Skip to main content

List of uLearn training courses

Find out what courses are available in the uLearn Course Library.

Micke Ahola avatar
Written by Micke Ahola
Updated yesterday

There are three categories of courses available on uLearn:

In this article, you can find a list of all available courses on the uLearn platform.


Information Security Courses

Click on a subcategory to expand the list of available courses.

Beginner

  • Phishing

  • Public Wi-Fi

  • Secure Passwords & Authentication

  • Physical Security

  • Cloud Security

  • Secure Internet Use

  • Mobile Device Security

  • Removable Media

  • Social Engineering

  • Using Social Media Safely

  • Working Remotely

  • Security at Home

Intermediate

  • Ransomware

  • What Makes a Cyber Criminal?

  • The Internet of Things

  • The Insider Threat

  • Information & Data

  • Smishing

  • Secure Email Use

  • Videoconferencing Securely

  • Multi-Factor Authentication (MFA) Fatigue Attacks

  • Denial of Service Attacks (DOS)

  • Patching & Updating

  • Vishing

Advanced

  • Spyware & Adware

  • Data Breaches

  • Protecting Your Online Privacy

  • Email Thread Hijacking

  • Secure VPN Use

  • File Sharing in the Workplace

  • Home Network Security

  • Clear Desk Policy

  • Online Payments

  • Quishing (QR Code Phishing)

  • Malware

  • Using Third Party Services Securely


Compliance courses

Click on a subcategory to expand the list of available courses.

China

  • Personal Information Protection Law (PIPL)

France

  • Le Cyberscore

New Zealand

  • Introduction to the New Zealand Privacy Act 2020

International

  • Anti-Money Laundering (General)

  • Bullying in the Workplace

  • Cyber Security for the Board

  • Data Classification

  • Data Handling

  • European Union Artificial Intelligence Act (EU AI)

  • GDPR

  • GDPR (Advanced)

  • GDPR Essentials

  • GDPR for Consumers

  • GDPR for Senior Staff Members

  • Harassment in the Workplace

  • Network and Information Security Directive (NIS 2)

  • PCI DSS

  • PCI DSS Essentials

  • PCI DSS 4.0 - Advanced Training

  • Protecting Payment Card Information

  • Protecting Personal Data (GDPR)

  • Data Protection Managed

  • Security Awareness Training and Data Protection

  • Security Awareness Training - Overview

  • Network and Information Security Directive (NIS 2)

  • Digital Operational Resilience Act (DORA)

Australia

  • Anti-Money Laundering (AU)

  • Bullying in the Workplace (AU)

  • Harassment in the Workplace (AU)

  • The Australian Privacy Act 1988

  • The Australian Privacy Act 1988 for Managers

Canada

  • Consumer Privacy Protection Act

  • Law 25: Understanding Compliance

  • Personal Information Protection and Electronic Documents Act (PIPEDA)

  • Alberta Personal Information Privacy Act (PIPA)

  • British Columbia Personal Information Privacy Act (BC PIPA)

India

  • Digital Personal Data Protection Act (DPDPA)

  • Digital Personal Data Protection Act (DPDPA) for Managers

Singapore

  • Personal Data Protection Act (PDPA)

  • Personal Data Protection Act (PDPA) for Managers

South Africa

  • Protecting Personal Information (POPIA)

  • Protection of Personal Information Act (POPIA)

United Kingdom

  • Anti-Money Laundering

  • Anti-Slavery

  • Anti-Tax Evasion

  • The Data Protection Act

  • The Bribery Act (UK): Introduction

  • The Bribery Act (UK): Understanding Compliance

United States

  • California Consumer Privacy Act (CCPA / CPRA)

  • HIPAA

  • Sarbanes-Oxley (SOX)

  • SOX: Record Keeping

  • SOX: Physical Safeguards

  • SOX: Technical Safeguards

  • HIPAA: Beginner's Course

  • HIPAA: Intermediate Course

  • HIPAA: Advanced Course Course

  • HIPAA: Privacy Rule

  • HIPAA: Training for Business Associates

  • HIPAA: Training for IT Professionals

  • HIPAA: Training for Managers

  • HIPAA: Refresher Course

  • Federal Trade Commission (FTC)'s Safeguards Rule

  • Federal Trade Commision (FTC)'s Safeguards Rule - Manager's course

  • The Colorado Privacy Act (CPA)

  • New York SHIELD Act

  • Virginia Consumer Data Protection Act (VCDPA)

  • Texas Data Privacy and Security Act (TDPSA)


Custom courses

Click on a subcategory to expand the list of available courses.

C-Suite Security

  • C-Suite Security: Introduction to Cyber Security for Senior Management

  • C-Suite Security: Securing Accounts with Passwords and Authentication

  • C-Suite Security: Staying Safe from Social Engineering Attacks

  • C-Suite Security: Keeping Data and Devices Safe when Travelling

  • C-Suite Security: Building a Secure Culture

NCSC Courses

  • Defending yourself against phishing attacks (NCSC)

  • Introduction to Top Tips for Staff (NCSC)

  • Protecting your accounts with strong passwords (NCSC)

  • Securing your devices (NCSC)

  • Top Tips for Staff (NCSC)

High Risk User Courses

  • High Risk User Training: Protecting Company Systems with Passwords and Authentication

  • High Risk User Training: Protecting Company Data with the Principle of Least Privilege

  • High Risk User Training: Staying Safe from Social Engineering Attacks

Other custom courses

  • Phishing +

  • Phishing ++

  • Phishing Micro Training

  • Protecting Corporate Social Media Accounts

  • Secure Coding Practices

  • The Importance of VPNs

  • AI Threats: AI-Driven Phishing Attacks

  • AI Threats: Deepfake Attacks

  • AI Threats: Staying Safe from AI Attacks

  • Safe Use of AI Tools

  • Email Thread Hijacking

  • Data Loss

  • Attachment Phishing

  • Attachment Phishing Micro Training

  • QR Code Attacks

  • QR Code Phishing Emails

  • QR Code Phishing Emails Micro Training

  • Interactive Voice Response Scams (IVR)

  • Test Pests

  • Brad's Marvellous Micro-Phishing Course

  • Typosquatting Scams

  • Voice Cloning Scams

  • Effective Communication in Cybersecurity

  • Infostealer Malware Attack

  • Data Minimisation

  • Online Shopping Scams

  • Sport Event Scams

  • Fake Website Scams

  • Safe Use of AI Tools: ChatGPT

  • Safe Use of AI Tools: Claude

  • Safe Use of AI Tools: Copilot

  • Safe Use of AI Tools: DeepSeek

  • Business Email Compromise

  • CEO Fraud

  • Pig Butchering Scams

  • Bank Advisor Scams

  • Tech Support Scams

  • Search Engine Phishing

  • Webcam Blackmail

  • The Dark Web

  • BYOD (Bring Your Own Device Policies)

  • Malicious Websites & Applications

  • Using AI in Code: Benefits, Risks and Best Practices

  • Chatbot Phishing

  • Canada Revenue Agency Scams (CRA Scams)


Incremental Inline Training courses

  • Phishing Incremental Inline Training Level 1

  • Phishing Incremental Inline Training Level 2

  • Phishing Incremental Inline Training Level 3


Next steps

Did this answer your question?