Role-based Training Course Collection
RBT Courses
Audience: Courses for each of the following:
-
- Customer Support Professionals
- Developers
- Executives
- Executive Assistants
- Finance Professionals
- Highly Visible Employees
- HR Professionals
- IT Professionals
- Legal Professionals
- Manufacturing Professionals
- Marketing Professionals
- People Managers
- Privileged Users
- Product Development Professionals
- Sales Professionals
- Vendor Management & Purchasing Professionals
Difficulty Level: Foundational
Time: 16 courses, 15-20 minutes per course + 10 questions
Availability: Training Platform, Series options
Each audience listed above has two versions of courses to choose from:
- "(Course)" versions include videos, texts and 10 question assessments
- "(Course) - Video Only" versions include videos and text only, no assessments
- Cybersecurity for Customer Support Professionals (Course) (11:57 Video)
- Cybersecurity for Customer Support Professionals (Course) - Video Only
- Cybersecurity for Developers (Course) (14:53 Video)
- Cybersecurity for Developers (Course) - Video Only
- Cybersecurity for Executives (Course) (12:58 Video)
- Cybersecurity for Executives (Course) - Video Only
- Cybersecurity for Executive Assistants (Course)(10:13 Video)
- Cybersecurity for Executive Assistants (Course) - Video Only
- Cybersecurity for Finance Professionals (Course) (11:30 Video)
- Cybersecurity for Finance Professionals (Course) - Video Only
- Cybersecurity for Highly Visible Employees (Course) (15:00 Video)
- Cybersecurity for Highly Visible Employees (Course) - Video Only
- Cybersecurity for HR Professionals (Course) (12:33 Video)
- Cybersecurity for HR Professionals (Course) - Video Only
- Cybersecurity for IT Professionals (Course) (10:47 Video)
- Cybersecurity for IT Professionals (Course) - Video Only
- Cybersecurity for Legal Professionals (Course) (9:02 Video)
- Cybersecurity for Legal Professionals (Course) - Video Only
- Cybersecurity for Manufacturing Professionals (Course) (7:35 Video)
- Cybersecurity for Manufacturing Professionals (Course) - Video Only
- Cybersecurity for Marketing Professionals (Course) (16:58 Video)
- Cybersecurity for Marketing Professionals (Course) - Video Only
- Cybersecurity for People Managers (Course) (10:50 Video)
- Cybersecurity for People Managers (Course) - Video Only
- Cybersecurity for Privileged Users (Course) (15:00 Video)
- Cybersecurity for Privileged Users (Course) - Video Only
- Cybersecurity for Product Development Professionals (Course) (7:57 Video)
- Cybersecurity for Product Development Professionals (Course) - Video Only
- Cybersecurity for Sales Professionals (Course) (8:44 Video)
- Cybersecurity for Sales Professionals (Course) - Video Only
- Cybersecurity for Vendor Management & Purchasing Professionals (Course) (11:46 Video)
- Cybersecurity for Vendor Management & Purchasing Professionals (Course) - Video Only
Trailer:
Marketing Materials: Role-based Training Courses Marketing Kit
Style: These role-based annual cybersecurity trainings for the Roles/Departments listed use a mix of videos and text-based learning to keep end users engaged.
Major Themes: These pre-built annual training courses make it easy to provide your end users everything they need to know in one go.
Customization Options
Courses are made to be fully customizable to your organization. Learn more about customization options and limitations on the Training Platform - Course Customization Support Garden page.
- Text Slides - Edit existing wording to fit your needs, add your logo, or create completely new PDF documents on your own via Powerpoint/Google Sheets to be used
- Videos - You can provide your own training videos to fit anywhere in the course. An easy way to achieve this is a CISO led intro/outro video filmed as a Zoom recording.
- Questions/Assessments - As always, questions and answers are fully customizable and editable. Questions can also be added between video/text blocks, or anywhere within the training.
