Skip to main content

List of uLearn training courses

Find out what courses are available in the uLearn Course Library.

Micke Ahola avatar
Written by Micke Ahola
Updated over 3 weeks ago

There are three categories of courses available on uLearn:

In this article, you can find a list of all available courses on the uLearn platform, or export the entire course catalogue in a PDF.


Export course catalogue

Export the uLearn course catalogue by downloading the list of available courses here [PDF].


Information Security Courses

Click on a subcategory to expand the list of available courses.

These are the courses included in the automated security training programme - Auto Enrol.

Beginner

  • Phishing

  • Public Wi-Fi

  • Secure Passwords & Authentication

  • Physical Security

  • Cloud Security

  • Secure Internet Use

  • Mobile Device Security

  • Removable Media

  • Social Engineering

  • Using Social Media Safely

  • Working Remotely

  • Security at Home

Intermediate

  • Ransomware

  • What Makes a Cyber Criminal?

  • The Internet of Things

  • The Insider Threat

  • Information & Data

  • Smishing

  • Secure Email Use

  • Videoconferencing Securely

  • Data Loss

  • Denial of Service Attacks (DOS)

  • Patching & Updating

  • Vishing

Advanced

  • Spyware & Adware

  • The Dark Web

  • Protecting Your Online Privacy

  • BYOD

  • Secure VPN Use

  • File Sharing in the Workplace

  • Home Network Security

  • Clear Desk Policy

  • Online Payments

  • Malicious Websites & Applications

  • Malware

  • Using Third Party Services Securely


Compliance courses

Click on a subcategory to expand the list of available courses.

China

  • Personal Information Protection Law (PIPL)

France

  • Le Cyberscore

New Zealand

  • Introduction to the New Zealand Privacy Act 2020

International

  • Anti-Money Laundering (General)

  • Cyber Security for the Board

  • Data Classification

  • Data Handling

  • European Union Artificial Intelligence Act (EU AI)

  • GDPR

  • GDPR (Advanced)

  • GDPR Essentials

  • GDPR for Consumers

  • GDPR for Senior Staff Members

  • Network and Information Security Directive (NIS 2)

  • PCI DSS

  • PCI DSS Essentials

  • PCI DSS 4.0 - Advanced Training

  • Protecting Payment Card Information

  • Protecting Personal Data (GDPR)

  • Data Protection Managed

  • Security Awareness Training and Data Protection

  • Security Awareness Training - Overview

  • Network and Information Security Directive (NIS 2)

  • Digital Operational Resilience Act (DORA)

Australia

  • Anti-Money Laundering (AU)

  • The Australian Privacy Act 1988

  • The Australian Privacy Act 1988 for Managers

Canada

  • Consumer Privacy Protection Act

  • Law 25: Understanding Compliance

  • Personal Information Protection and Electronic Documents Act (PIPEDA)

  • Alberta Personal Information Privacy Act (PIPA)

  • British Columbia Personal Information Privacy Act (BC PIPA)

India

  • Digital Personal Data Protection Act (DPDPA)

  • Digital Personal Data Protection Act (DPDPA) for Managers

Singapore

  • Personal Data Protection Act (PDPA)

  • Personal Data Protection Act (PDPA) for Managers

South Africa

  • Protecting Personal Information (POPIA)

  • Protection of Personal Information Act (POPIA)

United Kingdom

  • Anti-Money Laundering

  • Anti-Slavery

  • Anti-Tax Evasion

  • The Data Protection Act

  • The Bribery Act (UK): Introduction

  • The Bribery Act (UK): Understanding Compliance

United States

  • California Consumer Privacy Act (CCPA / CPRA)

  • HIPAA

  • Sarbanes-Oxley (SOX)

  • SOX: Record Keeping

  • SOX: Physical Safeguards

  • SOX: Technical Safeguards

  • HIPAA: Beginner's Course

  • HIPAA: Intermediate Course

  • HIPAA: Advanced Course Course

  • HIPAA: Privacy Rule

  • HIPAA: Training for Business Associates

  • HIPAA: Training for IT Professionals

  • HIPAA: Training for Managers

  • HIPAA: Refresher Course

  • Federal Trade Commission (FTC)'s Safeguards Rule

  • Federal Trade Commision (FTC)'s Safeguards Rule - Manager's course

  • The Colorado Privacy Act (CPA)

  • New York SHIELD Act

  • Virginia Consumer Data Protection Act (VCDPA)

  • Texas Data Privacy and Security Act (TDPSA)


Custom courses

Click on a subcategory to expand the list of available courses.

C-Suite Security

  • C-Suite Security: Introduction to Cyber Security for Senior Management

  • C-Suite Security: Securing Accounts with Passwords and Authentication

  • C-Suite Security: Staying Safe from Social Engineering Attacks

  • C-Suite Security: Keeping Data and Devices Safe when Travelling

  • C-Suite Security: Building a Secure Culture

NCSC Courses

  • Defending yourself against phishing attacks (NCSC)

  • Introduction to Top Tips for Staff (NCSC)

  • Protecting your accounts with strong passwords (NCSC)

  • Securing your devices (NCSC)

  • Top Tips for Staff (NCSC)

High Risk User Courses

  • High Risk User Training: Protecting Company Systems with Passwords and Authentication

  • High Risk User Training: Protecting Company Data with the Principle of Least Privilege

  • High Risk User Training: Staying Safe from Social Engineering Attacks

Other custom courses

  • Phishing +

  • Phishing ++

  • Phishing Micro Training

  • Protecting Corporate Social Media Accounts

  • Secure Coding Practices

  • The Importance of VPNs

  • AI Threats: AI-Driven Phishing Attacks

  • AI Threats: Deepfake Attacks

  • AI Threats: Staying Safe from AI Attacks

  • Safe Use of AI Tools

  • Email Thread Hijacking

  • Multi-Factor Authentication (MFA) Fatigue Attacks

  • Attachment Phishing

  • Attachment Phishing Micro Training

  • QR Code Attacks

  • QR Code Phishing Emails

  • QR Code Phishing Emails Micro Training

  • Interactive Voice Response Scams (IVR)

  • Test Pests

  • Brad's Marvellous Micro-Phishing Course

  • Typosquatting Scams

  • Voice Cloning Scams

  • Effective Communication in Cybersecurity

  • Infostealer Malware Attack

  • Data Minimisation

  • Online Shopping Scams

  • Sport Event Scams

  • Fake Website Scams

  • Safe Use of AI Tools: ChatGPT

  • Safe Use of AI Tools: Claude

  • Safe Use of AI Tools: Copilot

  • Safe Use of AI Tools: DeepSeek

Next steps

Did this answer your question?