Description
The Module library contains a bank of all our learning modules. There are three formats to these modules:
Training
Story
Video
See the list of our available modules below.
Training
We cover the following topics in a traditional training style.
Essential
Am I really a target? (4-minute read)
Passphrases (5-minute read)
Passkeys (3-minute read)
Preventing identity theft (4-minute read)
Public Wi-Fi (2-minute read)
Browsing securely (4-minute read)
Device security (3-minute read)
Malware (4-minute read)
Social engineering (5-minute read)
Business email compromise (BEC) (4-minute read)
Business without bribery (6-minute read)
Modern slavery (4-minute read)
Help! I've made a mistake! (5-minute read)
Cyber-mindfulness and cognitive overload (3-minute read)
Focus
Focus: Spotting fake emails (4-minute read)
Focus: Supply chains (4-minute read)
Focus: Ransomware (4-minute read)
Focus: Physical security (3-minute read)
Focus: Deepfake (4-minute read)
Focus: Childproofing cyberspace (4-minute read)
Focus: Generative AI (5-minute read)
Focus: ChatGPT & the dawn of Large Language Models (LLMs) (3-minute read)
Focus: Private LLMs (5-minute read)
Focus: The human factor (3-minute read)
Focus: QR codes (3-minute read)
Focus: ClickFix (5-minute read)
OWASP (7-minute read)
The Payment Card Industry Data Security Standard (PCI-DSS) (5-minute read)
Digital Operational Resilience Act (DORA) (5-minute read)
The EU Artificial Intelligence Act (4-minute read)
Role-specific
Finance and payments professionals (4-minute read)
Managers and team leaders (4-minute read)
IT and security professionals (4-minute read)
Privileged users (4-minute read)
HR professionals (5-minute read)
Contractual, legal and commercial professionals (5-minute read)
Client-facing professionals (4-minute read)
Senior leaders (4-minute read)
Software engineering professionals (8-minute read)
Field and maintenance technicians (4-minute read)
Plant managers (3-minute read)
Operational technology architects (4-minute read)
Control engineers (5-minute read)
Data privacy
Data privacy (EU) (5-minute read)
Data privacy (US) (5-minute read)
GDPR (UK) (6-minute read)
GDPR and BDSG (Germany) (7-minute read)
Protection of Personal Information Act (POPIA) (8-minute read)
CCPA (10-minute read)
The Health Information Portability and Accountability Act (HIPAA) (6-minute read)
Gramm-Leach-Bliley Act (GLBA) (5-minute read)
Story
We cover the following topics in a story style.
Essential
Are you really a target? (6-minute read)
Passphrases (5-minute read)
Passkeys (4-minute read)
Preventing identity theft (4-minute read)
Working remotely (4-minute read)
Security incidents (6-minute read)
Protecting your devices (6-minute read)
Sophisticated attacks (6-minute read)
Business email compromise (BEC) (5-minute read)
Help! I’ve made a mistake! (4-minute read)
Cyber-mindfulness and cognitive overload (5-minute read)
Focus
Focus: Spotting fake emails (5-minute read)
Focus: Browser-in-the-browser (5-minute read)
Focus: Romance fraud (6-minute read)
Video
A set of video-only modules lasting up to 2 minutes each.
CybEssentials
Am I really a target
Passphrases
Preventing identity theft
Public Wi-Fi
Browsing securely
Device security
Malware and breach recovery
Social engineering
Business email compromise (BEC)
Business without bribery
Modern slavery
Help! I've made a mistake!
Cyber-mindfulness and cognitive overload
Focus: Supply chains
Focus: Browser-in-the-browser
Focus: Romance fraud
Focus: Spotting fake emails
Focus: Ransomware
Focus: Physical security
Focus: Deepfake
Focus: Childproofing cyberspace
Focus: ChatGPT & the dawn of Large Language Models (LLMs)
Focus: Private LLMs
Focus: ClickFix
OWASP
PCI-DSS
Data privacy and your rights
GDPR
GLBA
Finance and payment professionals
Managers and team leaders
IT professionals
Privileged users
Senior leaders
HR professionals
Client-facing professionals
Contractual, legal and commercial professionals
Software engineering professionals
Field and maintenance technicians
Plant managers
Operational technology architects
Control engineers
Navigation
From the admin menu, select GUIDE > Learning > Module library
You can see all the modules, their languages, authors, as well as behaviours targeted using the drop down arrows (read about our behaviours in SebDB) and other information.
Using the drop down filters, you can find modules based on:
Content style - There are two ways to present content, Story-style and Training.
Languages - narrow down by language. Supported CybSafe languages can be found here.
Authors - Search for specific authors, or whether you are looking for a CybSafe written module.
Behaviours - Narrow down by SebDB behaviour.
Status - Published or unpublished
Previewing modules
To preview a module, click the three dots beside the module. This will open the module in a new tab where you can annotate any sections and review the content.
Featured modules
If you wish to prioritise certain modules and topics for your people, you can do so using our featured module tool. This is especially useful once you have identified weak areas in your organisation. Your organisation’s featured modules are pinned to the top of your users home page, showing them what your organisation's cyber security priorities are.
From the Module Library page, you can find the module you wish to feature using the filters. Once located, click the three dots next to the module, and select ‘Featured’.
When a module is featured, a star will be shown beside the module title (see the screenshot below).
If you wish to un-feature a module, clicking the same 3 dots, you can de-select ‘Featured’.
Additional resources





