There are three categories of courses available on uLearn:
In this article, you can find a list of all available courses on the uLearn platform, or export the entire course catalogue in a PDF.
Export course catalogue
Export the uLearn course catalogue by downloading the list of available courses here [PDF].
Information Security Courses
Click on a subcategory to expand the list of available courses.
These are the courses included in the automated security training programme - Auto Enrol.
Beginner
Beginner
Phishing
Public Wi-Fi
Secure Passwords & Authentication
Physical Security
Cloud Security
Secure Internet Use
Mobile Device Security
Removable Media
Social Engineering
Using Social Media Safely
Working Remotely
Security at Home
Intermediate
Intermediate
Ransomware
What Makes a Cyber Criminal?
The Internet of Things
The Insider Threat
Information & Data
Smishing
Secure Email Use
Videoconferencing Securely
Data Loss
Denial of Service Attacks (DOS)
Patching & Updating
Vishing
Advanced
Advanced
Spyware & Adware
The Dark Web
Protecting Your Online Privacy
BYOD
Secure VPN Use
File Sharing in the Workplace
Home Network Security
Clear Desk Policy
Online Payments
Malicious Websites & Applications
Malware
Using Third Party Services Securely
Compliance courses
Click on a subcategory to expand the list of available courses.
China
China
What is the Personal Information Protection Law (PIPL) in China?
France
France
Le Cyberscore
New Zealand
New Zealand
Introduction to the New Zealand Privacy Act 2020
International
International
Anti-Money Laundering (General)
Cyber Security for the Board
Data Classification
Data Handling
European Union Artificial Intelligence Act (EU AI)
GDPR
GDPR (Advanced)
GDPR Essentials
GDPR for Consumers
GDPR for Senior Staff Members
Network and Information Security Directive (NIS 2)
PCI DSS
PCI DSS Essentials
PCI DSS 4.0 - Advanced Training
Protecting Payment Card Information
Protecting Personal Data (GDPR)
Data Protection Managed
Security Awareness Training and Data Protection
Security Awareness Training - Overview
Network and Information Security Directive (NIS 2)
Australia
Australia
Anti-Money Laundering (AU)
The Australian Privacy Act 1988
The Australian Privacy Act 1988 for Managers
Canada
Canada
Consumer Privacy Protection Act
Staying Compliant with Quebec’s Law 25
India
India
Introduction to the Digital Personal Data Protection Act
Digital Personal Data Protection Act for Managers
Singapore
Singapore
Introduction to the Personal Data Protection Act (PDPA)
South Africa
South Africa
Protecting Personal Information (POPIA)
Protection of Personal Information Act (POPIA)
United Kingdom
United Kingdom
Anti-Money Laundering
Anti-Slavery
Anti-Tax Evasion
The Data Protection Act
The Bribery Act (UK): Introduction
The Bribery Act (UK): Understanding Compliance
United States
United States
California Consumer Privacy Act (CCPA)
HIPAA
Sarbanes-Oxley (SOX)
Understanding HIPAA: Beginner
Understanding HIPAA: Intermediate
Understanding HIPAA: Advanced
HIPAA: The Privacy Rule Explained
HIPAA: Training for Business Associates
HIPAA: Training for IT Professionals
HIPAA: Training for Managers
HIPAA: Refresher Course
What is the Federal Trade Commission (FTC) Safeguards Rule?
FTC’s Safeguards Rule for Managers
The Colorado Privacy Act (CPA)
New York SHIELD Act
Custom courses
Click on a subcategory to expand the list of available courses.
C-Suite Security
C-Suite Security
C-Suite Security: Introduction to Cyber Security for Senior Management
C-Suite Security: Securing Accounts with Passwords and Authentication
C-Suite Security: Staying Safe from Social Engineering Attacks
C-Suite Security: Keeping Data and Devices Safe when Travelling
C-Suite Security: Building a Secure Culture
NCSC Courses
NCSC Courses
Defending yourself against phishing attacks (NCSC)
Introduction to Top Tips for Staff (NCSC)
Protecting your accounts with strong passwords (NCSC)
Securing your devices (NCSC)
Top Tips for Staff (NCSC)
High Risk User Courses
High Risk User Courses
High Risk User Training: Protecting Company Systems with Passwords and Authentication
High Risk User Training: Protecting Company Data with the Principle of Least Privilege
High Risk User Training: Staying Safe from Social Engineering Attacks
Other custom courses
Other custom courses
Phishing +
Phishing ++
Phishing Micro Training
Protecting Corporate Social Media Accounts
Secure Coding Practices
The Importance of VPNs
AI Threats: AI-Driven Phishing Attacks
AI Threats: Deepfake Attacks
AI Threats: Staying Safe from AI Attacks
Safe Use of AI Tools
Email Thread Hijacking
Multi-Factor Authentication (MFA) Fatigue Attacks
Attachment Phishing
Attachment Phishing Micro Training
QR Code Attacks
QR Code Phishing Emails
QR Code Phishing Emails Micro Training
Interactive Voice Response Scams (IVR)
Test Pests
Brad's Marvellous Micro-Phishing Course
Typosquatting Scams
Voice Cloning Scams
Effective Communication in Cybersecurity
Infostealer Malware Attack
Data Minimisation
Online Shopping Scams
Next steps
Find out how to exclude a course from Auto Enrol