Cofense Logo - Email Security Solutions

CBFree Security Training

HIGH QUALITY, COMPLIMENTARY, COMPUTER BASED TRAINING

These look great! The presentation and audio are exactly what we needed!
User Quote - Cofense
– Director, Information Security

For many of our customers, security awareness Computer Based Training (CBT) helps check-a-box to satisfy a compliance need. We recognize this need is a requirement so we’ve developed a set of SCORM-compliant materials to help meet that need for all companies – Cofense customers and non-customers alike – free of charge. That’s right. Free.

The same amazing team that produces Cofense’s best-in-class Simulation content keeps the material fresh, compliant, and relevant!

Easy to Understand, Use, and Adapt

We’ve made it easy for you to take advantage of this content. If you have a Learning Management System (LMS) that ingests SCORM-compliant materials, just download the files and run the training through your own LMS. Cofense CBFreeTM was developed using the latest eLearning techniques and trends that promote substantial engagement by the pupil. Each module takes about 5 minutes to complete and comes with an optional 5-15 minutes of interactive Q&A.

Security Awareness Modules

Interactive Modules covering today’s biggest threats. Available in multiple languages.

Cofense CBT CS 01

Cybersecurity Awareness​

This Cybersecurity module was developed to raise awareness about how to avoid online threats that might target you or our organization. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimize the risk of an attack.
Safe Icon - Cofense

Data Protection​

Data protection is a core value for any organization that handles confidential information. This lesson covers how to handle information safely and common responsibilities under various laws and policies.
Spy Icon - Cofense

Insider Threats​

Some of the most dangerous threats to your organization can come from within. In this lesson, we discuss the three main types of insider threats, what motivates them, and what you can do to help minimize the risk of an inside attack.
Advanced Spear Phishing - Cofense

Advanced Spear Phishing

This Cybersecurity module was developed to raise awareness about how to avoid online threats that might target you or our organization. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimize the risk of an attack.
BEC Icon - Cofense

Business Email Compromise

The Business Email Compromise (BEC) Scams module covers topics on: identifying BEC scams, differentiating between the three main types of BEC scams, and reporting a suspected attack.
Cloud Computing - Cofense

Cloud Computing

The Cloud Computing module will differentiate desktop from cloud computing; identify the advantages and disadvantages of cloud computing; and describe several best practices for using the cloud safely.
Link Icon - Cofense

Malicious Links

On the Web and in email, hyperlinks are the easiest tool that cyber criminals can use to deliver malware—all it takes is the click of a link. In this lesson, we break down the parts of a link and the structure of a URL to reveal the warning signs of a malicious link.
Virus Icon - Cofense

Malware

Malware has been a threat for decades, and it has grown more sophisticated over the years. Various forms of malware might spy on your activity, allow attackers remote access to your drives, or take control of your device. This lesson teaches what the different types of malware do, and how to avoid falling victim to them.
Mobile Phone Icon - Cofense

Mobile Devices

Modern mobile devices allow you to bring your office anywhere; they also leave your information incredibly vulnerable. In this lesson, learn the best practices for keeping your information safe when browsing on a mobile device.
Password Icon - Cofense

Passwords

A password is your account’s first line of defense, but it is also vulnerable to cyber attacks. In this lesson, we discuss password strength and password diversity along with the best password security tools and practices for keeping your account secure.
Fingerprint icon for authentication and security

Physical Security

Physical security measures are used to deter and detect unauthorized access to your technical devices. In this lesson, teach your employees about the steps you have taken to secure the workspace; where they are most at risk; and what they can do to prevent falling victim to theft.
Ransomware icon for cyber attack and data encryption

Ransomware

The Ransomware module covers topics on: what ransomware is and how it is delivered, ransomware’s effect, minimizing the threat of ransomware, and reporting ransomware attacks.
Building icon representing Email Security for physical infrastructure

Security Outside of the Office

When working outside of the office, employees must be on their guard against an array of threats. Use this lesson to educate your users about threats that linger in public places, and what they can do to protect sensitive information.
Network icon representing Email Security for digital networks

Social Engineering

When working outside of the office, employees must be on their guard against an array of threats. Use this lesson to educate your users about threats that linger in public places, and what they can do to protect sensitive information.
Social engineering icon for Email Security threat through human interaction

Social Networking

Social networking profiles are easily exploited by cyber criminals. In this lesson, we cover the basics of responsible social networking; topics include app permissions, privacy settings, and more.
Envelope icon representing email security and phishing attacks

Spear Phishing

A majority of cyber-intrusion attempts begin with spear phishing emails. These targeted attacks are delivered via malicious links, file attachments, and login forms. This lesson helps show the warning signs to look out for and what to do in the event of a spear phishing attack.
PC icon for computer security and malware protection

