BullPhish ID Training Course Library
Short, engaging training videos that mitigate human risk
The BullPhish ID training course library contains 100+ video lessons on topics such as common cybersecurity threats, phishing, security best practices and compliance regulations. Fresh courses are added on a regular basis to keep up with the changes in the cybersecurity landscape.
Most courses are available in multiple languages and are accompanied by a six-question quiz to measure knowledge retention.
Compliance Regulations Education
- CMMC 2.0 Level 1: Foundational Cybersecurity Practices
- CMMC 2.0 Level 2: Advanced Cybersecurity for Controlled Unclassified Information
- CMMC 2.0 Level 3: Expert Cybersecurity for National Defense
- Consequences of PHI Release
- Cybersecurity Essentials with NIST CSF 2.0
-
Digital Operational Resilience Act (DORA) Introduction
-
EU Cybersecurity Act (CSA) Introduction
- EU GDPR for Data Breach Notification for Processors: Organization’s Next Steps
- EU GDPR for Data Processors
- EU GDPR: Consequences of GDPR Release
- EU GDPR: Important Definitions
- EU GDPR: What is GDPR?
- GDPR Rights of Data Subjects Stored Processed Destroyed
- HIPAA: Overview of the Privacy Rule and Security Rule
- Identifying Controlled Unclassified Information (CUI)
- Intro to the UK General Data Protection Regulation
- Introduction to CMMC 2.0
- Introduction to HIPAA
-
NIS 2 Directive (Network and Information Systems Directive) Introduction
- NIST 800-171 Overview
- NIST 800-171: Who is Required to Comply & What Information is Protected
- NIST AI RMF: Preventing Risks in AI Applications
- NIST CSF: Introduction
- NIST Incident Response
- NIST Incident Response Overview
- PCI-DSS
- PIPEDA Overview (Canada)
- PIPEDA: PIPEDA and Provincial Privacy Statutes (Canada)
- PIPEDA: The 10 Principles
- Sarbanes-Oxley (SOX) Overview
- UK GDPR vs EU GDPR
- UK NCSC: Defending Against AI-Driven Cyber Threats
- Understanding NIST 800-171
- What is PHI/ePHI?
Cyberthreat Education
- COVID-19 and Government Spoofing Threats
- How to Defend Against Autonomous AI Threats
- Introduction To Social Engineering
- Malware Awareness
- Nation-State Cybercrime: How Employees May Encounter Nation-State Threats
- Nation-State Cybercrime: Industrial and Infrastructure Targets
- Pretexting
- Ransomware Basics
- Ransomware- Downloads and Attachments
- Ransomware/Malware: Malicious Links & Websites
- Safe Web Browsing: Domain Spoofing & Website Forgery
- Shadow AI Threats: Data Governance Failures and Security Risks
- Smishing & Vishing
- Social Engineering: Baiting
- Social Media Phishing
- Tailgating & Piggybacking
- Token Theft: How Hackers Steal Your Digital Keys
- What is Account Takeover (ATO)?
- What is an Insider Threat?
Data Protection & Privacy
- Data Privacy in the US
- Data Protection: Data Encryption
- Data Protection: Privacy Risks
- Data Protection: Secure Connections
- Data Protection: Secure Data Storage
- Insider Risk: Spotting Malicious Insiders
- Mobile Security: Mobile Storage
- PHI Physical Security
- PHI Policy
- Privacy and Data Classification
- Understanding Common Types of Data Breach
Password Protection and Best Practices
- Benefits Of Multi-Factor Authentication
- Choosing Strong MFA Second Factors
- Dangers Of Password Reuse
- Executive Impersonation/Whaling
- Good Password Practices
- How to Protect Credentials from Brand Impersonation
- How to Protect Credentials Using Multifactor Authentication
- Introduction to Password Security
- Introduction to Protecting Credentials
- SIM Card Swap Scam
- The Basics of Multi-Factor Authentication
- The Benefits of Password Managers
- The Dangers of Password Sharing
Phishing
- AI Deception: Recognizing Deepfake Scams
- BEC Invoice/Urgent Payment Required Scams
- BEC Techniques & Red Flags
- Business Email Compromise
- Business Email Compromise (BEC) – Credential & Data Theft Scams
- Business Email Compromise (BEC): Gift Card Scams
- Common Phishing Attack Methods
- Common Phishing Attack Types
- How to Avoid Phishing Scams
- Introduction to Business Email Compromise (BEC)
- Introduction to Phishing
- Introduction to Vishing/Smishing
- Phishing Scams: Cryptocurrency, Military and Romance
- Phishing: The Dangers of Malicious Attachments
- Phishing: Social Media/Angler Phishing
- Phishing-Brand Fraud & Spoofing
- The Dangers of AI-Generated Phishing
Security Awareness
- AI and Cybersecurity: Safe AI Tool Usage
- Avoiding Cryptocurrency Risk: Crypto Mining
- Bring Your Own Device Policy
- Clean Desk Policy
- Internet of Things (IoT) Awareness
- Internet Safety and Social Media
- Introduction to Mobile Security
- Mobile Security: Defending Messaging Platforms
- Mobile Security: Mobile Device Management
- Mobile Security: Mobile Wi-Fi Security
- Mobile Security: Securing Mobile Devices
- Physical Office Security
- Physical Security: Lock Screens
- Physical Security: Loose Lips Sink Ships
- Physical Security: Removable Devices
- Physical Security: Shoulder Surfing
- Physical Security: Tailgating
- Preventing AI Application Attacks
- Ransomware in Healthcare
- Security for Remote & Hybrid Workers
- Social Media Safety
- Zero Trust Security: Introduction & Definition