Additional modules
OUR ADDITIONAL MODULES
Enjoy the freedom and flexibility to curate your own educational experience, tailored to your organisation’s unique needs and interests.
By selecting from our extensive suite of scenario and tutorial based content, you gain access to a comprehensive range of topics, carefully designed to equip you and your staff with the knowledge and skills needed to navigate the continuously evolving cyber landscape. From AI to Backups, staying safe offline and securing devices, our additional modules cover the essentials and offer an interactive gamification experience for optimal learning outcomes.
Scenario Based Modules
Introducing our innovative ‘Cyber Command’ scenario based modules – where users are presented with different options, resulting in multiple outcomes depending on the choice made. Review our full set of modules below, covering a variety of topics:
Cyber Command: Code Phishy
Playing the role of a Cyber Command agent – a cyber security expert, who helps people in various businesses across the globe – users tackle the topic of phishing once again, to further enhance their knowledge of phishing emails and how to avoid falling prey to an attack.
Cyber Command: Operation Engineer
By helping Ayaan, a new starter in a big company, beat the social engineers she encounters, users take their understanding of social engineering (and how to guard against it) to the next level.
Cyber Command: Out of the Office and into the Frier
This module helps learners apply their knowledge of behaviour outside the office by helping Connor make decisions in situations that the users may encounter in real-life.
Cyber Command: Insider Threat
An employee of a company seems to have encountered a series of potential Insider Threats. Learners not only refresh their knowledge of both unintentional and malicious Insider Threats, but also test their understanding in three different
situations.
Cyber Command: Passwords
Presented with a situation where an employee’s password may have been
compromised, users have to use their knowledge of passwords to help choose a new secure password and give tips on how to keep passwords confidential in the future.
Cyber Command: IRL
Theo the engineer asks for help with some problems he is experiencing concerning physical security at work. Users apply their understanding of keeping would-be attackers from getting physical access to important documents or areas to help Theo with his queries.
Cyber Command: Handle with Care
In this scenario, learners make decisions regarding the disposal of confidential data, customer consent and ensuring the confidentiality, integrity, and availability
of information.
Cyber Command: Of Device and Men
As Jenny makes a business trip, users help her to keep her information confidential by guiding her through the preparations for the trip, how to behave whilst travelling, and what to do in the event of suspected tampering.
Cyber Command: Fiend Request
This time users must use their knowledge of how to be safe while using social media to help Kelly navigate her way through a potentially tricky situation and avoid falling prey to some of the dangers of posting online.
Cyber Command: Back It Up
Users are presented with a scenario in which they must choose the best method of backing up data, and how to behave at work when important data is involved.
Cyber Command: Safer Surfer
By guiding Rebecca through identifying a mysterious problem with her browser and a vital query regarding a replacement online supplier, users test their knowledge of web browsers and online safety.
Cyber Command: Malware Attack
Users must recall their training on how malware can be delivered to a device in order to thwart the plans of the ‘Web Bandits’. Precautions such as MFA can help but users must also be alert for inconsistencies in emails and downloads that are not all they seem.
Openmind: Workspace Invaders
As the factory entrances and exits go offline due to a power failure, users must call upon their knowledge of Physical Security to ward off intruders, spot any potential vulnerabilities in the building’s security and make the right choices when showing a visitor around the factory.
Openmind: Tricky Business
While performing quality checks on OpenMind’s latest creation, you are beset by repeated social engineering attacks. Learners put their knowledge of Social Engineering to the test as their decisions determine whether the integrity of the most delicate instrument in the factory is maintained.
Openmind: Super Responder
An explosion in the factory sets off a chain of events that will put users’ understanding of Incident Response to the test. Presented with a range of options, will you be able to make the right responses?
Openmind: Later Data
In the Research and Development Centre you attend an important presentation about a ground-breaking new piece of technology. Users must help to avoid mishap by advising how to handle sensitive data correctly.
Openmind: Out of Sight - Out of Time
On a business trip you are presented with challenges that test your responses to threats encountered while working out of the office. Will a missing device, a wireless internet conundrum and a vital revelation about the robots spell the end for OpenMind?
Openmind: Out of Sight - Backup to the Future
Now working in the Head Office of OpenMind, you are given some important jobs to do to ensure that the data that keeps the organisation’s vital data is properly backed up.
