Educating Users to Improve Awareness, Change Behaviors, and Reduce Risk

Our portfolio of more than 25 interactive training modules is designed to change behaviors within your organization and help your employees make the right decisions when they are face-to-face with security threats. Training is a foundational component of our Assess, Educate, Reinforce, Measure Continuous Training Methodology, and our unique approach allows you deliver effective cyber security education in a flexible, on-demand format that minimizes disruption to daily work routines.

Try our Interactive Training Modules
Level of interactivity

Little to none

High


Number of training touchpoints per hour of employee time

One

Four to twelve


Number of topics addressed per session

All topics addressed in a single session

Single topic (e.g., phishing, passwords) addressed in each module


Opportunity to quiz users about information learned

Handled separately

Built in to each lesson, with immediate feedback provided for each answer


Associated metrics

Training completed or not completed

Various reporting options, including most missed questions, individual scores, and more


1-Hour Annual, Monolithic Training Video Wombat 5- to 15-Minute Training Modules
Level of interactivity Little to none High
Number of training touchpoints per hour of employee time One Four to twelve
Number of topics addressed per session All topics addressed in a single session Single topic (e.g., phishing, passwords) addressed in each module
Opportunity to quiz users about information learned Handled separately Built in to each lesson, with immediate feedback provided for each answer
Associated metrics Training completed or not completed Various reporting options, including most missed questions, individual scores, and more

Using Proven Principles to Improve Knowledge Retention

Our development and design processes are based on research-based Learning Science Principles and employ methods that have been proven to be more effective than once-a-year training presentations and videos. We use gamification techniques and interactive elements to engage users through hands-on decision-making, an approach that improves knowledge retention and facilitates longer-term behavior change.

We also make a clear distinction between “awareness” and “training” — as should you. Simply telling your employees that social engineering attacks exist is not going to reduce data breaches and malware infections. As well, focusing on only phishing-related threats ignores other issues — like mobile device security, WiFi safety, data protection, and physical security — that also have a significant impact on overall security postures.

To truly bring about change, your employees must understand how all security threats present themselves in day-to-day situations. Our interactive modules help end users recognize the role they play in protecting your network, data, and assets.

Key Features and Benefits

  • Focused, “bite-sized” training – Each of our standard modules provides an average of 10 to 15 minutes of interactive training about a specific security topic. End users participate in three to four lessons and end-of-lesson “challenges” to test their understanding of the materials. Our mini-modules are even more targeted, delivering 5 to 7 minutes of education about a topic in one to two lessons and challenges. Our approach is a stark contrast to monolithic training methods, which bombard users with multiple topics in a much lengthier presentation, with quizzes that are not integrated within the training.
  • Employee-driven interactivity – End users must interact with our modules; they set the pace and drive progress, and they are required exhibit a baseline level of proficiency on each lesson’s challenge before progressing. Modules can easily be completed in a single session, but users can use our Resume feature to bookmark their progress and restart a lesson or challenge at a later time if needed.
  • Immediate feedback – End users receive feedback on each challenge question, whether it’s right or wrong. This helps them learn at every step; they will understand why their selection was correct or incorrect rather than seeing a basic “right/wrong” indicator.

We go well beyond “training completed” tallies to give you insightful reporting about your training assignments. Dynamic filtering, bar charts, and statistical comparisons give you both high-level and granular looks at your employees’ results and help you gather the intelligence you need to effectively manage and tailor your efforts.

Learn more

In addition to our purpose-written, research-based educational content, our Training Jackets allow you to add custom and personalized content to the beginning and end of each module. You can remind users about specific organization policies, attach a training completion certificate, include a policy acknowledgement screen, and more.

  • Automatic training assignments based on assessment results – Our unique Auto-Enrollment feature — which is available with our ThreatSim® Phishing Simulations and our Predefined CyberStrength® Knowledge Assessments — allows you to automatically deliver training to your most susceptible users. When Auto-Enrollment is enabled, any user who clicks on a ThreatSim simulated phishing attack or who falls below a preset proficiency score on a Predefined CyberStrength assessment can be automatically assigned the licensed training module(s) of your choice.
  • Intuitive user interface – You can access and assign all licensed training modules via our feature-rich, SaaS-based Security Education Platform. You can also customize and schedule assignment reminders and other program communications.
  • Seamless integration with other Wombat products – Though our training modules can be used alone and serve as the centerpiece of your security awareness and training program, we recommend integrating your educational activities with our assessment and reinforcement tools. Both our CyberStrength® and ThreatSim® products support Auto-Enrollment, a value-add features that allows you to automatically assign training based on assessment results.
Learn more

Multinational organizations can deliver training in more than 25 languages, which can be selected from a drop-down menu. Our high-quality translations ensure that global employees receive effective, consistent training in all office locations.

