Security Awareness
Training
46 free interactive exercises across 10 structured courses.
Build a security-first culture with hands-on 3D simulations covering phishing, social engineering, ransomware, device security, passwords, incident reporting, and more. No sign-up required.
Phishing & Impersonation Attacks
Callback Phishing
Handle a fake invoice designed to make you call.
- Identify TOAD attack patterns
- Spot fake invoices with callback numbers
- Respond without clicking any links
Phishing
Spot a phishing email before you click.
- Identify spoofed senders and URLs
- Recognize credential theft attempts
- Report phishing through proper channels
Vishing
Handle a realistic voice phishing call.
- Detect caller ID spoofing tactics
- Practice callback verification steps
- Resist urgency and authority pressure
Smishing
Detect fraud hiding in your text messages.
- Spot SMS phishing red flags
- Understand why text links get more clicks
- Verify messages without tapping links
Double Barrel Phishing
Recognize the two-email trust trap.
- Identify the benign setup message
- Spot the malicious follow-up payload
- Break the false trust chain
Business Email Compromise
Stop a CEO impersonation wire fraud.
- Detect executive impersonation emails
- Verify payment requests out-of-band
- Understand BEC financial impact
Social Engineering
Recognize manipulation before you comply.
- Detect pretexting and authority scams
- Practice verification under pressure
- Understand the human element in breaches
Whaling With A Deepfake
Spot an AI-generated executive on a video call.
- Detect deepfake video call indicators
- Verify identity during live meetings
- Learn from the $25M Hong Kong case
Device Security
Backup Best Practices
Build a backup plan that survives ransomware.
- Apply the 3-2-1 backup rule
- Distinguish sync from true backup
- Test restoration before you need it
Encryption & Lock Discipline
Practice the habits that protect unattended devices.
- Enable full disk encryption
- Build a screen-locking habit
- Secure devices in physical spaces
OS Updates & Patching Basics
See why skipping updates opens real attack paths.
- Prioritize security patches by severity
- Learn from the WannaCry outbreak
- Set effective auto-update policies
Ransomware
Survive a ransomware attack in real time.
- Respond to a live ransomware scenario
- Follow containment and isolation steps
- Preserve evidence for forensic analysis
USB Drop Attack
Think twice before plugging in that USB drive.
- Recognize planted USB devices
- Understand Rubber Ducky payloads
- Follow safe handling procedures
Endpoint Patching & EDR Alerts
Know what your EDR alert means and what to do next.
- Respond correctly to EDR security alerts
- Triage alerts by severity level
- Check your device's patch status
Passwords & Account Security
Account Recovery Security
Defend account recovery from social engineering.
- Verify identity before processing recovery requests
- Recognize pretexting tactics targeting help desks
- Secure recovery questions and backup methods
Credential Stuffing Awareness
See how breached passwords fuel automated attacks.
- Understand how credential stuffing works
- Check if your accounts appear in breaches
- Break the password reuse chain
Joiner-Mover-Leaver Awareness
Manage access rights through role transitions.
- Request correct access during onboarding
- Adjust permissions when changing roles
- Ensure clean offboarding removes all access
Least Privilege Awareness
Keep access to the minimum your job requires.
- Identify when you have more access than needed
- Request and approve access changes properly
- Spot permission creep before auditors do
MFA Setup & Best Practices
Set up multi-factor authentication the right way.
- Compare SMS, authenticator, and hardware keys
- Recognize and resist MFA fatigue attacks
- Configure backup methods for account recovery
Password Manager Habits
Build strong habits with your password manager.
- Generate unique passwords for every account
- Use autofill as a phishing detection tool
- Maintain a clean, organized password vault
Privileged Access Basics
Learn why admin accounts need special handling.
- Apply just-in-time access principles
- Practice separation of duties
- Secure root and admin credentials
Web & Browser Safety
HTTPS & Website Security
Learn why the padlock icon is not proof of safety.
- Understand what TLS actually protects
- Spot expired and mismatched certificates
- Move past padlock misconceptions
Safe Browsing & Downloads
Spot malicious downloads before they run.
- Recognize fake update prompts
- Verify file signatures before executing
- Avoid drive-by download traps
Typosquatting Awareness
Catch the domain tricks attackers use against you.
- Spot lookalike and homograph domains
- Build URL verification habits
- Recognize common typosquatting patterns
Incident Reporting
General Incident Reporting
Know when and how to report a security incident.
- Recognize what qualifies as an incident
- Complete a security report correctly
- Understand reporting timelines and thresholds
Reporting Culture
Build a team that reports without fear.
- Practice blameless incident reporting
- Understand psychological safety principles
- Apply the aviation CRM framework
Safe Communication & Sharing
Cloud Sharing Controls
Audit who can see your shared files right now.
- Review and tighten sharing permissions
- Set link expiration dates
- Find over-shared files before auditors do
Guest Access Management
Control what external users can reach and for how long.
- Set time-bound guest permissions
- Audit and remove dormant accounts
- Limit vendor access to specific resources
Secure Messaging Practices
Stop sensitive data from leaking through chat apps.
- Avoid sharing secrets in Slack or Teams
- Spot compromised account behavior
- Use proper channels for sensitive data
Social Media Policy
Learn what not to post on corporate accounts.
- Identify OPSEC risks in social posts
- Avoid accidental data leaks online
- Apply corporate social media guidelines
Social Media Oversharing
See how attackers exploit your public profiles.
