Skip to main content
Book a Demo
Security Awareness

Security Awareness
Training

58 free interactive exercises across 10 structured courses.

Build a security-first culture with hands-on 3D simulations covering phishing, social engineering, ransomware, device security, passwords, incident reporting, and more. No sign-up required.

1

Phishing & Impersonation Attacks

Callback Phishing

Handle a fake invoice designed to make you call.

  • Identify TOAD attack patterns
  • Spot fake invoices with callback numbers
  • Respond without clicking any links
Play Exercise

Phishing

Spot a phishing email before you click.

  • Identify spoofed senders and URLs
  • Recognize credential theft attempts
  • Report phishing through proper channels
Play Exercise

Vishing

Handle a realistic voice phishing call.

  • Detect caller ID spoofing tactics
  • Practice callback verification steps
  • Resist urgency and authority pressure
Play Exercise

Smishing

Detect fraud hiding in your text messages.

  • Spot SMS phishing red flags
  • Understand why text links get more clicks
  • Verify messages without tapping links
Play Exercise

Double Barrel Phishing

Recognize the two-email trust trap.

  • Identify the benign setup message
  • Spot the malicious follow-up payload
  • Break the false trust chain
Play Exercise

Business Email Compromise

Stop a CEO impersonation wire fraud.

  • Detect executive impersonation emails
  • Verify payment requests out-of-band
  • Understand BEC financial impact
Play Exercise

Social Engineering

Recognize manipulation before you comply.

  • Detect pretexting and authority scams
  • Practice verification under pressure
  • Understand the human element in breaches
Play Exercise

Whaling With A Deepfake

Spot an AI-generated executive on a video call.

  • Detect deepfake video call indicators
  • Verify identity during live meetings
  • Learn from the $25M Hong Kong case
Play Exercise

Spear Phishing

Your public profile is their attack playbook.

  • Spot phishing emails built from your own social media posts
  • Verify unknown contacts through independent channels before engaging
  • Detect credential harvesting pages disguised as collaboration portals
Play Exercise

QR Code Phishing (Quishing)

That QR code skips every email filter you have.

  • Recognize phishing emails that use QR codes to bypass security filters
  • Inspect URLs on mobile devices before entering credentials
  • Apply verification steps for unexpected IT requests containing QR codes
Play Exercise

WhatsApp Social Engineering

Your "boss" on WhatsApp isn't your boss.

  • Recognize boss impersonation tactics on messaging platforms
  • Resist urgency and pressure techniques used in gift card scams
  • Verify requests through official company communication channels
Play Exercise

Tech Support Scams

That virus warning is the actual attack.

  • Recognize fake virus alerts and browser hijack tactics
  • Refuse remote access requests from unsolicited callers
  • Follow proper incident response steps when encountering suspicious pop-ups
Play Exercise

SEO Poisoning Awareness

Top search results aren't always trustworthy.

  • Detect fake software download pages promoted through search engine manipulation
  • Verify software authenticity using checksums and official vendor sources
  • Recognize SEO poisoning techniques attackers use to rank malicious sites
Play Exercise
2

Device Security

Backup Best Practices

Build a backup plan that survives ransomware.

  • Apply the 3-2-1 backup rule
  • Distinguish sync from true backup
  • Test restoration before you need it
Play Exercise

Encryption & Lock Discipline

Practice the habits that protect unattended devices.

  • Enable full disk encryption
  • Build a screen-locking habit
  • Secure devices in physical spaces
Play Exercise

OS Updates & Patching Basics

See why skipping updates opens real attack paths.

  • Prioritize security patches by severity
  • Learn from the WannaCry outbreak
  • Set effective auto-update policies
Play Exercise

Ransomware

Survive a ransomware attack in real time.

  • Respond to a live ransomware scenario
  • Follow containment and isolation steps
  • Preserve evidence for forensic analysis
Play Exercise

USB Drop Attack

Think twice before plugging in that USB drive.

  • Recognize planted USB devices
  • Understand Rubber Ducky payloads
  • Follow safe handling procedures
Play Exercise

Endpoint Patching & EDR Alerts

Know what your EDR alert means and what to do next.

  • Respond correctly to EDR security alerts
  • Triage alerts by severity level
  • Check your device's patch status
Play Exercise

File Extension Awareness

It looks like a PDF. It runs like malware.

  • Spot double-extension tricks that disguise executables as documents
  • Practice safe file verification before opening shared deliverables
  • Respond correctly to antivirus alerts instead of dismissing them
Play Exercise

Safe Bluetooth Practices

Your headphones are broadcasting more than music.

