PhishingBox
Request Demo Sign Up 14-Day Free TrialNo Credit Card Required.
Core Training, Micro Topics & Compliance

Search the course library by title, description, and training topic

PhishingBox gives security teams a flexible course catalog they can browse before rollout. Use the topic cards below or search the library to find cybersecurity courses tied to phishing, business email compromise, AI security, mobile device security, privacy and PII, ransomware, and more. If you want to compare delivery models like training moments, annual programs, KillPhish, and SecurityTips, visit our Cybersecurity Training page.

Note: All searchable courses below are available inside the PhishingBox learning experience so visitors can browse topics publicly, then launch training from a free trial account. This search does not include third-party training content that is also available for purchase through the PhishingBox Content Library. If you want to see how these courses fit into training moments, scheduled programs, KillPhish, and SecurityTips, visit our Cybersecurity Training page.

Training Topics

Browse cybersecurity courses by topic

Select a topic to filter the course library below. Courses can appear in multiple categories so teams can find training the way they naturally search for it. For a broader look at how these topics get delivered inside PhishingBox, explore Cybersecurity Training.

Course Library

Find the right cybersecurity course fast

Search by course title or description and combine it with topic and format filters for a quick path into the PhishingBox catalog. When you are ready to see how these courses support recurring assignments, phishing-triggered remediation, and embedded coaching, take a look at our Cybersecurity Training page.

32 searchable course cards

Showing all 32 courses.

Browsing all topics.
Core Training 5 topics

Phishing Awareness

Teach employees to recognize deceptive emails, malicious links, attachment tricks, and urgency cues before they click.

  • Phishing
  • Safe Emailing
  • +3 more
Core Training 6 topics

Social Engineering

Help employees recognize manipulation techniques across email, phone, text, and in-person interactions before trust is exploited.

  • Social Engineering
  • Phishing
  • +4 more
Core Training 7 topics

Information Security Awareness

Cover the core behaviors behind a stronger security culture, including safe handling, reporting, authentication, and incident awareness.

  • Information Security
  • Security Hygiene
  • +5 more
Core Training 5 topics

Business Email Compromise

Show teams how to spot impersonation, invoice fraud, urgent wire requests, and executive spoofing before funds or credentials are exposed.

  • Payment Security
  • Phishing
  • +3 more
Core Training 3 topics

Password Security

Promote stronger passwords, password managers, and better credential hygiene to reduce account takeovers and reuse risk.

  • Password Security
  • Information Security
  • +1 more
Core Training 3 topics

Multi-Factor Authentication

Show why MFA matters, how prompt fatigue and bypass tactics work, and what safer authentication habits look like.

  • Password Security
  • Information Security
  • +1 more
Core Training 4 topics

Data Privacy

Help employees handle personal and sensitive data responsibly, reduce oversharing, and support privacy obligations across everyday work.

  • Privacy and PII
  • Compliance
  • +2 more
Core Training 4 topics

HIPAA Training for End Users

Help employees understand HIPAA responsibilities, protect patient information, and handle healthcare data more safely in day-to-day work.

  • Compliance
  • Privacy and PII
  • +2 more
Core Training 1 topics

Sexual Harassment Prevention

Train employees to understand what sexual harassment is, how to recognize it, and how to respond using the right reporting and intervention procedures.

  • Compliance
Core Training 4 topics

Understanding GDPR: A Guide for End Users

Give employees a concise, practical overview of GDPR so they can handle personal data more responsibly and respond appropriately to privacy-related requests or incidents.

  • Compliance
  • Privacy and PII
  • +2 more
Core Training 5 topics

Mobile Device Security

Train employees to secure phones and tablets used for work with safe apps, device controls, and cautious network behavior.

  • Mobile Device Security
  • Information Security
  • +3 more
Core Training 4 topics

Safe Browsing Practices

Reduce exposure to malicious sites, unsafe downloads, and browser-based scams with practical browsing habits employees can use every day.

  • Safe Browsing
  • Malware
  • +2 more
Core Training 5 topics

Malicious Downloads

Explain how fake updates, attachments, and cracked software introduce malware, ransomware, or credential theft into the organization.

