or SMiShing — is also a popular tool of choice for cyber criminals. Similar to a phishing email, a scammer will embed a bad link in a text message, taking whoever clicks to a malicious website. This short video explains to users how SMiShing works, what SMiShing text messages look like, and what they can do to avoid becoming victims.
Security Short: Voice Phishing Phishing is typically associated with malicious emails, but it’s critical to know that voice phishing — also known as “vishing” — is also a strategy that cybercriminals use.
Security Short: Social Media Posts With social media, too much information can be shared inadvertently, especially when individuals confuse confidential information with public information, or mistakenly think that what they’re post will be kept “private” by security settings.This short video explains the common pitfalls of using social media as a communication tool, as well as business use of social media. It explains what information should not be shared and what should be done to use social media securely.
Security Short: Social Engineering in Social Networks Because social networks are so popular, criminals often use them to learn about a user, and use that information to target him/her with a more specific and convincing scam. This short video on social media for employees educates users on the common tactics that cybercriminals use in social networks and what they can do to avoid becoming victims.

Last Updated 12/7/2021

Name Description
InfoSec Best Practices Module: Setting Up Secure Passwords Setting strong passwords is extremely important, for passwords are the gateway to computer systems and sensitive data. This course teaches how to distinguish between strong and weak passwords, create a strong and memorable password using a passphrase, and secure your accounts using strategies such as multiple passwords and changing passwords often.
InfoSec Best Practices Module: Avoiding Phishing Message Threats According to a Verizon report, 30 percent of phishing emails are actually opened, and 12 percent of those targeted click on the infecting link or attachment. This course teaches what phishing is, how to recognize a phishing email or text message by looking for specific characteristics, what to do if you receive a phishing email or text message, and how to secure devices against potential phishing attempts.
Infosec Best Practice Module: Avoid Spear Phishing Threats In recent years, cyber criminals have upped their game by moving from generic largescale phishing attacks to spear phishing attacks — an attack where cyber criminals target specific high-value targets after conducting extensive research on them. This course helps doing just that. It puts the user into the shoes of two regular employees and helps them avoid spear phishing.
Infosec Best Practice Module: Safe Social Networking Social networks are a great tool for promoting business, but they make it just as easy to share sensitive or damaging information. This course teaches how to use social networks safely. Specifically, it teaches how to avoid the most common risky behaviors on social networks and which privacy settings to use on social networks

Last Updated 12/7/2021

Name Description
Shock & Awareness Video: Safe Social Networking Smart phones are a growing target for cyberattackers as their features, operating systems and data storage capabilities evolve. The Rapid Awareness Attacks on Smart Phones course explores mobile devices and how they are targeted by cybercriminals through vishing phone calls, SMiShing messages and malicious apps.
Shock & Awareness Video: Phishing Business email compromise is a highly-sophisticated phishing threat that cost organizations in the United States more than $12 billion in the last decade. The Rapid Awareness Business Email Compromise course reveals common warning signs of these attacks, potential data and financial targets and tips for identifying and responding to potential attacks.
Shock & Awareness Video: Responsibility While phishing emails and vishing calls are separate distinct threats, they are increasingly combined into coordinated attacks that appear more legitimate and enticing to end users. This course examines how cybercriminals utilize these combined techniques and how users can protect themselves before, during and after a combined phishing and vishing attack attempt.
Shock & Awareness Video: Passwords The Rapid Awareness Cybersecurity at Home course highlights the common threats and prevention strategies that affect users on home wireless networks, personal devices and phishing, vishing and SMiShing attacks at home. Users will learn how to protect against cyber threats outside the office.

Last Updated 12/7/2021

Name Description
Security Awareness Essentials Challenge Despite the best efforts of organizations worldwide, cybercrime is rising rapidly, and it is expected to cost organizations a stunning amount in 2019: $2 trillion. This is because human error continues to be the biggest threat to information security. This course aims to mitigate human error by teaching how to classify data, secure mobile devices, secure remote and home offices, avoid social engineering scams like pretexting and phishing, and create strong passwords. The course engages users by describing real-life security challenges and asking them to choose the best course of action for each challenge.
Anti-Phishing Essentials With phishing becoming the weapon of choice for cybercriminals, it's important to be vigilant and prevent attacks. This course teaches how to avoid becoming a victim of phishing attacks by explaining how phishing attacks work and how to recognize a phishing email.

Last Updated 12/7/2021

Sample Training Pages


After a user clicks on a phishing campaign they will be shown a training page. Below are a few training pages using Global Learning Systems content.

Frequently Asked Questions


Yes. Many of the available courses are of a short duration.