Security Awareness Training Courses

To make an impact cyber content needs to be good, really good. Here at Hut Six, we believe in empowering people to improve cybersecurity not only at work, but also in their personal lives, because making training personal is the best way to change behaviour.

Our curated induction course instils knowledge while subsequent courses utilise scenario-based decision making to build upon and test users, maturing your security awareness program. You can choose your own training schedule to fit your organisation’s needs and immediate risks.

Explore our curriculum

An Ongoing Training Model with Unique Annual Content

We deliver online cyber security awareness training with multiple years of content that cover all aspects of information and cyber security. Hut Six's courses are all made in house by our expert team of writers, animators and learning designers. Each tutorial is around 5-10 minutes long and benefits from hundreds of hours of writing, aminations and edits with questions and assessments woven through out to ensure an engaging and superlative experience for your users.

Choose what training you deliver to your team from our wide selection so that they only receive the most relevant security advice. Our training is the most customisable on the market with policy adaptations, custom placeholders, organisations names and logos. Fully bespoke modules are available on request.

Icon alt text

Induction Course

Cyber Awareness

The induction course covers all aspects of end user security awareness and is constantly updated with best practice and the latest case studies. Our flagship course prepares your users for the risks they face and builds a foundation of security awareness.

Read more

Icon alt text

Refresher Course

Cyber Command

Playing the role of a Cyber Command agent – a cyber security expert, who helps people in various businesses across the globe – users build upon their Information Security knowledge in scenarios inspired by real-world challenges.

Read more

Icon alt text

Refresher Course

Openmind

In the not-too-distant future, users guide the decisions of various employees at the world’s leading android manufacturer: ‘OpenMind’. Users’ decisions lead to a range of possible outcomes for each tutorial.

Read more

Icon alt text

Refresher Course

Cypher City

(Coming Soon!)

Users assist characters through Information Security challenges in a noir-themed metropolis, where not everything is as it seems. In a shocking twist of fate, users must think like cyber criminals to better understand cyber security.

Read more

Cyber Awareness - Induction Course

Start your Training Journey Here

We deliver online cyber security awareness training with multiple years of content that cover all aspects of information and cyber security. Hut Six's courses are all made in house by our expert team of writers, animators and learning designers. Each tutorial is around 5-10 minutes long and benefits from hundreds of hours of writing, aminations and edits with questions and assessments woven through out to ensure an engaging and superlative experience for your users.

You can see our course summary here or see below for detailed breakdowns of each module. If you have any further questions about security awareness training or our phishing simulator you can book a demo or access a free trial here

Icon alt text

Introduction to Information Security

Providing a concise overview of both some of the key concepts of information security, and of what users can expect in their upcoming tutorials, such as the CIA Triangle (Confidentiality, Integrity, and Availability).

Read more

Icon alt text

Using the Web Safely

With browser specific information relating to updates and security settings, Using the Web Safely also looks at URL inspection (scheme, domain, and path) and how to identify and avoid unsafe websites.

Read more

Icon alt text

Phishing, Don’t take the Bait

Addressing one of the most foundational topics in Information Security Training, this tutorial covers the most common tactics used by online fraudsters for stealing sensitive information.

Read more

Icon alt text

Password Security

Another foundational security topics, this tutorial not only looks at the underlying concepts of passwords technology, including the methods utilised by attackers, but also at key password management practices that ensure information is secure.

Read more

Icon alt text

Social Engineering

Equipping users with the knowledge to identify common social engineering tactics and methods is the first step in avoidance.

Read more

Icon alt text

Physical Security

As an often overlooked area of information security, the physical security of data is essential not only for regulatory compliance, but also for insulating companies from serious security failures.

Read more

Icon alt text

GDPR: Why it Matters

Establishing some of the basic information and concepts regarding modern data protection regulation, this tutorial is the first of the three tutorials covering the General Data Protection Regulation (GDPR).