  • Malware
  • Ransomware
  • +3 more
Core Training 4 topics

Physical Security

Connect cybersecurity to badges, tailgating, workstation locking, and device protection so physical gaps do not become digital breaches.

  • Physical Security
  • Information Security
  • +2 more
Core Training 5 topics

Clean Desk Policy

Reinforce simple habits for securing printed documents, notes, badges, and unattended devices in shared or public workspaces.

  • Physical Security
  • Privacy and PII
  • +3 more
Core Training 5 topics

Safe Remote Work Practices

Prepare hybrid and remote teams to work securely with home Wi-Fi, VPNs, collaboration tools, and shared-device safeguards.

  • Working Remote Securely
  • Safe Browsing
  • +3 more
Core Training 5 topics

Insider Threat Awareness

Teach users how insider risk shows up, what warning signs matter, and how to report suspicious behavior without creating friction.

  • Incident Response
  • Information Security
  • +3 more
Core Training 4 topics

Social Media Security

Show how public oversharing, impersonation, and social reconnaissance can be used against employees and the organization.

  • Social Media Security
  • Social Engineering
  • +2 more
Core Training 5 topics

AI Security Practices

Teach employees how generative AI and everyday AI tools change cyber risk, from prompt leakage to unsafe sharing and unverified outputs.

  • AI Security
  • Privacy and PII
  • +3 more
Micro Topic 5 topics

Business Email Compromise

A focused micro lesson on executive impersonation, vendor fraud, and suspicious payment requests.

  • Payment Security
  • Phishing
  • +3 more
Micro Topic 4 topics

CAPTCHA Scams

Train users to spot fake verification pages and browser prompts used to deliver malware or steal credentials.

  • Phishing
  • Safe Browsing
  • +2 more
Micro Topic 4 topics

Deepfakes

Teach employees how AI-generated audio, video, and images can be used in fraud, impersonation, and social engineering.

  • AI Security
  • Social Engineering
  • +2 more
Micro Topic 5 topics

Phishing Attachments

A quick lesson on suspicious file types, macro-enabled documents, cloud-share lures, and safe handling steps.

  • Phishing
  • Malware
  • +3 more
Micro Topic 5 topics

QR Code Scams

Help users treat QR codes like links, verify destinations, and avoid quishing scams in physical and digital settings.

  • Phishing
  • Mobile Device Security
  • +3 more
Micro Topic 4 topics

Phishing in the Cloud

A quick refresher on phishing lures delivered through cloud apps, shared files, and everyday collaboration tools.

  • Phishing
  • Safe Browsing
  • +2 more
Micro Topic 5 topics

Ransomware

A short lesson on how ransomware spreads, what warning signs matter, and how fast reporting helps reduce damage.

  • Ransomware
  • Malware
  • +3 more
Micro Topic 4 topics

Recognizing Insider Threats

Help employees spot risky internal behavior, unusual access patterns, and warning signs that should be escalated early.

  • Incident Response
  • Information Security
  • +2 more
Micro Topic 3 topics

Reporting Incidents

Teach employees what to report, when to escalate, and how fast action supports investigation and containment.

  • Incident Response
  • Information Security
  • +1 more
Micro Topic 5 topics

Sensitive Info in Email

A focused lesson on reducing privacy and data exposure when sending confidential or regulated information through email.

  • Safe Emailing
  • Privacy and PII
  • +3 more
Micro Topic 4 topics

Smishing

A quick refresher on text-message phishing, fake delivery notices, and malicious links sent to mobile devices.

  • Smishing
  • Phishing
  • +2 more
Micro Topic 4 topics

Update to Stay Safe

Reinforce why timely software and device updates matter for closing security gaps before attackers can exploit them.

  • Security Hygiene
  • Information Security
  • +2 more
Micro Topic 4 topics

Vishing

Show employees how attackers use phone calls and voicemail to create urgency, collect data, or steal access.

  • Vishing
  • Phishing
  • +2 more