Surfing the Web

Encouraging safe Web browsing habits is critical to the safety of your organization. In this lesson, we cover an array of concepts such as secure sockets layer (SSL) encryption, illegal content, and browser plug-ins and extensions.
Gen phishing icon for phishing detection and prevention

General Phishing

The General Phishing modules covers topics on: the differences between spam, phishing, and spear phishing; what you can do to minimize the risk of a phishing attack; and how to identify indicators of a phishing email. *Currently only available in English
IoT icon for Email Security in the Internet of Things

Internet of Things (IoT)

Many people interact with at least one IoT device daily. While these devices make our lives seamless, they also collect, monitor, and manage our data. Learn more on how certain practices will allow you to minimize your risk while using IoT devices and keep your data secure.

Microlearning Modules

CBFree Microlearning is a series of short modules, each 2-3 minutes, with interactive materials or videos plus “knowledge check” questions at the end. These SCORM 1.2 compliant responsive HTML5 modules can be offered through your organization’s learning management system (LMS) or Cofense LMS.

Information security icon for data protection and confidentiality

Be Careful with Information

An overview of Information safety including the use of public networks, secure disposal of information, encrypting data, as well as, keeping personal and business information separate.
Impersonation icon for Email Security threat through impersonation

Brand Impersonation

An overview of brand impersonation including popular narratives from online shopping, shared documents, social networking, shipping, and banking. *Currently available in English only.
Gen phishing icon for phishing detection and prevention

General Phishing

A general overview of phishing, including a short video and knowledge check questions.
Confidential information icon for Email Security and sensitive data protection

Information Classifications

An overview of Information Classifications including, confidential, restricted, internal, and public information.
Virus Icon - Cofense

Malware

An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.
Mobile Phone Icon - Cofense

Mobile Devices

Learn the essentials of mobile device security, including backups, keeping applications up to date, and using a VPN.
Password Icon - Cofense

Passwords

An introduction to passwords, including the use of complex, random, and unique passwords, as well as changing passwords and use of multifactor authentication.
Phishing icon for phishing attacks and detection

Phishing

An overview of phishing, including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.
Emotions icon representing human behavior and Email Security awareness

Phishing and Emotions

Learn the role emotions play in phishing, including a short video and knowledge check questions.
Spear phishing icon for advanced spear phishing attacks and defense

Phishing vs. Spear Phishing

Understand phishing versus spear phishing, including a short video and knowledge check questions.
Risk management icons for Email Security

Risk Management

An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats. *Currently available in English only.
Network icon representing Email Security for digital networks

Social Engineering

An introduction to social engineering, including pretexting, baiting, mind games, and quick tips.
Security solutions icons for protection

Vishing

An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.
Building icon representing Email Security for physical infrastructure

Working Outside the Office

An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.

Security Compliance Modules

Compliance modules that focus on training for a better understanding of the policies, procedures, and reporting standards when it comes to handling protected personal information.

GDPR compliance illustration for data privacy

General Data Protection Regulation (GDPR) Compliance

An overview of the new compliance regulations, your responsibilities under GDPR, and how to report a non-compliance issue. EU-specific.
Health and wellness image for employee safety

Health Care Compliance

An overview of the HIPAA, HITECH and Omnibus legislation and security measures that can be taken to protect the data, and the reporting procedures in case of a data breach
Payment security illustration for financial safety

Payment Data Compliance

Answers “what is cardholder data,” the standard and regulations both an IT-Professional and Non-IT Professional must follow to protect the data and privacy of the cardholder, and how to report a data breach.
User account icon for secure login

Personal Data Compliance

Focuses on the laws and regulations that govern the protection of sensitive personal data, security measures that can be taken to protect the data, and the steps to take when reporting a data breach.
Free privacy tools for online security

Privacy Amendment (Notifiable Data Breaches) Act 2017

Privacy Amendment (NDB) Act module is an overview of the 2017 Act that was instituted in February of 2018 in Australia. The module focuses on the definition of a data breach, and the notification process for eligible data breaches.

Security Awareness Games

Interactive game modules to make security awareness training fun for employees. Available in English only.

Blocks illustration for secure data management

Category Challenge

Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.
Honeycomb image for network security

Honey Comb Challenge

Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.
Phishing meter image for email security

Indicators of a Phish

Investigate the email and answer the prompts. If you score more than 80% you win the game.
Bug illustration for email security

Resiliency Quiz

Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails. Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.
Maze image for Email Security strategy

To Catch a Threat

Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.

Search

We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on wpml.org as a development site.