Overview Of KnowBe4 Training Library Kevin Mitnick . - IT Security

Transcription

Overview of KnowBe4 Training LibraryKevin Mitnick Security Awareness TrainingIncluded in Training Access Level I (Silver)KnowBe4’s game-changing partnershipsallows you to significantly bettermanage the ongoing problem of socialengineering. We offer you thebest-in-class simulated phishingplatform combined with the world'slargest library of always-fresh securityawareness training content; includinginteractive modules, videos, games,posters and newsletters. Contentpublishers include: KnowBe4 The Security Awareness Company Securable.io Popcorn Training ThinkHR Exploqii Canada Privacy Training Twist & Shout Teach Privacy SyntrioTo easily deliver this content library tocustomers, KnowBe4 has a 'ModuleStore'. As a customer, you can use theModStore to search, browse, andpreview content and -- depending onsubscription level -- move modules toyour KnowBe4 account.We offer three Training Access Levels: I,II, and III, giving you access to aconstantly updated content library of850 items based on your subscriptionlevels.If you want to get a real-time view of allthe great content, sign up to access theKnowBe4 ModStore Training Preview tosee our full library.Kevin Mitnick Security Awareness Training(45-min)This fully interactive module takes you on a tour of thethreat landscape and shows you the most common waysbad guys try to trick you. Three real-world scenarios showyou strategies and techniques hackers use to take controlof your computer system. Kevin Mitnick then takes youbehind the scenes to see how the bad guys do what theydo. You’ll learn about the seven areas of an email that cancontain red flags that alert you to a possible attack. TheDanger Zone exercise will let you apply what you’velearned when you help Jake Saunders, a typical computeruser, steer clear of six real-world social engineeringattacks.Kevin Mitnick Security Awareness Training(25-min)This fully interactive module takes you on a tour of thethreat landscape and shows you the most common waysbad guys try to trick you. You’ll learn how to spot red flagsthat alert you to possible danger in an email and thenyou’ll help Jake Saunders, a typical computer user, steerclear of six real-world social engineering attacks.Kevin Mitnick Security Awareness Training(15-min)This module is a condensed version of the full 45-minutetraining, often assigned to management. It covers themechanisms of spam, phishing, spear phishing, spoofing,malware hidden in files, and advanced persistent threats(APTs). This module is available in 26 language versions.

KnowBe4 Cybersecurity Awareness PostersAlso included in Training Access Level I (Silver)2019 Common Threats2019 Social Engineering Red FlagsCaptain AwarenessCaptain Awareness: Conquering Internet Safety for KidsCaptain Awareness: Securing Your Mobile DevicesRisks of Social Media SharingAll Your Data Are Belong To UsBad Rabbit: Think Before You ClickBe An Email SuperheroBurning ManCEO FraudDon't Let Your Strings Get PulledDon’t Click on MeEmail Subject Line Red FlagsGive Us the BitcoinIt only takes oneJaws: Don’t Be a VictimKeep Calm and Don’t ClickLoose Clicks Sink ShipsLoose Lips Sink ShipsLoose Tweets Sink FleetsPhishin’ Is Easy2019 Your Role: Internet Security and YouCaptain Awareness: Triumph over the Reuse of PasswordsRansomware Apocalypse is CallingRansomware Has No BordersRansomware InvadersResist the USB AttackStop Phishing Attacks Dead in Their TracksStop, Look, ThinkStop, Look, Think SignsThe ClickersThere's Something Phishy in Your InboxThink Before You ClickThink Before You Click BoyThink Before You Click BrainThink Before You Click Eye ChartThink Before You Click MonsterThink Before You Click Pop-UpThis is My Ransomware Killing PosterTron RansomwareUncle Sam: I Want You to Stop ClickingWhy Security Awareness Training?You Can’t Go BackKnowBe4 Training ModulesAlso included in Training Access Level II (Gold & Platinum)KnowBe4 Basic Security Awareness TrainingCourse (30-min)This fully interactive module takes you on a tour of thethreat landscape and shows you the most common waysbad guys try to trick you. Three real-world scenarios showyou strategies and techniques hackers use to take controlof your computer system. You’ll learn about the sevenareas of an email that can contain red flags that alert youto a possible attack. The Danger Zone exercise will let youapply what you’ve learned when you help Jake Saunders, atypical computer user, steer clear of six real-world socialengineering attacks.Basics of Credit Card SecurityThis 20-minute module covers the basics of credit cardsecurity. It is meant for all employees in any organizationwho handle credit cards in any form, whether takingorders on the phone, swipe cards on terminals or throughdevices connected to smartphones. It teaches employeesto handle credit card information securely to prevent databreaches. A quiz ends off this module.Risks of Social Media SharingThis course alerts users to the security problems that canarise from common social media usage – even whenposting information that is personal.CEO FraudIn this engaging and interactive module, you will learnhow to defend yourself against what the FBI calls"business email compromise" and what is commonlyknown as “CEO fraud.”Creating Strong PasswordsIn this interactive course you will learn about theimportant rules for creating strong passwords, you’ll test apassword to see how strong it is, and learn about thelatest trend in password security, the passphrase, andhow to create one.Financial Institution Physical Security(for Financial Institutions only)This 20-minute module covers the protection of youremployees, your customers and their funds, the premises,any security devices, computers, and networks, fromphysical circumstances and events that could causeserious losses or damage. This includes protection fromrobbery, kidnap/extortion, bomb threat, fire, naturaldisasters, burglary, and nuclear emergencies.GDPRThis interactive module provides an overview the GeneralData Protection Regulation. The goal of this module is tofamiliarize you with the General Data ProtectionRegulation, also known as the GDPR; what it means toyour organization; and what it means to your job function.There are ungraded knowledge checks along the way tohelp you retain information for real-life scenarios,followed by a graded quiz at the end.