  • Audit paired devices and remove unknown or outdated connections
  • Configure Bluetooth discoverability to prevent unauthorized pairing
  • Detect signs of Bluetooth eavesdropping and interception attacks
Play Exercise
3

Passwords & Account Security

Account Recovery Security

Defend account recovery from social engineering.

  • Verify identity before processing recovery requests
  • Recognize pretexting tactics targeting help desks
  • Secure recovery questions and backup methods
Play Exercise

Credential Stuffing Awareness

See how breached passwords fuel automated attacks.

  • Understand how credential stuffing works
  • Check if your accounts appear in breaches
  • Break the password reuse chain
Play Exercise

Joiner-Mover-Leaver Awareness

Manage access rights through role transitions.

  • Request correct access during onboarding
  • Adjust permissions when changing roles
  • Ensure clean offboarding removes all access
Play Exercise

Least Privilege Awareness

Keep access to the minimum your job requires.

  • Identify when you have more access than needed
  • Request and approve access changes properly
  • Spot permission creep before auditors do
Play Exercise

MFA Setup & Best Practices

Set up multi-factor authentication the right way.

  • Compare SMS, authenticator, and hardware keys
  • Recognize and resist MFA fatigue attacks
  • Configure backup methods for account recovery
Play Exercise

Password Manager Habits

Build strong habits with your password manager.

  • Generate unique passwords for every account
  • Use autofill as a phishing detection tool
  • Maintain a clean, organized password vault
Play Exercise

Privileged Access Basics

Learn why admin accounts need special handling.

  • Apply just-in-time access principles
  • Practice separation of duties
  • Secure root and admin credentials
Play Exercise
4

Web & Browser Safety

5

Incident Reporting

6

Safe Communication & Sharing

7

Security Policies & Your Role

8

Protecting Sensitive Information

9

Workplace Security

10

Remote & Home Office Security

Why Interactive Security Awareness Training Works

Traditional security awareness programs rely on annual slideshows or pre-recorded videos that employees passively watch and quickly forget. Interactive training places employees inside realistic 3D attack simulations where they make decisions under pressure and see the consequences of each choice.

Multiple studies show that experiential learning improves knowledge retention compared to lectures. Organizations using simulation-based training also report 3x higher completion rates than those using video-only programs.

This catalogue organizes 58 free interactive exercises into 10 structured courses covering phishing detection, ransomware response, social engineering defense, device security, password management, web browser safety, incident reporting, safe communication practices, security policies, and remote work security.

FAQ

Frequently Asked Questions

Common questions about our security awareness training exercises and courses.

What is security awareness training?

Security awareness training teaches employees to recognize and respond to cybersecurity threats they encounter in daily work. It covers phishing emails, social engineering phone calls, password hygiene, device security, safe browsing habits, and incident reporting.

Effective programs use interactive simulations rather than passive videos, because hands-on practice builds the reflexes employees need when a real attack arrives.

Are these security awareness exercises really free?

Yes. All 42 interactive exercises on this page are free to play with no sign-up required. Each exercise runs directly in your browser as a 3D simulation.

Enterprise features like analytics dashboards, SCORM packaging for your LMS, SSO integration, and custom content are available through our paid plans.

How long does each exercise take to complete?

Most exercises take between 5 and 15 minutes. They are designed for busy schedules.

Employees can complete them between meetings or during a dedicated training block. Short, focused sessions lead to better retention than hour-long compliance modules.

Can I use these exercises for compliance training?

Yes. Our exercises map to requirements in SOC 2, ISO 27001, HIPAA, PCI DSS, NIST, and GDPR frameworks.

For compliance documentation, our enterprise plans include SCORM packages that integrate with your LMS and provide completion tracking, scores, and audit-ready reports.

What topics does the security awareness catalogue cover?

The catalogue spans 10 structured courses: Phishing and Impersonation Attacks, Device Security, Passwords and Account Security, Web Browser Safety, Incident Reporting, Safe Communication Practices, Security Policies, Protecting Sensitive Information, Workplace Security, and Remote Work Security.

Together they cover the full spectrum of human-layer security risks.

How is this different from video-based security training?

Video-based training is passive. Employees watch and forget. Our 3D simulations place employees inside realistic attack scenarios where they make decisions and see consequences.

Multiple studies show that active learning outperforms passive instruction in knowledge retention. Our simulation-based exercises also see 3x higher completion rates than traditional video modules.

Scale Security Training to Your Entire Workforce

Get SCORM packages for your LMS, analytics dashboards, SSO integration, and custom training content tailored to your industry.

Book a Demo