Course Breakdowns:
- Cybersecurity for Customer Support Professionals
- Intro Video
- Why? Customer Support
- Day in the Life: Customer Support
- Compliance Basics: PII
- Vantage Point: Alternative Forms of Phishing
- Compliance Basics: PCI
- Brick Wall: Data Privacy
- Outro Video
- 10 Question Assessment
- Cybersecurity for Developers
- Intro Video
- Secure Coding: Introduction
- Secure Coding: OWASP
- Secure Coding: Vulnerable Dependencies
- Secure Coding: Threat Modeling
- Secure Coding: Static Analysis
- Secure Coding: Source Code Secrets
- Secure Coding: Patching
- Secure Coding: Least Privilege
- Secure Coding: Injection
- Secure Coding: Authentication & Authorization
- Outro Video
- 10 Question Assessment
- Cybersecurity for Executives
- Intro Video
- LS Talk - Executives: The Ultimate Target
- Case in Point: Travel Secure
- Vantage Point: Cyber Harassment for Public Figures
- Big Ideas: Privileged User/Permissions
- Secure Basics: Whaling
- Outro Video
- 10 Question Assessment
- Cybersecurity for Executive Assistants
- Intro Video
- Why? Executive Assistants
- LS Talk - Executives: Executive Assistants
- Cybersecurity Tonight Quick Tips; Themed Phishing
- Security Basics: Device Security
- Security Basics: Spearphishing
- Security Basics: Whaling
- Outro Video
- 10 Question Assessment
- Cybersecurity for Finance Professionals
- Intro Video
- Why? Finance
- Day in the Life: Finance
- Case in Point: Vendor Email Compromise
- Security Basics: Spearphishing
- Case in Point: Advanced Financial Social Engineering
- Security Basics: Policy Violations
- Outro Video
- 10 Question Assessment
- Cybersecurity for Highly Visible Employees
- Intro Video
- Why? Highly Visible Employees
- Vantage Point: Cyber Harassment for Public Figures
- LS Talk: Executives - Privacy for Executives
- Case in Point - Advanced Financial Social Engineering
- Security Made Simple - Multifactor Authentication
- Vantage Point - Alternative Forms of Phishing
- Security Basics - Spearphishing
- Outro Video
- 10 Question Assessment
- Cybersecurity for HR Professionals
- Intro Video
- Why? HR
- Day in the Life: HR
- Compliance Basics: PII
- Security Basics: Insider Threat
- Vantage Point: Alternative Forms of Phishing
- Security Basics: Policy Violations
- Brick Wall: Data Privacy
- Outro Video
- 10 Question Assessment
- Cybersecurity for IT Professionals
- Intro Video
- Why? IT
- Big Ideas: Privileged Users/Permissions
- Security Basics: Device Security
- Security Basics: MFA
- Security Basics: Insider Threat
- Security Basics: Shadow IT
- Outro Video
- 10 Question Assessment
- Cybersecurity for Legal Professionals
- Intro Video
- Why? Legal Department
- Compliance Basics: PII
- Security Basics: Data Classification
- Security Basics: Insider Threat
- Brick Wall: Data Privacy
- Outro Video
- 10 Question Assessment
- Cybersecurity for Manufacturing Professionals
- Intro Video
- Why? Manufacturing
- Security Made Simple: Social Engineering
- Vantage Point: Alternative Forms of Phishing
- Vantage Point: Lock Your Computer
- Security Made Simple: Malware
- Security Basics: Insider Threat
- Outro Video
- 10 Question Assessment
- Cybersecurity for Marketing Professionals
- Intro Video
- Why? Marketing
- Brick Wall: GDPR
- Compliance Basics: PII
- Security Basics: Spearphishing
- Vantage Point: Cyber Harassment for Social Media Managers
- Brick Wall: Data Privacy
- Outro Video
- 10 Question Assessment
- Cybersecurity for People Managers
- Intro Video
- Why? People Managers
- Case in Point: Reporting Suspicious Activity
- Security Basics: Policy Violations
- Security Basics: Physical Security
- Compliance Basics: PII
- Security Basics: Insider Threat
- Security Basics: Shadow IT
- Outro video
- 10 Question Assessment
- Cybersecurity for Privileged Users
- Intro Video
- Why? Privileged Users
- Day in the Life - Privileged Users
- Big Ideas - Privileged Users
- Security Made Simple - Data Classification
- Security Basics - Encryption
- Compliance Basics - PII
- Brick Wall - Data Privacy
- Outro video
- 10 Question Assessment
- Cybersecurity for Product Development Professionals
- Intro Video
- Why? Product Development
- Data Privacy for Product Development Professionals
- Big Ideas: General Cybersecurity
- Outro Video
- 10 Question Assessment
- Cybersecurity for Sales Professionals
- Intro Video
- Why? Sales
- Vantage Point: Alternative Forms of Phishing
- Security Basics: Data Classification
- Case in Point: Travel Secure
- Security Basics: Working Remotely
- Cybersecurity Tonight Quick Tips: Social Media Phishing
- Outro Video
- 10 Question Assessment
- Cybersecurity for Vendor Management & Purchasing Professionals
- Intro Video
- Why? Vendor/Contractor
- Case in Point: Vendor Email Compromise
- Vantage Point: Pretexting
- Security Basics: Spearphishing
- Vantage Point: Gift Card Scams
- Brick Wall: Data Privacy
- Outro Video
- 10 Question Assessment
🔍 View Role-based Training Courses in your Living Security platform catalog HERE!