With over 10M users taught and 40M+ courses delivered the time is now to transform
your security and privacy awareness program.
Build a Solid Foundation for Security Awareness

Threats to sensitive data and cyber resources are increasing at a breakneck pace.
Companies of all sizes need to ensure all employees know how to safeguard sensitive information and the technological resources their businesses rely on. Employees must be able to follow information security best practices, identify threats, and prevent unauthorized access.
MediaPRO’s 35-minute Security Basics course covers the basics of the most common threats to organizational security. The course uses realistic scenarios and activities to add relevance and keep employees engaged. When teamed with consistent delivery of our reinforcement content, MediaPRO training provides your employees the tools to reduce human risk.
Security Basics Training Topics:
- How data is put at risk from a variety of security incidents
- Identifying sensitive data, and how to keep it secure
- Stopping physical security threats
- Keeping safe computing best practices top-of-mind
- Identifying and busting phishing attacks
- Stopping social engineering risks and stopping future attacks
- Making a strong password
Security Basics Training Features
- Engaging and interactive security awareness basics training content
- Tablet-friendly
- Blends fact-based assessment with scenario-driven experiences
- Fully customizable
- SCORM and AICC compliant for easy LMS integration
Take a closer look at the courses included in each TrainingPack
MediaPRO TrainingPack courses are interactive and engaging, with the right mix of humor and professionalism. You can use courses as-is, easily modify them, or quickly build your own from pre-built topics.




Get our most popular resources bundled as a comprehensive guide for those responsible for running security awareness training programs.

Keep security top of mind while your employees are working remotely with our free toolkit. No kidding. Really free.

This guide walks through the steps to take to establish a simulated phishing program and provides phishing program ideas.