From award-winning, interactive courseware to videos, posters, and articles, MediaPRO offers hundreds of individual educational pieces of content to help clients of all sizes and needs to tailor their awareness programs to their needs.

Search our ever-evolving library of courseware and reinforcement content by first selecting your desired topic from the drop-down at the left and both or either length of time and type of content.Then click “Submit.” Click “Clear” to clear your selection.

Filter by Topic
Filter by Length
Filter by Type

Insider Threats

15-30 Minutes
Courseware

This course describes how to spot the warning signs of an insider threat and protect sensitive information.

Introduction to Secure Coding

0-15 Minutes
Courseware

This course tackles how to address security issues while coding.

Preventing Phishing

0-15 Minutes
Courseware

This course describes how to spot phishing threats and stop phishing attempts.

Security + PCI

15-30 Minutes
Courseware

This course provides instruction on how to protect systems and facilities from security threats, and uphold PCI requirements.

Security Awareness

45-60 Minutes
Courseware

This course highlights the essentials of protecting systems, facilities, and equipment.

Security Awareness for Massachusetts Law

15-30 Minutes
Courseware

This course provides instruction on how to apply security and privacy principles in accordance with Massachusetts law.

Security Awareness for Privileged Users

15-30 Minutes
Courseware

This course highlights important security responsibilities and safeguards required by those with privileged user status.

Security Awareness with Privacy Principles

45-60 Minutes
Courseware

This course describes ways to safeguard data and personal information in our systems and facilities, and when working remotely.

Security Basics

15-30 Minutes
Courseware

The course identifies the key security concepts and how to protect facilities, equipment, and information.

Security Essentials for Executives

15-30 Minutes
Courseware

This course quickly identifies key security topics for executives.

Web Safety

15-30 Minutes
Courseware

This course provides guidance to keep systems and equipment safe when using the web.

Security Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in setting the standard for security awareness in an organization.

Privacy Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in privacy and the protection of personal information.

Security and Privacy Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in mitigating security and privacy risks.

Mission: Travel Security

30-45 Minutes
Courseware

This course emphasizes good security practices away from the office and while working abroad.

Incident Response

30-45 Minutes
Courseware

This course identifies the role and responsibility of everyone, including an incident management or response team, in responding to incidents.

Cybersecurity Pledge

30-45 Minutes
Courseware

This course highlights the importance of adhering to common privacy and security best practices.

Phishing Mini

0-15 Minutes
Courseware

This mini course introduces the concept of phishing and the steps to dispose of suspected phishing attempts.

Mobile Computing Mini

0-15 Minutes
Courseware

This mini course highlights the risks associated with working remotely.

Social Media Mini

0-15 Minutes
Courseware

This mini course highlights the risks and benefits of social media.

Phishing Game Mini

0-15 Minutes
Courseware

This mini course allows for practice identifying and disposing of phishing e-mails.

Social Engineering Mini

0-15 Minutes
Courseware

This mini course identifies the common tactics of social engineering.

Physical Security Mini

0-15 Minutes
Courseware

This mini course focuses on physical security threats and how to mitigate them.

Tailgating Mini

0-15 Minutes
Courseware

This mini course defines tailgating and offers guidance on how to handle potential tailgating threats.

Secure Home Office Mini

0-15 Minutes
Courseware

This mini course provides best practices for securing a home office.

Working on the Road Mini

0-15 Minutes
Courseware

This mini course highlights key steps to securing data on the road.

Access Controls Mini

0-15 Minutes
Courseware

This mini course identifies the ways to secure and prevent inappropriate access to sensitive information.

Insider Threats Mini

0-15 Minutes
Courseware

This mini course highlights the characteristics of insider threats and how to prevent them.

Cloud Computing Mini

0-15 Minutes
Courseware

This mini course describes the risks and rewards of using cloud computing resources.

Ransomware Mini

0-15 Minutes
Courseware

This mini course identifies the tell-tale signs of malware.

Privileged User Mini

0-15 Minutes
Courseware

This mini course identifies who privileged users are and how they can protect the data entrusted to them.