KnowBe4 Training ModulesAlso included in Training Access Level II (Gold & Platinum)Common Threats, Part 1 - Miranda's StoryIn this module you’ll learn about strategies andtechniques hackers use to trick people. We provide youwith three real-world-based scenarios that show you howthese common threats can take place. At the end of eachscenario, Kevin Mitnick will take you behind the scenesand reveal exactly how each type of hack is accomplished.GLBA Compliance Course(for Financial Institutions only)In this module, employees of financial institutions arestepped through the concepts of “Non-Public PersonalInformation”, or NPPI with best practices for protectingcustomers’ personal information, and the employee's rolein ensuring protection of NPPI.Common Threats, Part 2 - Kyle’s StoryWe introduce you to Kyle Montgomery as he deals withthree real-world-based scenarios: Ransomware,Spearphishing, and a Snapchat attack to show you howthese common threats can take place. At the end of eachscenario, Kevin Mitnick will take you behind the scenes andreveal exactly how each type of hack is accomplished.Handling Sensitive InformationThis 15-minute module specializes in making sure youremployees understand the importance of safely handlingsensitive information, like Personally IdentifiableInformation (PII), Protected Health Information (PHI),Credit Card data (PCI DSS), Controlled UnclassifiedInformation (CUI), including your organization’sproprietary information.PCI Compliance SimplifiedThis 15-minute module uses real examples of credit cardfraud, and how to protect your organization against this bybeing PCI compliant. This course is for anyone that’sresponsible for handling credit cards in your organizationand qualifies as Security Awareness Training. Especiallyowners, the CFO or Controller, managers and IT people incharge of credit card processing should take this course.RansomwareThis fun and engaging course will show you whatransomware is, how it works, and how to steer clear ofpotential threats. You’ll meet Sergeant Vasquez, head ofour cyber security task force as he takes you through aline-up of the top attack vectors that bad guys use to holdyour computer systems hostage until you pay the ransom.Ransomware For Hospitals TrainingHospitals are currently targeted by cyber criminals,penetrating their networks and locking patient files withcrypto-ransomware so that no data is accessible for anyhospital worker. This short (7-minute) module givesanyone working in a hospital the basics of ransomware,email security and Red Flags they need to watch out for tohelp prevent very expensive attacks like this.Criminal Justice Information Services Security SeriesThese four courses, Level 1 through Level 4 are designedto satisfy the FBI/CJIS requirements for training employeesbased on their access to protecting criminal justiceinformation.Privileged User Security SeriesThese four courses cover important aspects of privilegedaccess, secure database administration, secure Windowsadministration, and secure Linux administration.Mobile Device SecurityThis 15-minute module specializes in making sure youremployees understand the importance of Mobile DeviceSecurity. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.Safe Web BrowsingIn this fun, fully interactive course you will learn aboutinteresting facts about the World Wide Web, how to avoidcommon dangers, and the "do's and "don'ts" of safe webbrowsing.Social Engineering Red FlagsThis totally interactive module shows you the sevenareas of an email to pay attention to if you don’t want tobe hacked. Once you know where to look, it shows sevenreal-life examples, and you’ll be asked to spot the redflags in each.The Danger ZoneIn this 10-minute module, you will learn to spotreal-world social engineering attacks by helping to guideJake Saunders, a typical computer user, through sixpotential social engineering attacks. Jake needs to makethe right decisions or suffer the consequences.Your Role, Internet Security and YouToday’s threats are sleek, sophisticated, and veryslippery. They can slide right through your organization’santivirus software and spam filters and go straight toyour inbox. This course takes you on a tour of the threatlandscape and shows you some of the common ways thebad guys try to trick you.

