From award-winning, interactive courseware to videos, posters, and articles, MediaPRO offers hundreds of individual educational pieces of content to help clients of all sizes and needs to tailor their awareness programs to their needs.

Search our ever-evolving library of courseware and reinforcement content by first selecting your desired topic from the drop-down at the left and both or either length of time and type of content.Then click “Submit.” Click “Clear” to clear your selection.

Filter by Topic
Filter by Length
Filter by Type

Insider Threats

15-30 Minutes
Courseware

This course describes how to spot the warning signs of an insider threat and protect sensitive information.

Introduction to Secure Coding

0-15 Minutes
Courseware

This course tackles how to address security issues while coding.

Preventing Phishing

0-15 Minutes
Courseware

This course describes how to spot phishing threats and stop phishing attempts.

Security + PCI

15-30 Minutes
Courseware

This course provides instruction on how to protect systems and facilities from security threats, and uphold PCI requirements.

Security Awareness

15-30 Minutes
Courseware

This course highlights the essentials of protecting systems, facilities, and equipment.

Security Awareness for Massachusetts Law

15-30 Minutes
Courseware

This course provides instruction on how to apply security and privacy principles in accordance with Massachusetts law.

Security Awareness for Privileged Users

15-30 Minutes
Courseware

This course highlights important security responsibilities and safeguards required by those with privileged user status.

Security Awareness with Privacy Principles

15-30 Minutes
Courseware

This course describes ways to safeguard data and personal information in our systems and facilities, and when working remotely.

Security Basics

15-30 Minutes
Courseware

The course identifies the key security concepts and how to protect facilities, equipment, and information.

Security Essentials for Executives

15-30 Minutes
Courseware

This course quickly identifies key security topics for executives.

Web Safety

15-30 Minutes
Courseware

This course provides guidance to keep systems and equipment safe when using the web.

Security Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in setting the standard for security awareness in an organization.

Privacy Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in privacy and the protection of personal information.

Security and Privacy Training for Executives

30-45 Minutes
Courseware

This course highlights an executive’s unique role in mitigating security and privacy risks.

Mission: Travel Security

30-45 Minutes
Courseware

This course emphasizes good security practices away from the office and while working abroad.

Incident Response

30-45 Minutes
Courseware

This course identifies the role and responsibility of everyone, including an incident management or response team, in responding to incidents.

Cybersecurity Pledge

30-45 Minutes
Courseware

This course highlights the importance of adhering to common privacy and security best practices.

Phishing Mini

0-15 Minutes
Courseware

This mini course introduces the concept of phishing and the steps to dispose of suspected phishing attempts.

Mobile Computing Mini

0-15 Minutes
Courseware

This mini course highlights the risks associated with working remotely.

Social Media Mini

0-15 Minutes
Courseware

This mini course highlights the risks and benefits of social media.

Phishing Game Mini

0-15 Minutes
Courseware

This mini course allows for practice identifying and disposing of phishing e-mails.

Social Engineering Mini

0-15 Minutes
Courseware

This mini course identifies the common tactics of social engineering.

Physical Security Mini

0-15 Minutes
Courseware

This mini course focuses on physical security threats and how to mitigate them.

Tailgating Mini

0-15 Minutes
Courseware

This mini course defines tailgating and offers guidance on how to handle potential tailgating threats.

Secure Home Office Mini

0-15 Minutes
Courseware

This mini course provides best practices for securing a home office.

Working on the Road Mini

0-15 Minutes
Courseware

This mini course highlights key steps to securing data on the road.

Access Controls Mini

0-15 Minutes
Courseware

This mini course identifies the ways to secure and prevent inappropriate access to sensitive information.

Insider Threats Mini

0-15 Minutes
Courseware

This mini course highlights the characteristics of insider threats and how to prevent them.

Cloud Computing Mini

0-15 Minutes
Courseware

This mini course describes the risks and rewards of using cloud computing resources.

Ransomware Mini

0-15 Minutes
Courseware

This mini course identifies the tell-tale signs of malware.

Privileged User Mini

0-15 Minutes
Courseware

This mini course identifies who privileged users are and how they can protect the data entrusted to them.

Security Refresher

0-15 Minutes
Courseware

This mini course encourages people to keep security awareness top-of-mind.

What Would You Do? (Cinematic)

0-15 Minutes
Reinforcement Videos

This video compares phishing attempts to other daily activities to help build resistance to phishing scams.

What Would You Do?

