BullPhish ID Training Course Library

Short, engaging training videos that mitigate human risk

The BullPhish ID training course library contains 100+ video lessons on topics such as common cybersecurity threats, phishing, security best practices and compliance regulations. Fresh courses are added on a regular basis to keep up with the changes in the cybersecurity landscape.

Most courses are available in multiple languages and are accompanied by a six-question quiz to measure knowledge retention.

Compliance Regulations Education

  • CMMC 2.0 Level 1: Foundational Cybersecurity Practices
  • CMMC 2.0 Level 2: Advanced Cybersecurity for Controlled Unclassified Information
  • CMMC 2.0 Level 3: Expert Cybersecurity for National Defense
  • Consequences of PHI Release
  • Cybersecurity Essentials with NIST CSF 2.0
  • Digital Operational Resilience Act (DORA) Introduction
  • EU Cybersecurity Act (CSA) Introduction
  • EU GDPR for Data Breach Notification for Processors: Organization’s Next Steps
  • EU GDPR for Data Processors
  • EU GDPR: Consequences of GDPR Release
  • EU GDPR: Important Definitions
  • EU GDPR: What is GDPR?
  • GDPR Rights of Data Subjects Stored Processed Destroyed
  • HIPAA: Overview of the Privacy Rule and Security Rule
  • Identifying Controlled Unclassified Information (CUI)
  • Intro to the UK General Data Protection Regulation
  • Introduction to CMMC 2.0
  • Introduction to HIPAA
  • NIS 2 Directive (Network and Information Systems Directive) Introduction
  • NIST 800-171 Overview
  • NIST 800-171: Who is Required to Comply & What Information is Protected
  • NIST AI RMF: Preventing Risks in AI Applications
  • NIST CSF: Introduction
  • NIST Incident Response
  • NIST Incident Response Overview
  • PCI-DSS
  • PIPEDA Overview (Canada)
  • PIPEDA: PIPEDA and Provincial Privacy Statutes (Canada)
  • PIPEDA: The 10 Principles
  • Sarbanes-Oxley (SOX) Overview
  • UK GDPR vs EU GDPR
  • UK NCSC: Defending Against AI-Driven Cyber Threats
  • Understanding NIST 800-171
  • What is PHI/ePHI?

Cyberthreat Education

  • COVID-19 and Government Spoofing Threats
  • How to Defend Against Autonomous AI Threats
  • Introduction To Social Engineering
  • Malware Awareness
  • Nation-State Cybercrime: How Employees May Encounter Nation-State Threats
  • Nation-State Cybercrime: Industrial and Infrastructure Targets
  • Pretexting
  • Ransomware Basics
  • Ransomware- Downloads and Attachments
  • Ransomware/Malware: Malicious Links & Websites
  • Safe Web Browsing: Domain Spoofing & Website Forgery
  • Shadow AI Threats: Data Governance Failures and Security Risks
  • Smishing & Vishing
  • Social Engineering: Baiting
  • Social Media Phishing
  • Tailgating & Piggybacking
  • Token Theft: How Hackers Steal Your Digital Keys
  • What is Account Takeover (ATO)?
  • What is an Insider Threat?

Data Protection & Privacy

  • Data Privacy in the US
  • Data Protection: Data Encryption
  • Data Protection: Privacy Risks
  • Data Protection: Secure Connections
  • Data Protection: Secure Data Storage
  • Insider Risk: Spotting Malicious Insiders
  • Mobile Security: Mobile Storage
  • PHI Physical Security
  • PHI Policy
  • Privacy and Data Classification
  • Understanding Common Types of Data Breach

Password Protection and Best Practices

  • Benefits Of Multi-Factor Authentication
  • Choosing Strong MFA Second Factors
  • Dangers Of Password Reuse
  • Executive Impersonation/Whaling
  • Good Password Practices
  • How to Protect Credentials from Brand Impersonation
  • How to Protect Credentials Using Multifactor Authentication
  • Introduction to Password Security
  • Introduction to Protecting Credentials
  • SIM Card Swap Scam
  • The Basics of Multi-Factor Authentication
  • The Benefits of Password Managers
  • The Dangers of Password Sharing

Phishing

  • AI Deception: Recognizing Deepfake Scams
  • BEC Invoice/Urgent Payment Required Scams
  • BEC Techniques & Red Flags
  • Business Email Compromise
  • Business Email Compromise (BEC) – Credential & Data Theft Scams
  • Business Email Compromise (BEC): Gift Card Scams
  • Common Phishing Attack Methods
  • Common Phishing Attack Types
  • How to Avoid Phishing Scams
  • Introduction to Business Email Compromise (BEC)
  • Introduction to Phishing
  • Introduction to Vishing/Smishing
  • Phishing Scams: Cryptocurrency, Military and Romance
  • Phishing: The Dangers of Malicious Attachments
  • Phishing: Social Media/Angler Phishing
  • Phishing-Brand Fraud & Spoofing
  • The Dangers of AI-Generated Phishing

Security Awareness

  • AI and Cybersecurity: Safe AI Tool Usage
  • Avoiding Cryptocurrency Risk: Crypto Mining
  • Bring Your Own Device Policy
  • Clean Desk Policy
  • Internet of Things (IoT) Awareness
  • Internet Safety and Social Media
  • Introduction to Mobile Security
  • Mobile Security: Defending Messaging Platforms
  • Mobile Security: Mobile Device Management
  • Mobile Security: Mobile Wi-Fi Security
  • Mobile Security: Securing Mobile Devices
  • Physical Office Security
  • Physical Security: Lock Screens
  • Physical Security: Loose Lips Sink Ships
  • Physical Security: Removable Devices
  • Physical Security: Shoulder Surfing
  • Physical Security: Tailgating
  • Preventing AI Application Attacks
  • Ransomware in Healthcare
  • Security for Remote & Hybrid Workers
  • Social Media Safety
  • Zero Trust Security: Introduction & Definition