KnowBe4 Training Micro-modulesAlso included in Training Access Level II (Gold & Platinum)Credit Card Security (Part 1)Credit Card Security (Part 2)Danger Zone ExerciseDon't Be DaveEmail SpoofingHandling Sensitive Information Securely (Part 1)Handling Sensitive Information Securely (Part 2)Executive Series Micro-modulesCEO FraudDecision-Maker Email ThreatsMobile Device SecurityRansomware and BitcoinRemote and Travel WiFi DangersCaptain Awareness Video SeriesBe a Human FirewallConquer Internet Safety for KidsSecuring Your Mobile DevicesTriumph over the Reuse of PasswordsUnderstanding GDPRSecurely Working from HomeBe Vigilant with USB DrivesOutwit Dumpster DiversTravel SecurelyHandling PrintoutsUnderstanding Data BreachesSafeguard Social MediaProtect Your Web BrowserGuardians of Sensitive InformationVanquish Malicious AttachmentsOutwit Social EngineeringConquer Open WiFiFoil PhishingRansomwareSafe Web BrowsingSocial EngineeringSocial Media Best PracticesStrong PasswordsUSB AttackSafe Web Browsing With Corporate DevicesSecure Destruction of Sensitive InformationSecurely Working From HomeSocial Engineering the ExecutiveSocial Media Precautions for ExecutivesKnowBe4 Video ModulesKevin Mitnick - Two-Factor Authentication AttackKnowBe4 Pretexting - Fake IT "Password Break-In"KnowBe4 Pretexting - Tech Support "Social Engineering"KnowBe4 Pretexting - Two-Factor Authentication AttackKnowBe4 Pretexting - A Fake IT AttackSIM Swapping - Call CenterSIM Swapping - Mobile End UsersSIM Swapping - Mobile Retail Locations