- Discover what OSINT reveals about you
- Understand how posts enable spear phishing
- Audit your own social media exposure
Third-Party App OAuth Risks
Check what you gave permission to access.
- Review OAuth permissions on your accounts
- Spot excessive permission requests
- Revoke access from unused or suspicious apps
Security Policies & Your Role
Audit Mindset Basics
Think like an auditor to find compliance gaps.
- Identify control weaknesses before auditors do
- Map evidence to common audit frameworks
- Prioritize findings by risk severity
Audit Portal Training
Navigate GRC portals and submit audit evidence.
- Upload and tag compliance evidence correctly
- Track remediation tasks to closure
- Avoid common portal submission errors
Employee Security Responsibilities
Know your personal security duties at work.
- Recognize tailgating and credential sharing risks
- Report incidents through the right channels
- Protect physical and digital access points
ISMS Policy Awareness
Connect ISO 27001 policies to your daily work.
- Match ISMS policies to real work situations
- Understand the ISO 27001 policy structure
- Spot gaps between policy and daily practice
Internet & Email Acceptable Use
Stay within corporate internet and email policies.
- Recognize risky email forwarding behaviors
- Understand personal device boundaries at work
- Avoid common acceptable use violations
Protecting Sensitive Information
Data Classification Basics
Label data correctly by sensitivity level.
- Classify data as Public, Internal, or Restricted
- Apply the right handling rules per level
- Avoid mislabeling that leads to data exposure
Identity Theft Prevention
Spot identity theft tactics targeting employees.
- Detect fake HR and payroll redirect emails
- Protect PII from social engineering attacks
- Respond quickly when personal data is exposed
Secure Sharing Practices
Share files safely without creating security gaps.
- Set correct link permissions and expiration
- Choose approved tools over shadow IT options
- Encrypt sensitive files before sharing externally
Data Leakage
Stop sensitive data from leaving your org.
- Catch misdirected emails before sending
- Strip hidden metadata from documents
- Understand insider threat patterns
Workplace Security
Insider Threat (Intentional)
Recognize the warning signs of a malicious insider.
- Spot behavioral indicators of data theft
- Understand reporting responsibilities
- Review real insider threat scenarios
Shadow IT Awareness
Find out what happens when teams use unapproved apps.
- Identify unauthorized SaaS tools
- Understand compliance and data risks
- Learn the approval request process
Image-Based Attacks (Stegosploit)
That image file might be carrying more than pixels.
- Understand how malware hides in images
- Detect suspicious image file behavior
- Apply safe image handling practices
Remote & Home Office Security
VPN Usage & Safety
Configure and use your VPN without leaving gaps.
- Identify split tunneling risks
- Handle dropped VPN connections safely
- Apply VPN best practices for remote work
Home Router Security
Find out who else is on your home network.
- Change default router credentials
- Spot unauthorized devices on your network
- Update router firmware and enable WPA3
Why Interactive Security Awareness Training Works
Traditional security awareness programs rely on annual slideshows or pre-recorded videos that employees passively watch and quickly forget. Interactive training places employees inside realistic 3D attack simulations where they make decisions under pressure and see the consequences of each choice.
Multiple studies show that experiential learning improves knowledge retention compared to lectures. Organizations using simulation-based training also report 3x higher completion rates than those using video-only programs.
This catalogue organizes 46 free interactive exercises into 10 structured courses covering phishing detection, ransomware response, social engineering defense, device security, password management, web browser safety, incident reporting, safe communication practices, security policies, and remote work security.
Frequently Asked Questions
Common questions about our security awareness training exercises and courses.
What is security awareness training?
Security awareness training teaches employees to recognize and respond to cybersecurity threats they encounter in daily work. It covers phishing emails, social engineering phone calls, password hygiene, device security, safe browsing habits, and incident reporting. Effective programs use interactive simulations rather than passive videos, because hands-on practice builds the reflexes employees need when a real attack arrives.
Are these security awareness exercises really free?
Yes. All 42 interactive exercises on this page are free to play with no sign-up required. Each exercise runs directly in your browser as a 3D simulation. Enterprise features like analytics dashboards, SCORM packaging for your LMS, SSO integration, and custom content are available through our paid plans.
How long does each exercise take to complete?
Most exercises take between 5 and 15 minutes. They are designed for busy schedules. Employees can complete them between meetings or during a dedicated training block. Short, focused sessions lead to better retention than hour-long compliance modules.
Can I use these exercises for compliance training?
Yes. Our exercises map to requirements in SOC 2, ISO 27001, HIPAA, PCI DSS, NIST, and GDPR frameworks. For compliance documentation, our enterprise plans include SCORM packages that integrate with your LMS and provide completion tracking, scores, and audit-ready reports.
What topics does the security awareness catalogue cover?
The catalogue spans 10 structured courses: Phishing and Impersonation Attacks, Device Security, Passwords and Account Security, Web Browser Safety, Incident Reporting, Safe Communication Practices, Security Policies, Protecting Sensitive Information, Workplace Security, and Remote Work Security. Together they cover the full spectrum of human-layer security risks.
How is this different from video-based security training?
Video-based training is passive. Employees watch and forget. Our 3D simulations place employees inside realistic attack scenarios where they make decisions and see consequences. Multiple studies show that active learning outperforms passive instruction in knowledge retention. Our simulation-based exercises also see 3x higher completion rates than traditional video modules.
Scale Security Training to Your Entire Workforce
Get SCORM packages for your LMS, analytics dashboards, SSO integration, and custom training content tailored to your industry.