Learn more

Several of our modules are now available in a mobile-responsive format that gives your users the flexibility to take training anytime, anywhere, on any type of connected device. In the near future, all of our modules will be mobile responsive.

508 and WCAG compliance – Our mobile-responsive modules conform to the U.S. Section 508 standard and the Web Content Accessibility Guidelines (WCAG) 2.0 AA standard, which ensures that these modules can be accessed and completed by end users with disabilities.

Wombat Security Section 508 VPAT

Wombat Security WCAG 2.0 AA Conformance Statement

Our modules are SCORM compliant and can be seamlessly integrated into an existing learning management system (LMS) if desired.  

Wombat's Interactive Training Modules

 

Module Categories


View All
Anti-Phishing
Healthcare
Compliance
Social Engineering
Mobile/BYOD Security
Data Storage & Handling
  • While we offer a full suite of interactive training modules, these modules are part of our larger anti-phishing suggested program aimed at reducing successful phishing attacks and malware infections by up to 90%.

    The Anti-Phishing Training Suite combines simulated phishing attacks, our unique Auto-Enrollment feature, and three interactive training modules to help you reduce phishing risks.

    Change behavior and reduce risk with our full suggested program which includes assessments, education, reinforcement, and reporting.

    Learn More
  • While we offer a full suite of interactive training modules, these modules are part of our larger compliance programs that can assess weaknesses in your organization and ultimately reduce the risk of your organization breaking compliance rules.

    How well do your employees understand the basic principles behind compliance initiatives? We cover PII, PHI, and PCI-DSS topics. Don’t just check the box with your compliance training. Choose a program that allows you to evaluate knowledge and use interactive training to drive behavior change.

    Reduce risk with our full suggested programs which includes assessments, education, reinforcement, and reporting.

    Learn More
  • While we offer a full suite of interactive training modules, these modules are part of a larger program aimed at protecting your organization’s data.

    Data is everywhere and more mobile, giving more potential access points to criminals than ever before. Assess your users’ knowledge and then educate them on how to safely use, transport and store sensitive data.

    Change behavior and reduce risk with our full suggested program which includes assessments, education, reinforcement, and reporting.

    Learn More
  • While we offer a full suite of interactive training modules, these modules are part of our larger healthcare program to assess knowledge of HIPAA and reduce risk of a data breach or break with compliance rules.

    Healthcare data is one of the most valuable items to cybercriminals and often healthcare settings are easy targets because of their own unique time and security challenges. Use our healthcare-focused assessments and short, interactive training to build an effective security awareness and training program to keep your staff and patients safe.

    Change behavior and reduce risk with our full suggested program which includes assessments, education, reinforcement, and reporting.

    Learn More
  • While we offer a full suite of interactive training modules, these modules are part of a larger program to protect employees while on-the-go or using their own devices.

    Theft, loss, and damage to mobile devices is no small problem; portability means that sensitive data is constantly on the move. Assess your user’s knowledge and educate them with our interactive training modules specific to this important topic.

    Change behavior and reduce risk with our full suggested program which includes assessments, education, reinforcement, and reporting.

    Learn More
  • While we offer a full suite of interactive training modules, these modules are part of a larger program to assess vulnerability on social engineering weaknesses and ultimately reduce the risk of such attacks.

    Social engineering is often the first step in many other types of attacks. Use our CyberStrength assessments and simulated attacks to evaluate susceptibility, and follow with training modules that help your users identify social engineering scams and react appropriately.

    Change behavior and reduce risk with our full suggested program which includes assessments, education, reinforcement, and reporting.

    Learn More
  • Not sure which interactive training modules to select for your security awareness training program? Select any of the topics to see what training modules we suggest as part of our larger suggested programs.  Our suggested programs outline the full suite of products to build an effective security awareness training program with our unique, four-step Continuous Training Methodology of Assess, Educate, Reinforce, and Measure.

    Learn More

Try our Training Modules

Fill out the form to try demo versions of our 25+ interactive training modules.

  • Contact Info
  • Company Info
  • Complete