0-15 Minutes
Reinforcement Videos

This video compares phishing attempts to other daily activities to help build resistance to phishing scams.

VPN for Safety

0-15 Minutes
Reinforcement Videos

This video reminds people to use a VPN when working away from the office.

Travel Security

0-15 Minutes
Reinforcement Videos

This video reminds people to be well-equipped to keep information safe … even on the road.

Tis The Season

0-15 Minutes
Reinforcement Videos

This video highlights the increased volume of phishing attempts during the holiday season.

The Wi-Fi Drifter

0-15 Minutes
Reinforcement Videos

This video introduces the Wi-Fi Drifter, and her arsenal of best practices for safe remote and mobile computing.

The Malware Bug

0-15 Minutes
Reinforcement Videos

This video introduces the Malware Bug, and his sneaky tactics for infecting computers.

The Internet of Things (Cinematic)

0-15 Minutes
Reinforcement Videos

This video highlights the convenience–and risks–associated with Internet-connected devices.

The Internet of Things

0-15 Minutes
Reinforcement Videos

This video highlights the convenience–and risks–associated with Internet-connected devices.

Tax Season Phishing

0-15 Minutes
Reinforcement Videos

This video reminds people to stay on guard against phishing attempts, especially during tax season.

Taken By Ransomware

0-15 Minutes
Reinforcement Videos

This video explains how to stop ransomware.

Spear Phishing

0-15 Minutes
Reinforcement Videos

This video defines spear phishing and highlights its impact.

Software Updates: Wanna.Cry

0-15 Minutes
Reinforcement Videos

This video reminds people to consistently apply software updates, especially in the wake of Wanna.Cry.

Software Updates

0-15 Minutes
Reinforcement Videos

This video reminds people to consistently apply software updates.

Social Engineering

0-15 Minutes
Reinforcement Videos

This video provides some tips for foiling social engineering scams.

Security Zombies

0-15 Minutes
Reinforcement Videos

This video encourages people to get smart about protecting information.

Ransomware

0-15 Minutes
Reinforcement Videos

This video provides some tried and true safeguards against ransomware.

Public Wi-Fi

0-15 Minutes
Reinforcement Videos

This video provides best practices for connecting to Wi-Fi networks.

Privileged Users

0-15 Minutes
Reinforcement Videos

This video describes who privileged users are and what privileged users can to do to protect information entrusted to them.

Privacy and Security

0-15 Minutes
Reinforcement Videos

This video describes the relationship between privacy and security.

Physical Security (Cinematic)

0-15 Minutes
Reinforcement Videos

This video highlights the actions to take to protect physical areas and resources.

Physical Security

0-15 Minutes
Reinforcement Videos

This video highlights the actions to take to protect physical areas and resources.

Password Protection

0-15 Minutes
Reinforcement Videos

This video reinforces the key principles of creating and protecting secure passwords.

The Malware Hunters

0-15 Minutes
Reinforcement Videos

This video describes the impact of malware through a hilarious cast of characters.

Lucky Jane: Protecting Data on the Road

0-15 Minutes
Reinforcement Videos

This video illustrates how everyone has a party in protecting company information when traveling.

Another Phishy E-mail (Report)

0-15 Minutes
Reinforcement Videos

This video explains how to recognize and report phishing e-mails.

Facebook Phishing

0-15 Minutes
Reinforcement Videos

This video highlights the risk of clicking links found on social media sites.

Downloading Apps

0-15 Minutes
Reinforcement Videos

This video encourages people to scrutinize mobile apps closely.

Don't Let Malware Spoil the Fun

0-15 Minutes
Reinforcement Videos

This video provides some quick pointers for avoiding malware at home and at work.

Avoiding Security Blindspots

0-15 Minutes
Reinforcement Videos

This animated video equates security awareness to checking blindspots on a daily commute.

Business Email Compromise

0-15 Minutes
Reinforcement Videos

This video defines business e-mail compromise (BEC) and how to avoid these cyber-scams.

Avoiding Security Blindspots (Cinematic)

0-15 Minutes
Reinforcement Videos

This video equates security awareness to checking blindspots on a daily commute.

Another Phishy E-mail (Cinematic)

0-15 Minutes
Reinforcement Videos

This video explains how to recognize and dispose of phishing e-mails.

Another Phishy E-mail (Delete)

0-15 Minutes
Reinforcement Videos

This video explains how to recognize and dispose of phishing e-mails.