Openmind: I Spy
The most vital stage of robotic testing is underway and only you can protect the organisation from its own staff. Users will utilise their knowledge to defend against Insider Threats in many different guises.
Openmind: Trickbait
With an impending public announcement making things very exciting in the OpenMind Head Office, users are challenged to make the right decisions when they are presented with social media dilemmas.
Openmind: WFH SOS
At home for the day, users are tested on their knowledge of how to keep themselves safe when encountering Information Security threats in the modern world. Cyber Security is just as important at home as it is at OpenMind!
Openmind: Authentication Station
Against the clock with a tough deadline to meet, the Research and Development team suddenly begins to receive some very unusual emails. Users must draw on their knowledge of Phishing emails to avoid falling foul of an attack.
Openmind: Open Says Who?
At the OpenMind Research and Development Centre, passwords are the keys to the technological kingdom. Can you recall enough knowledge of password security to save the day?
Openmind: Futureproof
In the final module in the series, users are given the challenge of addressing insecure behaviour in a way that helps to nourish a secure culture in the organisation. The future of Openmind hangs in the balance!
Cyber Hazards
Our Cyber Hazards are short, interactive scenarios that test users’ real-world decision-making in everyday digital situations – perfect for quick, engaging cyber training with realistic, immersive challenges. Find out more below:
Cyber Hazard: Let's Get Fiscal
Working in the admin department of your organisation, part of your job is compiling daily monetary transfers for the accounting team. Going through the remaining unread emails from your colleagues, you are presented with a variety of scenarios relating to payment.
Cyber Hazard: Web of Deceit
You are preparing for an upcoming social event and want to buy a new outfit – browsing the internet for a bargain, the scenarios presented to the user involve web safety.
Cyber Hazard: Saving Money
You are putting the finishing touches on a confidential financial document, when you receive a reminder that you are expected in an important meeting very soon – with added time pressure in this scenario, users are tested on document procedure.
Cyber Hazard: System of a Frown
You log in to start your day and find an email that looks like it’s from a colleague, mentioning a new HR system you need to access – users are guided through a scenario focused on identifying safe web links.
Cyber Hazard: Housewarning
Having just moved into a new home, you are excited to host a house-warming party with all your closest friends. To correspond with them, you have started a private group chat on the well-known social media website, testing users on social media based scenarios.
Cyber Hazard: Notify Guy
You are a team manager at Eastbury and Haggath Ltd, and work closely with another manager, Dalli, whom you often message for help. Logging on to check emails, users are guided through scenarios focused on legitimate web links and emails.
Tutorials
Our tutorials take users through a specific cyber security topic, with strategically placed Q&A throughout. Review the modules below, with the aim of raising further cyber awareness:
Business Continuity
Continuity planning is essential for any organisation intent on longevity, particularly in the field of security. As unpredictable as the world can be, foresight and contingency thinking allows organisations to minimise the likelihood of serious incidents and, should they arise, mitigate the potential impact.
A Study in Breaches
A Study in Breaches takes users through some of the most relevant and recent high-profile case studies which highlight the importance of effective Information Security. Users will understand that real-life cyber criminals often utilise multiple techniques in a combined attack and that constant vigilance is the price of a secure culture.
Artificial Intelligence
Artificial Intelligence examines the biggest risks that users encounter when utilising chatbots and provides helpful guidance on how to avoid the consequences of these threats. With our typical high-quality animation, case studies and questions, users will understand how to use AI safely, while guarding against the risks they present.
Backups
Along with the confidentiality and integrity of our information, its availability is likewise essential to maintain robust information security. Covering platforms, backup best practices, and organisational procedures, this tutorial further elaborates on the topics of data handling.
Printing and Faxing
Although much is made of protecting digital data, adequately protecting physical documents should not be overlooked. From networked devices, to ensuring documents are recovered after printing or scanning, this form of risk may be basic, but can have serious and devastating consequences in the real world.
Incident Response
Proper incident response not only helps to ensure that events do not repeat themselves or escalate, but also ensures compliance to current data protection regulations.
Freedom of Information
This 10-minute module provides essential insights into FOI, covering its definition, impact on public authority employees, information coverage, identification, validation of requests, interaction with GDPR and EIR, fulfillment timescales, and key FOI request exemptions.
