2018 Security Awareness Training for Enterprise Users

2018 Security Awareness Training for All Hands


scenario and stories for memorable security awareness training



This course is for regular computer users - no prior security knowledge required.

  • Security terms like "phishing" are defined in easy-to-understand language.
  • Scenarios and lessons-learned are from the learner's viewpoint.
  • We focus on things that a worker can control, like recognizing improper requests for access.


Covers spear phishing, malware, business email compromise, public cloud, and other new threats in 2018

Incorporates the newest intelligence about cyber-security:

  • Real examples of security breaches in the last year
  • 7 biggest user-preventable threats to enterprises, and how to recognize them
  • When should you contact the security department for help?
  • Passwords:  Longer is better!  9 tips for keeping your accounts safe from hackers
  • Information system access rules - inappropriate use of company resources
  • How to move files without bringing viruses along for the ride
  • Using two-factor authentication
  • Protecting against physical threats like piggybacking and dumpster divers
  • Guidelines for secure remote work and traveling
  • Securing your mobile device
  • Insider threats
    • Crisis and opportunity - the psychology of an insider threat
    • 3 most common insider threat scenarios
    • Why it doesn't pay to be an insider
    • How to respond when you see a potential threat
  • Cloud security and data leaks


This online training course goes into detail on insider threats - a disturbing trend in the industry


Enable your workforce to recognize and respond to the latest security threats.  And do it in an engaging way with our fun and sticky content!


custom notifications annual course phishing
cyber-security engaging fun for users remote work
cybersecurity training data breach cloud mistake

About This Course

  • The 2018 Security Awareness course is 30 minutes long and includes stories and examples about security threats that users face in the real world.
  • End of chapter quizzes increase learning retention and the final test ensures that your staff understand the key concepts.
  • We can package the course for you to host internally on your LMS or we can host the course for you.
  • Contact information for your organization's security department is customized.  We can also customize other sections if requested - for example, to add information about specific processes and policies within your organization.

5 Reasons We Are Different

  • Our courses are FUN and ENGAGING!  Seriously, they are!  Request to view a demo if you want to see for yourself.
  • Your users will watch the courses from start to finish.  Because we use fast paced animation and few pauses, students don't have time to get distracted.
  • Each year, we research industry trends and the latest threats.  This means our courses evolve over time.  We don't endlessly repeat the same information.
  • We will customize our courses for YOUR workplace.  A key part of security awareness is knowing how to get help.  We put specific contact information for your security manager, IT department, or compliance officer into the body of the course.
  • We are proven educators!  Native Intelligence security awareness materials have received multiple awards from the Federal Information System Security Educators Association (FISSEA), which is organized by NIST.

Are you working on FISMA compliance for your 2019 federal training program? 

The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program. 

If you're building a training program, you should demo our courses, ask for sample newsletters, or read through our more in-depth educational material.  Please let us know what you are interested in - we love to share what we've been working on!  

Native Intelligence has been providing security awareness courses and role-based training to the government and private sector for more than twenty years.  


Our security awareness training courses are SCORM-compliant. 

Sharable Content Object Reference Model (SCORM) is a set of technical standards for eLearning software products, such as online courses and Learning Management Systems (LMSs). SCORM tells programmers how to write their code so that it can be used with other eLearning software. SCORM ensures that online learning content and LMSs communicate with each other.  SCORM also defines how content (courses) may be packaged into a transferable ZIP file. 

Basically, SCORM compliance means that our courses will work on any popular LMS.


Incorporating NIST SP 800-50 and SP 800-16 best practices

The two publications are complementary – SP 800-50 works at a higher strategic level, discussing how to build an IT security awareness and training program, while SP 800-16 is at a lower tactical level, describing an approach to role-based IT security training.

Our courses cover topics and use techniques described in SP 800-50 and 800-16 so that you don't need to reinvent the wheel.


Our Federal Government courses are Section 508-compliant

Section 508 was made part of the Rehabilitation Act of 1973 in 1998. Its purpose is to require Federal agencies to make their electronic and information technology (EIT) accessible to people with disabilities.

508 compliance means that our courses are designed to be audio friendly for learners with hearing impairments AND vision friendly for disabled or colorblind learners.