Another Phishy E-mail (Forward)

0-15 Minutes
Reinforcement Videos

This video explains how to recognize and report phishing e-mails.

Unidentified Hyperlinks

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with clicking phishy links.

United Against Malware

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to stand united against malware and other security threats.

Password Update Reminder

0-15 Minutes
Courseware

This poster describes the risks associated with unsecure passwords.

USB Drive Malware

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with USB flash drives.

Trusted USB Drives

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with USB flash drives.

Virus Alerts

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with ineffectively reporting virus alerts.

Vishing Social Engineers

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with over-the-phone social engineering.

Software Update: Wanna.Cry

0-15 Minutes
Reinforcement Posters

This poster references the Wanna.Cry ransomware attack and reminds everyone to update their security software.

Public Wi-Fi

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with unsecure wireless networks.

Secure Wi-Fi Connections

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with unsecure wireless networks.

Wireless Connections

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with unsecure wireless networks.

Wi-Fi Dangers

0-15 Minutes
Reinforcement Posters

This poster highlights the importance of using a secure connection to the Internet when working remotely.

Phishing: Cat and Mouse

0-15 Minutes
Reinforcement Posters

This poster describes phishing and the risks associated with clicking suspicious links.

Phishing: Reeled In

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with phishing.

Phony Phone Calls

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with over-the-phone social engineering.

Secure Facilities

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with tailgating.

Malware Hunter: Professor Gigabrain

0-15 Minutes
Reinforcement Posters

This poster introduces Professor Gigabrain, a malware hunter who uses top-notch technology to combat malware.

Ransomware Hostage

0-15 Minutes
Reinforcement Posters

This poster reminds everyone to keep a watchful eye out for malware.

Malware: Ransomware

0-15 Minutes
Reinforcement Posters

This poster introduces Ransomware, a thuggish character that should be on everyone’s watchlist.

Ransomware Savior

0-15 Minutes
Reinforcement Posters

This poster emphasizes the importance of backing up important data to protect it from ransomware.

Reporting Incidents

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with ineffectively reporting security incidents.

Malware: Rogue USB

0-15 Minutes
Reinforcement Posters

This poster introduces Rogue USB, a security threat that preys on people who love to receive free USB drives at giveaways.

HTTPS Pirates

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with unsecure wireless networks.

Going Wireless

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with unsecure wireless networks.

Phishing: Security Heroes

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to be a security hero and to stop phishing attacks.

Retro Software Update

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to keep their software–especially security software–up to date.

See Through Phishing (Digital)

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to keep a watchful eye and see “through” phishing attempts for what they really are.

See Through Phishing (Whiteboard)

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to keep a watchful eye and see “through” phishing attempts for what they really are.

Spear Phishing Evolution

0-15 Minutes
Reinforcement Posters

This poster identifies the evolving nature of phishing attempts.

Social Engineering Troll

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with over-the-phone social engineering.

Malware: Spear Phishing

0-15 Minutes
Reinforcement Posters

This poster introduces Spear Phishing, a cunning threat that has a lot of tricks up his sleeve.

Squash Malware

0-15 Minutes
Reinforcement Posters

This poster emphasizes the need to protect systems and equipment from the threat posed by malware.

Stand United (Digital)

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to stand united against malware and other security threats.

Stand United (Whiteboard)

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to stand united against malware and other security threats.

Stay Secure, My Friends

0-15 Minutes
Reinforcement Posters

This poster emphasizes the need to protect systems and equipment from the threat posed by malware.

Bad Dog, Rover

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with weak and unsecure passwords.

Bad Dog, Spike

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with weak and unsecure passwords.

Phishing: Think Twice

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with clicking phishy links.

Blindly Clicking Links

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with clicking phishy links.

Phishing Puppeteer

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with clicking phishy links.

Spear Phishing Target Acquired

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with spear phishing.

Holiday Phishing Scams

0-15 Minutes
Reinforcement Posters

This poster alerts people to the increased risk of phishing during the holidays.

Malware: Malware

0-15 Minutes
Reinforcement Posters

This poster introduces Malware, a sneaky bug who likes to infect systems and equipment.

Secure Mobile Devices

0-15 Minutes
Reinforcement Posters

This poster reinforces the need for secure mobile devices.

Mobile Security 1990

0-15 Minutes
Reinforcement Posters

This poster ensures everyone keeps their mobile device software up-to-date.

Spear Phishers Are Watching You

0-15 Minutes
Reinforcement Posters

This poster encourages everyone to be mindful of their online activity.