Read more

Icon alt text

GDPR: How does it affect Individuals?

In this tutorial we outline and explain the data privacy rights afforded under the General Data Protection Regulation, as well as some of the broader rules that impact individual rights, and international data transfers.

Read more

Icon alt text

GDPR: How Does it Affect Organisations?

Covering the essentials of how the General Data Protection Regulation impacts organisation, this tutorial looks at the key principles of common data processing; as well as touching upon storage, information management, and data subject access requests.

Read more

Icon alt text

Mobile Devices

Applicable not only in a work environment but also in any users’ personal life, awareness of mobile device security has never been more essential.

Read more

Icon alt text

Malware Protection

Examining the most common forms of malware (ransomware, spyware, etc.), the tactics used by attackers, as well as the significant repercussions of malware infection, this simple and easy to grasp tutorial seeks to equip users with the essential knowledge and skills to avoid the increasingly prominent threat of malware.

Read more

Icon alt text

Out of Office

As remote work become ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure.

Read more

Icon alt text

Wi-Fi

Just as information being stored needs protection, information in transit also needs to be kept out of the hands of malicious actors.

Read more

Icon alt text

Spear-Phishing

Expanding upon the preceding Phishing, don’t Take the Bait topic, this tutorial examines the more sophisticated threat of spear phishing.

Read more

Icon alt text

Insider Threats

As one of the more complex threat vectors discussed, in this tutorial we looks at some of the more common indicators associated with this notoriously challenging area of information security.

Read more

Icon alt text

Identity Theft

As an all too common form of fraud, identity theft can have devastating consequences for its victims, financially and in terms of reputation.

Read more

Icon alt text

Social Media & Privacy

With so many of us frequenting social media websites, threats such as oversharing, lax privacy settings, and the sharing of unverified or controversial information can only be ignored at our peril.

Read more

Icon alt text

Artificial Intelligence

Artificial Intelligence is a highly useful tool in today’s world but also poses serious information security concerns. Focusing on the most popular form of AI: chatbots, we condense the most important and useful information into one tutorial that teaches users how to use this technology safely at work and at home.

Read more

Icon alt text

Handling Sensitive Information

Another core concept of information security, abiding by proper data handling procedures is paramount to not only compliance, but ensuring the confidence of clients.

Read more

Icon alt text

Encryption

Encryption provides much of the fundamental security in our digital worlds, this tutorial presents the information necessary to understand the value of this ubiquitous technology and how it applied in professional environments.

Read more

Icon alt text

Backups

Along with the confidentiality and integrity of our information, its availability is likewise essential for maintain robust information security.

Read more

Icon alt text

Printing and Faxing

Although much is made of protecting digital data, adequately protecting physical documents should not be overlooked. This form of risk may be basic, but can serious and devastating consequences in the real world.

Read more

Icon alt text

Assessing Your Risk

Risks come in all shapes and sizes, from the foreseeable and minimally severe, to the unlikely but devastating. Each risk requiring a separate response, yet, to avoid and mitigate these risks, they must first be anticipated and understood.

Read more

Icon alt text

Business Continuity

Continuity planning is an essential for any organisation intent on longevity, particularly in the field of security. As unpredictable as the world can be, foresight and contingency thinking, allows organisations to minimise the likelihood of serious incidents, and should they arise, mitigate the potential impact.

Read more

Icon alt text

Incident Response

Proper incident response not only helps to ensure that events do not repeat themselves or escalate, but also ensure compliance to current data protection regulations.

Read more

Icon alt text

Encouraging a Secure Culture

Promoting a secure culture, means that secure behaviour is not simply single events, but a consistent and persistent approach to protecting an organisation’s information.

Read more

Icon alt text

A Study in Breaches

In this tutorial we use recent and applicable real-world examples of successful Information Security attacks to better understand not only the tactics used by genuine attackers, but also how to mitigate this particular set of risks.

Read more