Security Awareness Company Content LibraryAlso included in Training Access Level III (Diamond)Cyber Security Awareness Interactive Training ModulesCall Center & Help Desk AwarenessComputer Security & Data ProtectionData ClassificationDeveloping an Incident Response PlanEmpowering Your Employees for Better SecurityExecutive Awareness LeadershipHow to be a Human FirewallIdentity Theft and Data BreachesInsider Threats for Executives and ManagersMalwareMobile Security BasicsNon-technical Security BasicsOWASP Top 10PCI DSS Retail Store ExperiencePassword SecurityCyber Security Awareness Compliance ModulesFERC/NERC for End UsersFERC/NERC for Managers and ExecutivesFERPA (Education)FFIEC (Financial Compliance)GLBA (Finance)HIPAA (Healthcare)PCI-DSS (Retail Compliance)Sarbanes-Oxley (Accounting)Cyber Security Awareness Videos (2-5 mins)10 ways to avoid phishing scams10 ways to keep PII private10 ways to stay safe on social mediaA Day of Bad PasswordsBackupBeing a Human FirewallBeyond PhishingCatching malwareCyber Crime Starts with YouDangers of USBsData Breach OverviewData Breaches and YouData Classification OverviewData Loss and InsidersDefinition of Social EngineeringDumpster DivingEmail SpoofingExecutives Mitigating Insider ThreatsHide your passwordsIncident Response 101Introduction to RansomwareIntroduction to the cloudIs Free Wifi Really FreeJasper the Disaster in Travel Security AwarenessJasper the Disaster in Workplace Physical SecurityJasper the Disaster in Workplace PolicyLow-Tech Hacks to Steal Your IDMouse OversNIST Password GuidelinesNon-Technical Security SkillsNon-Technical and Physical security tips and tricksPII and CompliancePhishing Contest WinnerPhishing From FacebookPhishing From NetflixPhishing From Your BankPhishing Andrew's InboxPhishing FundamentalsPrivacy BasicsRansomwareRestricted Privileged AccessSecure Online BehaviorSocial Engineering & Phishing for ExecutivesSocial Engineering BasicsSecurity Awareness FundamentalsSecurity Awareness Fundamentals for New HiresUnderstanding and Mitigating Security Risks for ExecutivesUnderstanding and Protecting PIIWorkforce Safety & Security AwarenessWorkplace Violence and Safety100 Cyber Security Newsletters andSecurity Docs10 Cyber Security Awareness Games150 Cyber Security Awareness Posters & ArtworkPhishing in ActionPretexting: (Fake Fraud Protection)Pretexting: (Fake Help Desk)Pretexting: Fake Employee to Help DeskPretexting: Fake Executive to I.T.Pretexting: From Fake Credit Card CompanyPretexting: From Fake I.T.Privacy Vs. SecurityProtecting DataRoad WarriorsSafe Surfing 1: HTTP vs HTTPS & Online AuthenticationSecurity Myths BustedSocial MediaSocial Media Data MiningSocial Networking Do's and Don’tsThe CIA TriadThe Domains TriadThe Human Firewall's Top Concerns in All Three DomainsThe Many Lives TriadThe Many Lives of PIIUnderstanding EncryptionWelcome to Security Awareness TrainingWelcome to Security Awareness Training - AnimatedWhat Are APTsWhat Does a Social Engineer Look Like?What is I.D. TheftWhat is PII?Why Executives Need Awareness TrainingWhy Security Awareness?Your Security Awareness Journey

Popcorn Training ContentAlso included in Training Access Level III (Diamond)Popcorn Training ModulesSomething Phishy Series Videos & Quiz (Animated)Something Phishy Series IntroductionBreaking the BarrierCloudy With A Chance of PhishDicey DeviceyFreaky LeakyMobile MayhemPass The PasswordPhishious MaliciousSocial Media FeverCyber Heroes Series Videos & Quiz (Live Action)Cyber Heroes IntroductionBreaking the BarrierCEO ScamsCloudy with a Chance of PhishDicey DeviceyDon't Take the BaitFreaky LeakyInternet ThreatsMobile MayhemPass the PasswordPasswordsSocial Media FeverPrivacy Series Videos and Quiz (Live Action)General Data Protection Regulation (GDPR) - User RightsPrivacy Principles - Handling Personal Information at WorkIdentity Theft - Protect Your Personal InformationPersonal Information - Currency of the 21st CenturyProtecting Personal Information - Security & SafeguardsStandups 4 Security Series: (Live Action)Cybercrime PromoA Goliath HackBehind the Scam with Loyiso MadingaOpen Secrets - A Password ExhibitionSpearphishing - Catching the Big PhishDon't Trust Anybody - CEO ScamSocial Media OversharingThe Dark Web Pop-upSecurity Moment Short Clip Videos & Quiz(Motion Graphic)Hacking EmotionsPrivileged User Access ManagementRansomwareSocial Engineering 101Spot the Bad AttachmentSpot the Bad LinkThe Big PhishBuilding Secure Software SeriesEp 1 - Very Early and OftenEp 2 - Leverage Security Frameworks and LibrariesEp 3 - Secure Database AccessSecure Coding 6 Module Course for DevelopersVideo & Quiz (Animated & Motion Graphic)Secure Transactions and Secure DeploymentsAuthentication and AuthorizationData SecurityInjection Attacks and How to Avoid ThemIntroduction to Web Application SecuritySecure Session ManagementCompliance Series (Animated)Acceptable Use PolicyBusiness Continuity ManagementConflict of Interest PolicyConsumer Protection Act (RSA)PCI DSS for Corporate OfficePCI DSS for MerchantsPCI DSS for Retail StoresSupaPopi (RSA)Treating Customers Fairly (RSA)Cyber Essentials SeriesInformation Security 101Cryptocoin SecurityCyberbullying85 Popcorn Training Reinforcement Posters and Security DocsSecurable.io VideosAlso included in Training Access Level III (Diamond)FISMA- Federal Information Security Management ActIntro to PhishingLinkedIn SecurityMonitoring Facebook ServicesProtect Your Kids OnlinePublic WiFi SafetyRansomware AttacksTraveling AbroadTwitter SecurityUSB Safety

