If you still have problems, please let us know. Thank you!
Public Agency Compensation Trust
T (775) 885-7475
Email: info@poolpact.com
POOL/PACT
201 South Roop Street, Carson City NV 89701
Our cybersecurity library has grown so large that it's easy to get lost among the 80+ courses on what to assign your users. To simplify, we have narrowed it down to one course per critical topic. We chose the newest course or courses in KnowBe4, so there's one phishing course, one ransomware course, one social engineering course, etc. We've also included a few alternatives which would make great refreshers three-to-six months after assigning the initial courses.
We recommend assigning ALL of the core recommended courses, which vary from 10-15 minutes in length, OR the Kevin Mitnick or Security Awareness Training, which are longer, 45 minute courses but cover everything the individual core courses do.
All 2023 cybersecurity courses have been inactivated, they are now outdated legacy courses, so be sure to check your curriculums and make sure they don't contain these old legacy courses. They are all labeled in the title as 'INACTIVE'. All other 2024 courses not on this list are no longer available to assign, however will remain active in your curriculums for learners to complete, in case you've already assigned them, until the end of the year.
Some organizations may see more courses than in this list due to special requests I fulfilled making them available to just that organization.
Feel free to contact me at elearning@poolpact.com with any special requests from KnowBe4's library, if you'd like to assign a course not on this list below.
________________________________________________________________
CORE RECOMMENDED COURSES TOUCHING ON THE MOST CRITICAL TOPICS:
Ransomware Ready!
Phishing
Malware Foundations
Social Engineering Red Flags
Email Compromise
Mobile Device Security
Physical Security
OR one of the following:
Kevin Mitnick Security Awareness Training
KnowBe4 Security Awareness Training
-------------------
THE TOPIC OF AI:
AI At Work: Use It Wisely
Generative AI: Intelligent and Dangerous?
-------------------
REFRESHER COURSES/ALTERNATIVES:
Game - Danger Zone
Phishing - Kevin Mitnick Enabled Content Demonstration Common Threats - covers a wide spectrum, from phishing to social engineering
-------------------
I.T. STAFF ONLY:
Navigating the Shadows 1 - Introduction to Shadow IT
Navigating the Shadows 2 - Risks and Threats
Navigating the Shadows 4 - Monitoring Shadow IT
OWASP Top 10 Cybersecurity Risks for AWS Developers
OWASP Top 10 Cybersecurity Risks for C# Developers Part 1
OWASP Top 10 Cybersecurity Risks for React Developers
Security and Disaster Preparedness
Security Culture: Compliance
-------------------
SPECIALTY TOPICS FOR MANAGERS/LEADERS
Security Culture: Behavior for Leaders