Skip to main content

Reference guide: Module library

An outline of the entire CybSafe module offering

Sam Hopwell avatar
Written by Sam Hopwell
Updated this week

Description

The Module library contains a bank of all our learning modules. There are three formats to these modules:

  • Training

  • Story

  • Video

See the list of our available modules below.

Training

We cover the following topics in a traditional training style.

Essential

  • Am I really a target? (4-minute read)

  • Passphrases (5-minute read)

  • Passkeys (3-minute read)

  • Preventing identity theft (4-minute read)

  • Public Wi-Fi (2-minute read)

  • Browsing securely (4-minute read)

  • Device security (3-minute read)

  • Malware (4-minute read)

  • Social engineering (5-minute read)

  • Business email compromise (BEC) (4-minute read)

  • Business without bribery (6-minute read)

  • Modern slavery (4-minute read)

  • Help! I've made a mistake! (5-minute read)

  • Cyber-mindfulness and cognitive overload (3-minute read)

Focus

  • Focus: Spotting fake emails (4-minute read)

  • Focus: Supply chains (4-minute read)

  • Focus: Ransomware (4-minute read)

  • Focus: Physical security (3-minute read)

  • Focus: Deepfake (4-minute read)

  • Focus: Childproofing cyberspace (4-minute read)

  • Focus: Generative AI (5-minute read)

  • Focus: ChatGPT & the dawn of Large Language Models (LLMs) (3-minute read)

  • Focus: Private LLMs (5-minute read)

  • Focus: The human factor (3-minute read)

  • Focus: QR codes (3-minute read)

  • Focus: ClickFix (5-minute read)

  • OWASP (7-minute read)

  • The Payment Card Industry Data Security Standard (PCI-DSS) (5-minute read)

  • Digital Operational Resilience Act (DORA) (5-minute read)

  • The EU Artificial Intelligence Act (4-minute read)

Role-specific

  • Finance and payments professionals (4-minute read)

  • Managers and team leaders (4-minute read)

  • IT and security professionals (4-minute read)

  • Privileged users (4-minute read)

  • HR professionals (5-minute read)

  • Contractual, legal and commercial professionals (5-minute read)

  • Client-facing professionals (4-minute read)

  • Senior leaders (4-minute read)

  • Software engineering professionals (8-minute read)

  • Field and maintenance technicians (4-minute read)

  • Plant managers (3-minute read)

  • Operational technology architects (4-minute read)

  • Control engineers (5-minute read)

Data privacy

  • Data privacy (EU) (5-minute read)

  • Data privacy (US) (5-minute read)

  • GDPR (UK) (6-minute read)

  • GDPR and BDSG (Germany) (7-minute read)

  • Protection of Personal Information Act (POPIA) (8-minute read)

  • CCPA (10-minute read)

  • The Health Information Portability and Accountability Act (HIPAA) (6-minute read)

  • Gramm-Leach-Bliley Act (GLBA) (5-minute read)

Story

We cover the following topics in a story style.

Essential

  • Are you really a target? (6-minute read)

  • Passphrases (5-minute read)

  • Passkeys (4-minute read)

  • Preventing identity theft (4-minute read)

  • Working remotely (4-minute read)

  • Security incidents (6-minute read)

  • Protecting your devices (6-minute read)

  • Sophisticated attacks (6-minute read)

  • Business email compromise (BEC) (5-minute read)

  • Help! I’ve made a mistake! (4-minute read)

  • Cyber-mindfulness and cognitive overload (5-minute read)

Focus

  • Focus: Spotting fake emails (5-minute read)

  • Focus: Browser-in-the-browser (5-minute read)

  • Focus: Romance fraud (6-minute read)

Video

A set of video-only modules lasting up to 2 minutes each.

  • CybEssentials

  • Am I really a target

  • Passphrases

  • Preventing identity theft

  • Public Wi-Fi

  • Browsing securely

  • Device security

  • Malware and breach recovery

  • Social engineering

  • Business email compromise (BEC)

  • Business without bribery

  • Modern slavery

  • Help! I've made a mistake!

  • Cyber-mindfulness and cognitive overload

  • Focus: Supply chains

  • Focus: Browser-in-the-browser

  • Focus: Romance fraud

  • Focus: Spotting fake emails

  • Focus: Ransomware

  • Focus: Physical security

  • Focus: Deepfake

  • Focus: Childproofing cyberspace

  • Focus: ChatGPT & the dawn of Large Language Models (LLMs)

  • Focus: Private LLMs

  • Focus: ClickFix

  • OWASP

  • PCI-DSS

  • Data privacy and your rights

  • GDPR

  • GLBA

  • Finance and payment professionals

  • Managers and team leaders

  • IT professionals

  • Privileged users

  • Senior leaders

  • HR professionals

  • Client-facing professionals

  • Contractual, legal and commercial professionals

  • Software engineering professionals

  • Field and maintenance technicians

  • Plant managers

  • Operational technology architects

  • Control engineers


Navigation

From the admin menu, select GUIDE > Learning > Module library

You can see all the modules, their languages, authors, as well as behaviours targeted using the drop down arrows (read about our behaviours in SebDB) and other information.

Using the drop down filters, you can find modules based on:

  • Content style - There are two ways to present content, Story-style and Training.

  • Languages - narrow down by language. Supported CybSafe languages can be found here.

  • Authors - Search for specific authors, or whether you are looking for a CybSafe written module.

  • Behaviours - Narrow down by SebDB behaviour.

  • Status - Published or unpublished

Previewing modules

To preview a module, click the three dots beside the module. This will open the module in a new tab where you can annotate any sections and review the content.

Featured modules

If you wish to prioritise certain modules and topics for your people, you can do so using our featured module tool. This is especially useful once you have identified weak areas in your organisation. Your organisation’s featured modules are pinned to the top of your users home page, showing them what your organisation's cyber security priorities are.

From the Module Library page, you can find the module you wish to feature using the filters. Once located, click the three dots next to the module, and select ‘Featured’.

When a module is featured, a star will be shown beside the module title (see the screenshot below).

If you wish to un-feature a module, clicking the same 3 dots, you can de-select ‘Featured’.


Additional resources

Did this answer your question?