Skip to main content
All CollectionsuLearnuLearn courses
List of uLearn training courses
List of uLearn training courses

Find out what courses are available in the uLearn Course Library.

Micke Ahola avatar
Written by Micke Ahola
Updated over a month ago

There are three categories of courses available on uLearn:

In this article, you can find a list of all available courses on the uLearn platform, or export the entire course catalogue in a PDF.


Export course catalogue

Export the uLearn course catalogue by downloading the list of available courses here [PDF].


Information Security Courses

Click on a subcategory to expand the list of available courses.

These are the courses included in the automated security training programme - Auto Enrol.

Beginner

  • Phishing

  • Public Wi-Fi

  • Secure Passwords & Authentication

  • Physical Security

  • Cloud Security

  • Secure Internet Use

  • Mobile Device Security

  • Removable Media

  • Social Engineering

  • Using Social Media Safely

  • Working Remotely

  • Security at Home

Intermediate

  • Ransomware

  • What Makes a Cyber Criminal?

  • The Internet of Things

  • The Insider Threat

  • Information & Data

  • Smishing

  • Secure Email Use

  • Videoconferencing Securely

  • Data Loss

  • Denial of Service Attacks (DOS)

  • Patching & Updating

  • Vishing

Advanced

  • Spyware & Adware

  • The Dark Web

  • Protecting Your Online Privacy

  • BYOD

  • Secure VPN Use

  • File Sharing in the Workplace

  • Home Network Security

  • Clear Desk Policy

  • Online Payments

  • Malicious Websites & Applications

  • Malware

  • Using Third Party Services Securely


Compliance courses

Click on a subcategory to expand the list of available courses.

China

  • What is the Personal Information Protection Law (PIPL) in China?

France

  • Le Cyberscore

New Zealand

  • Introduction to the New Zealand Privacy Act 2020

International

  • Anti-Money Laundering (General)

  • Cyber Security for the Board

  • Data Classification

  • Data Handling

  • European Union Artificial Intelligence Act (EU AI)

  • GDPR

  • GDPR (Advanced)

  • GDPR Essentials

  • GDPR for Consumers

  • GDPR for Senior Staff Members

  • Network and Information Security Directive (NIS 2)

  • PCI DSS

  • PCI DSS Essentials

  • PCI DSS 4.0 - Advanced Training

  • Protecting Payment Card Information

  • Protecting Personal Data (GDPR)

  • Data Protection Managed

  • Security Awareness Training and Data Protection

  • Security Awareness Training - Overview

Australia

  • Anti-Money Laundering (AU)

  • The Australian Privacy Act 1988

  • The Australian Privacy Act 1988 for Managers

Canada

  • Consumer Privacy Protection Act

  • Staying Compliant with Quebec’s Law 25

India

  • Introduction to the Digital Personal Data Protection Act

  • Digital Personal Data Protection Act for Managers

Singapore

  • Introduction to the Personal Data Protection Act (PDPA)

South Africa

  • Protecting Personal Information (POPIA)

  • Protection of Personal Information Act (POPIA)

United Kingdom

  • Anti-Money Laundering

  • Anti-Slavery

  • Anti-Tax Evasion

  • The Data Protection Act

  • The Bribery Act (UK): Introduction

  • The Bribery Act (UK): Understanding Compliance

United States

  • California Consumer Privacy Act (CCPA)

  • HIPAA

  • Sarbanes-Oxley (SOX)

  • Understanding HIPAA: Beginner

  • Understanding HIPAA: Intermediate

  • Understanding HIPAA: Advanced

  • HIPAA: The Privacy Rule Explained

  • HIPAA: Training for Business Associates

  • HIPAA: Training for IT Professionals

  • HIPAA: Training for Managers

  • HIPAA: Refresher Course

  • What is the Federal Trade Commission (FTC) Safeguards Rule?

  • FTC’s Safeguards Rule for Managers

  • The Colorado Privacy Act (CPA)


Custom courses

Click on a subcategory to expand the list of available courses.

C-Suite Security

  • C-Suite Security: Introduction to Cyber Security for Senior Management

  • C-Suite Security: Securing Accounts with Passwords and Authentication

  • C-Suite Security: Staying Safe from Social Engineering Attacks

  • C-Suite Security: Keeping Data and Devices Safe when Travelling

  • C-Suite Security: Building a Secure Culture

NCSC Courses

  • Defending yourself against phishing attacks (NCSC)

  • Introduction to Top Tips for Staff (NCSC)

  • Protecting your accounts with strong passwords (NCSC)

  • Securing your devices (NCSC)

  • Top Tips for Staff (NCSC)

High Risk User Courses

  • High Risk User Training: Protecting Company Systems with Passwords and Authentication

  • High Risk User Training: Protecting Company Data with the Principle of Least Privilege

  • High Risk User Training: Staying Safe from Social Engineering Attacks

Other custom courses

  • Phishing +

  • Phishing ++

  • Phishing Micro Training

  • Protecting Corporate Social Media Accounts

  • Secure Coding Practices

  • The Importance of VPNs

  • AI Threats: AI-Driven Phishing Attacks

  • AI Threats: Deepfake Attacks

  • AI Threats: Staying Safe from AI Attacks

  • Safe Use of AI Tools

  • Email Thread Hijacking

  • Multi-Factor Authentication (MFA) Fatigue Attacks

  • Attachment Phishing

  • Attachment Phishing Micro Training

  • QR Code Attacks

  • QR Code Phishing Emails

  • QR Code Phishing Emails Micro Training

  • Interactive Voice Response Scams (IVR)

  • Test Pests

  • Brad's Marvellous Micro-Phishing Course

  • Typosquatting Scams

  • Voice Cloning Scams

  • Effective Communication in Cybersecurity

  • Infostealer Malware Attack

Next steps

Did this answer your question?