ThinkHR Training ModulesAlso included in Training Access Level III (Diamond)A Manager's Guide to Discipline and DocumentationA Manager's Guide to Diversity, Inclusion and AccommodationActive ShooterBullying and Hazing on CampusBullying and Violence in the WorkplaceCampus Security Obligations Under Federal LawEEO and Lawful HiringFERPA for Higher EducationFMLA Leave and More: An Overview of Legally Protected LeaveHIPAA - Privacy EssentialsHIPAA - Privacy Rules for Business AssociatesHIPAA - Security Rules for Business AssociatesHIPAA for Non-Medical EmployeesOptimizing Your Work/Life Balance: Maintaining Your Life BalanceOptimizing Your Work/Life Balance: Taking Control of Your StressPandemic Flu AwarenessPreventing Harassment in the Global Workplace - Employee EditionPreventing Harassment in the Global Workplace - Manager EditionPromoting a Substance-Free WorkplaceRightful Employment TerminationSexual Harassment Prevention for EmployeesTitle IX for Higher EducationWage and Hour Awareness for ManagersWorkplace Harassment Prevention for Employees, State of New YorkWorkplace Harassment Prevention for Managers, State of New YorkWorkplace Harassment Prevention for Employees (Title VII)Workplace Harassment Prevention for Managers - Multi-State Edition, V3.0Workplace Management: Employment Laws and Regulationsexploqii VideosAlso included in Training Access Level III (Diamond)Anti-Trust 1 - Basic Regulations & RisksAnti-Trust 2 - Industry EventsBasic Rules of Secure CommunicationBluetooth & WiFiBusiness Partner ComplianceCEO Fraud - Fake PresidentClean Desk PolicyCloud ServicesCode of ConductCompliance ChecklistCompliance Management SystemConflict of InterestCorruptionCrisis ManagementData ProtectionDisinformationEU GDPRExport ControlFairness & Respect in the WorkplaceGifts, Hospitality & Anti-BriberyIT Security in the WorkplaceIdentity TheftIndustrial EspionageInformation ClassificationInformation Security @ Mobile DevicesInformation Security @ Remote WorkplacesInformation Security @ Social MediaInsider ThreatInternal InvestigationsKnow-How SecurityMicrophone, Camera & SelfiesMoney LaunderingPayment FraudPhishing Attacks on CompaniesPhone ScamPrice RiggingProxy Servers & Data PrivacyRansomware Micro-moduleSecure PasswordsSecurity-Oriented Personnel SelectionSexual HarassmentSocial Engineering Micro-moduleSocial Media GuidelinesThreat ManagementTravel SecurityUSB AttacksVisitor ManagementWhistleblowerTeach Privacy Training ModulesAlso included in Training Access Level III (Diamond)California Health PrivacyCanadian Anti-Spam Legislation (CASL)Data BreachData DisposalData RetentionEncryptionFERPA (K-12)General Data Protection Regulation (GDPR)Global Privacy and Data ProtectionSecure Workspaces GameThe Privacy Act