Password Puzzle

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with unsecure passwords.

Password Sharing

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with unsecure passwords.

Password Sticky Note

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with unsecure passwords.

Aging Passwords

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with unsecure passwords.

Phishing: A Bigger Boat

0-15 Minutes
Reinforcement Posters

This poster describes the risks associated with phishing.

Malware: Phishing

0-15 Minutes
Reinforcement Posters

This poster introduces Phishing, a common threat who uses clever social engineering tricks to deceive.

Malware Hunter: Agent Hunk

0-15 Minutes
Reinforcement Posters

This poster introduces Agent Hunk, a malware hunter who specializes in stopping malware in its tracks.

Spotting Phishy Emails

0-15 Minutes
Reinforcement Posters

This poster highlights the telltale signs of a phishing attempt.

Malware Hunter: Captain Ace

0-15 Minutes
Reinforcement Posters

This poster introduces Captain Ace, a malware hunter with an appetite for keeping sensitive data safe.

Close the Door on Malware

0-15 Minutes
Reinforcement Posters

This poster reminds people to update their security software to stop the spread of malware.

Data Security

0-15 Minutes
Reinforcement Posters

This poster reminds everyone that data security starts an the individual level.

Toxic Email Attachments

0-15 Minutes
Reinforcement Posters

This poster identifies the risk associated with email attachments.

Malware: Evil Twin

0-15 Minutes
Reinforcement Posters

This poster defines evil twin and highlights the difference between good and bad Wi-Fi network.

Fight Malware

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with malware.

USB Drive Hygiene

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with poor USB drive hygiene.

USB Drive Security

0-15 Minutes
Reinforcement Posters

This poster identifies the risks associated with USB flash drives.

Acceptable Work Emails

0-15 Minutes
Reinforcement Posters

This poster identifies the risk associated with unacceptable use of email.

BYOD Best Practices

0-15 Minutes
Reinforcement Articles

This article outlines the top five best practices that ensure personal devices are secure.

BYOD Security

0-15 Minutes
Reinforcement Articles

This article reminds people that using mobile devices creates new security concerns.

Clean Up Your Act

0-15 Minutes
Reinforcement Articles

This article encourages people to keep a clean desk policy to protect company data.

Cyberhacking

0-15 Minutes
Reinforcement Articles

This article provides best practices to help an organization become cyber-smart.

Don't Get Hooked

0-15 Minutes
Reinforcement Articles

This article outlines the best practices for protecting data against phishing.

Free Wi-Fi

0-15 Minutes
Reinforcement Articles

This article provides dos and don’ts for using remove access safely and securely.

Information Security

0-15 Minutes
Reinforcement Articles

This article provides an insightful “hacker’s view” of cybersecurity.

On-The-Go Protection

0-15 Minutes
Reinforcement Articles

This article identifies the risks associated with mobile devices.

Protect Your Laptop

0-15 Minutes
Reinforcement Articles

This article identifies surefire ways to keep laptops safe when working remotely.

Protect Your Password

0-15 Minutes
Reinforcement Articles

This article provides some simple rules for creating and maintaining secure passwords.

Safety on the Road

0-15 Minutes
Reinforcement Articles

This article provides common sense practices that help keep information secure on the road.

Secure Coding

0-15 Minutes
Reinforcement Articles

This article reveals five bogus reasons developers don’t practice secure coding.

Security Awareness

0-15 Minutes
Reinforcement Articles

This article reminds people that sometimes security threats can be introduced by those who aren’t security-aware.

Social Engineering

0-15 Minutes
Reinforcement Articles

This article outlines best practices for secure use of social media in the workplace.

Social Media

0-15 Minutes
Reinforcement Articles

This article describes the risks and benefits of using social media in the workplace.

Spyware

0-15 Minutes
Reinforcement Articles

This article identifies what to look for to help keep resources and networks safe from spyware.

The Real Cost of Spam

0-15 Minutes
Reinforcement Articles

This article provides three best practices to minimize exposure to spam.

Trojan Horses

0-15 Minutes
Reinforcement Articles

This article describes the threat posed by “Trojan Horses” and identifies simple principles to protect information.

Cliffhanger

0-15 Minutes
Games

This game presents security-related questions through the narrative of mountain-climber Liam the Llama.

Security Trap

0-15 Minutes
Games

This game is an opportunity to answer security-related questions to avoid falling into the security trap.