Security Refresher

0-15 Minutes
Courseware

This mini course encourages people to keep security awareness top-of-mind.

What Would You Do? (Cinematic)

0-15 Minutes
Reinforcement Videos

This video compares phishing attempts to other daily activities to help build resistance to phishing scams.

What Would You Do?

0-15 Minutes
Reinforcement Videos

This video compares phishing attempts to other daily activities to help build resistance to phishing scams.

VPN for Safety

0-15 Minutes
Reinforcement Videos

This video reminds people to use a VPN when working away from the office.

Travel Security

0-15 Minutes
Reinforcement Videos

This video reminds people to be well-equipped to keep information safe … even on the road.

Tis The Season

0-15 Minutes
Reinforcement Videos

This video highlights the increased volume of phishing attempts during the holiday season.

The Wi-Fi Drifter

0-15 Minutes
Reinforcement Videos

This video introduces the Wi-Fi Drifter, and her arsenal of best practices for safe remote and mobile computing.

The Malware Bug

0-15 Minutes
Reinforcement Videos

This video introduces the Malware Bug, and his sneaky tactics for infecting computers.

The Internet of Things (Cinematic)

0-15 Minutes
Reinforcement Videos

This video highlights the convenience–and risks–associated with Internet-connected devices.

The Internet of Things

0-15 Minutes
Reinforcement Videos

This video highlights the convenience–and risks–associated with Internet-connected devices.

Tax Season Phishing

0-15 Minutes
Reinforcement Videos

This video reminds people to stay on guard against phishing attempts, especially during tax season.

Taken By Ransomware

0-15 Minutes
Reinforcement Videos

This video explains how to stop ransomware.

Spear Phishing

0-15 Minutes
Reinforcement Videos

This video defines spear phishing and highlights its impact.

Software Updates: Wanna.Cry

0-15 Minutes
Reinforcement Videos

This video reminds people to consistently apply software updates, especially in the wake of Wanna.Cry.

Software Updates

0-15 Minutes
Reinforcement Videos

This video reminds people to consistently apply software updates.

Social Engineering

0-15 Minutes
Reinforcement Videos

This video provides some tips for foiling social engineering scams.

Security Zombies

0-15 Minutes
Reinforcement Videos

This video encourages people to get smart about protecting information.

Ransomware

0-15 Minutes
Reinforcement Videos

This video provides some tried and true safeguards against ransomware.

Public Wi-Fi

0-15 Minutes
Reinforcement Videos

This video provides best practices for connecting to Wi-Fi networks.

Privileged Users

0-15 Minutes
Reinforcement Videos

This video describes who privileged users are and what privileged users can to do to protect information entrusted to them.

Privacy and Security

0-15 Minutes
Reinforcement Videos

This video describes the relationship between privacy and security.

Physical Security (Cinematic)

0-15 Minutes
Reinforcement Videos

This video highlights the actions to take to protect physical areas and resources.

Physical Security

0-15 Minutes
Reinforcement Videos

This video highlights the actions to take to protect physical areas and resources.

Password Protection

0-15 Minutes
Reinforcement Videos

This video reinforces the key principles of creating and protecting secure passwords.

The Malware Hunters

0-15 Minutes
Reinforcement Videos

This video describes the impact of malware through a hilarious cast of characters.

Lucky Jane: Protecting Data on the Road

0-15 Minutes
Reinforcement Videos

This video illustrates how everyone has a party in protecting company information when traveling.

Another Phishy E-mail (Report)

0-15 Minutes
Reinforcement Videos

This video explains how to recognize and report phishing e-mails.

Facebook Phishing

0-15 Minutes
Reinforcement Videos

This video highlights the risk of clicking links found on social media sites.

Downloading Apps

0-15 Minutes
Reinforcement Videos

This video encourages people to scrutinize mobile apps closely.

Don't Let Malware Spoil the Fun

0-15 Minutes
Reinforcement Videos

This video provides some quick pointers for avoiding malware at home and at work.