Syntrio Training ModulesAlso included in Training Access Level III (Diamond)Avoiding Antitrust ViolationsAvoiding Conflicts of InterestAvoiding Insider Trading RiskBack Injury PreventionCalifornia Workplace Harassment Prevention for EmployeesCalifornia Workplace Harassment Prevention for ManagersConnecticut Sexual Harassment for ManagersControlling Workplace Exposure to Bloodborne PathogensDelaware Sexual Harassment for EmployeesDelaware Sexual Harassment for ManagersDisability Discrimination and AccommodationEmployee Privacy: Balancing a Manager's Right to KnowErgoNet: A Training Guide for Healthy Office WorkersEthics and Code of ConductFCPA Anti-Corruption and BriberyGlobal Anti-CorruptionMaine Sexual Harassment for EmployeesMaine Sexual Harassment for ManagersNew York Preventing Sexual Harassment for EmployeesNew York Preventing Sexual Harassment for ManagersPersonal Protective Equipment: A General AwarenessPreventing Unlawful Retaliation in the WorkplaceSlip, Trip, and Fall PreventionUnderstanding the Family and Medical Leave ActValuing Diversity for ManagersTwist & Shout Video ModulesAlso included in Training Access Level III (Diamond)Restricted Intelligence Series -Season 1Episode 1:The Test (passwords and passes)Episode 2: Browsing (safe surfing)Episode 3: A Cry for Help (email hacking and phishing)Episode 4: The Journey (portable storage devices)Episode 5: The Leak (beware what you shareEpisode 6: The Lesson (mobile devices)Restricted Intelligence Privacy Edition -Season 2Episode 1: Nothing To Do With Me (What Is PI?)Episode 2: Nobody Reads That Stuff (Privacy by Design)Episode 3: Once More Unto the Breach (Retention &Disposal)Episode 4: The Heart of the Matter (Purpose &Minimisation)Episode 5: Mr. Cellophane (Transparency)Episode 6: Partners (Third Party Partners)Bonus - GDPR Intro (GDPR is Coming)The Inside Man Series -Season 1Episode 1: The New Guy (Social Engineering)Episode 2: Social Hour (Social Media)Episode 3: On Our Side (Phishing Attacks)Episode 4: Surprise (Document Disposal)Episode 5: Takeaways (Clear Desktop Policy)Episode 6: Masquerade (Cloud Services)Episode 7: Buying Time (Passwords)Episode 8: Taken (Ransomware)Episode 9: Where The Wild Things Are (Travel)Episode 10: Keep Your Friends Close (App security andpermissions)Episode 11: The Sound Of Trumpets (External Devices)Episode 12: Checkmate (Insider Threats)40 Twist & Shout Reinforcement Posters and Promotional GraphicsCanada Privacy Training ModulesAlso included in Training Access Level III (Diamond)Canadian Private Sector Privacy

Security Awareness Training Content By Subscription LevelWorld's largest library of security awareness training content is now just a click away!You now really have 850 new ways tomake sure your users Think Before TheyClick!KnowBe4’s game-changing partnerships with TheSecurity Awareness Company, Securable.io, PopcornTraining, ThinkHR, exploqii, Canada Privacy Training,Twist & Shout, Teach Privacy and Syntrio allows youto significantly better manage the ongoing problemof social engineering.In your fight against phishing and ransomware youcan deploy the best-in-class phishing platformcombined with the world's largest library of securityawareness training content; including 850 interactive modules, videos, games, posters andnewsletters.MOST POPULARTRAINING CONTENTTraining ModulesMicro ModulesVideos (90 sec-5 min)LEVEL ILEVEL IILEVEL III5213023271544683671878029319115Compliance ModulesPosters / Images37Newsletters / Security One SheetsGamesMOST POPULARFEATURESSILVERGOLDPLATINUM DIAMONDUnlimited Phishing Security TestsAutomated Security Awareness ProgramSecurity ‘Hints & Tips’Training Access Level IAutomated Training CampaignsPhish Alert ButtonPhishing Reply TrackingActive Directory IntegrationIndustry BenchmarkingVirtual Risk Officer Advanced ReportingCrypto-Ransom GuaranteeTraining Access Level IIMonthly Email Exposure CheckVishing Security TestSmart GroupsReporting APIsSecurity RolesWe offer three Training Accesslevels depending on yoursubscription. Training AccessLevels: I (Silver), II (Gold &Platinum), and III (Diamond). Weare constantly adding new trainingcontent.Contact your accountrepresentative to getaccess to our Module Storeto see the latest contentfor yourself!Social Engineering IndicatorsUSB Drive TestPriority Level SupportTraining Access Level IIIAIDA Artificial Intelligence-driven Agent BETAFor the most complete list of content training content, please visit our website w/KnowBe4, Inc. 33 N Garden Ave, Suite 1200, Clearwater, FL 33755 Tel: 855-KNOWBE4 (566-9234) www.KnowBe4.com Email: Sales@KnowBe4.com 2019 KnowBe4, Inc. All rights reserved. Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies.April 2019

the great content, sign up to access the KnowBe4 ModStore Training Preview to see our full library. Overview of KnowBe4 Training Library Kevin Mitnick Security Awareness Training (45-min) This fully interactive module takes you on a tour of the threat landscape and shows you the most common ways bad guys try to trick you.