Social Media and Privacy
With so many of us frequenting social media websites, threats such as oversharing, lax privacy settings, and the sharing of unverified or controversial information can only be ignored at our peril. Directly addressing the most popular social media platforms, this tutorial promotes the simple practices necessary to keeping social media safe and secure.
Wi-Fi
As remote work become ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure. From minimising the chances of so-called ‘shoulder-surfers’, to understanding the shortcomings of public Wi-Fi networks, these lessons and more are necessary to avoiding remote work complacency.
Mobile Devices
Applicable not only in a work environment but also in any user’s personal life, awareness of mobile device security has never been more essential. Covering encryption methods, the importance of regular updates, application scrutiny and more, this tutorial shouldn’t be missed.
Encryption
Encryption provides much of the fundamental security in our digital worlds, and though these processes often involve extremely complex mathematics, this tutorial presents the information necessary to understand the value of this ubiquitous technology and how it’s applied in professional environments.
Spear Phishing
Expanding upon the preceding Phishing, don’t Take the Bait topic, this tutorial
examines the more sophisticated threat of spear phishing. Typically targeting
high-value individuals, spear phishing attacks can not only be difficult to spot,
but also extremely damaging to organisations.
Handling Sensitive Information
As another core concept of information security, abiding by proper data handling procedures is paramount to not only compliance, but ensuring the confidence of clients. From establishing legitimate grounds for processing, to adequately protecting the various classes of data, in this tutorial we seek to make a complex topic applicable to users and easy to understand.
Encouraging a Secure Culture
The culture within your organisation is defined by the ideas, customs, and social behaviour of its people, and broadly determines how people approach security. Promoting a secure culture, means that secure behaviour is not simply single events, but a consistent and persistent approach to protecting an organisation’s information.
Out of Office
As remote work becomes ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure. From minimising the chances of so-called ‘shoulder-surfers’, to understanding the shortcomings of public Wi-Fi networks, these lessons and more are necessary to avoiding remote work complacency.
Identity Theft
As an all too common form of fraud, identity theft can have devastating consequences for its victims, financially and in terms of reputation. Alerting users to the most common, yet frequently overlooked identifiers, the information contained within this tutorial is applicable in both users’ personal and professional lives.
Working from Home
As remote work is common for a significant number of employees in the modern world, training to avoid the risks associated with working from home is a crucial step for many organisations. From minimising the chances of a data breach via home Wi-Fi, to understanding the precautions necessary to keep home offices safe, these lessons and more are necessary to avoid remote work complacency.
Out of Office
As remote work becomes ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure. From minimising the chances of so-called ‘shoulder-surfers’, to understanding the shortcomings of public Wi-Fi networks, these lessons and more are necessary to avoiding remote work complacency.
IG Bolt on Modules
For a more in-depth focus on GDPR and Information Governance, also available is our IG Bolt on, which consists of the following four modules:
UK GDPR: Why it Matters
Establishing some of the basic information and concepts regarding modern data protection regulation (including controllers, processors, and ‘personal data’), this tutorial begins to cover the UK General Data Protection Regulation (GDPR).
UK GDPR: How does it affect Organisations?
Covering the essentials of how the UK General Data Protection Regulation impacts organisations, this tutorial looks at the key principles of common data processing; as well as touching upon storage, information management, and data subject access requests.
Out of Office
As remote work becomes ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure. From minimising the chances of so-called ‘shoulder-surfers’, to understanding the shortcomings of public Wi-Fi networks, these lessons and more are necessary to avoiding remote work complacency.
UK GDPR: How does it affect individuals?
In this tutorial we outline and explain the data privacy rights afforded under the General Data Protection Regulation, as well as some of the broader rules that impact individual rights, and international data transfers.
Assessing your Risk
Risks come in all shapes and sizes, from the foreseeable and minimally severe, to the unlikely but devastating. Each risk requiring a separate response, yet, to avoid and mitigate these risks, they must first be anticipated and understood.
Out of Office
As remote work becomes ever more common, providing adequate training to mitigate ‘out of office’ information risks has become an increasingly essential measure. From minimising the chances of so-called ‘shoulder-surfers’, to understanding the shortcomings of public Wi-Fi networks, these lessons and more are necessary to avoiding remote work complacency.




