Security Awareness Now!™

PCI DSS Training

Security Awareness Now!

Our core series of practical, high-impact online training modules

Phishing . . . ransomware exploits . . . social engineering . . . supply chain attacks . . .

More and more, cyber attackers use such techniques to target users—people—rather than attack an organization’s networks and systems directly. Too often, they succeed.

But your people shouldn’t be your organization’s weakest link when it comes to cybersecurity. They can, in fact, be your greatest resource . . .  if they are aware, knowledgeable, and motivated . . . when they are prepared to think and act effectively.

Our Security Awareness Now!™  video-based modules prepare your employees to act as your organization’s first line of cyber defense and protect themselves online.


  • INFUSION PLAN  Deploy the entire suite of 15 modules, one per month or as you prefer, to keep employees alert to threats and mindful of their behaviors.
  • SERIES BY SERIES  Assign a targeted series of modules to address your top concerns.
  • CUSTOMIZED APPROACH  Ask us to custom brand, augment, or tailor any module or set of modules.

Employees can complete the modules anytime, anywhere, on any device.

Security Awareness Now!™ Modules

A Tale of Two Breaches

Cybersecurity threats come from many directions, and even harmless incidents can have far-reaching repercussions. This module traces the origins and implications of two large data breaches. Learners see how seemingly harmless individual actions can be critically important to an organization’s cybersecurity. They begin acquiring specific steps for improving their security consciousness and preparedness.

Using Email Securely

As email connects employees with the outside world, it presents one of the biggest opportunities to gain unauthorized access to enterprise systems. This module explores email vulnerabilities, teaches email best practices, and prescribes what to do when email is hacked or compromised.


Phishing is aptly named because it uses bait to dupe unsuspecting victims into providing access to enterprise systems. This In this module, employees learn how to spot phishing scams, avoid taking the bait, ensure that their devices are protected, and deal with phishing emails they receive.

Phishing Plus

Workplace-related phishing scams have become more sophisticated and targeted. This module builds on our Phishing module—increasing ability to spot scammers’ psychological ploys, recognize the telltale signs of phishing and pretexting, and thwart spear phishing, business email compromise, and whaling attacks.

Vishing & Smishing

All employees are increasingly vulnerable to non-email-based phishing attacks in the form of vishing (voice-based phishing) phone calls and smishing (SMS, or “short message service”) text messages. This module dispels common misconceptions as it prepares learners to recognize and thwart these types of attacks.

Creating Strong Passwords

Most passwords in use today are completely ineffective—either too common, short, and easy to crack or impossible to remember. This module augments our Password Security module. It dissuades learners from using overworked password strategies that can easily be hacked and demonstrates how to come up with strong passwords they can actually remember!

Password Security

Passwords provide access, and weak passwords are easiest way for an organization or individual to be breached. This module motivates learners to take password security and credentials protection seriously. It enables them to create strong passwords and practice effective password management.

Password Management & Authentication

Most users have unique passwords for scores of active accounts—a lot of passwords to manage! This module emphasizes the pitfalls of ineffective password management and surveys the advantages and available features of password management software. It also prepares learners to choose identity-authentication questions and answers that won’t be easily hacked.

Mobile Device Security

Mobile devices—phones and tablets—have become a preferred way to connect with the on-line world. And they have become a preferred target of hackers. This module alerts employees to key vulnerabilities and demonstrates how to know whether a device has been compromised. Employees learn specific techniques for keeping devices secure.

Wireless Network Security

Wireless networks afford unprecedented opportunity to maintain online presence and boost work productivity. They also invite unprecedented security vulnerability, as many public wireless networks lack even the most fundamental security measures. In this module, learners come to recognize the potential threats and learn how to protect themselves and their organizations.

Social Engineering

Social engineering refers to efforts to turn the most basic elements of human nature against people so as to gain unauthorized access to data and systems. This module demonstrates how social engineers use human psychology to create relationships that become stepping stones to cybersecurity breaches. It prepares employees to both recognize and resist social engineering exploits.

Protecting Against Malware

Infecting devices with malicious software—ransomware or other types of malware or spyware—is one of the most common ways of collecting information or, worse, gaining deep, unauthorized access into enterprise systems and assets. In this module, employees learn how to recognize the signs of malware attack and respond to them, keeping their devices safe.

Protecting Personal Data

Data is increasingly the lifeblood of any enterprise, and protecting data is one of the key responsibilities of every employee. Through this module learners come to recognize the different types of enterprise data that are critical to protect, and the key do’s and don’ts for effective data protection.

Protecting Against Insider Threats

This module alerts employees to the many ways that internal cyber threats, intentional and unintentional, may arise in the daily operations of any organization. Employees learn how to respond to safeguard the organization’s critical assets.

Cyber Security and Social Media

Social media are an increasingly prevalent part of daily life and work. In this module learners explore the cyber vulnerabilities that arise when engaging with social media, and how cybercriminals and hackers exploit them. They acquire practical, effective ways to avoid or reduce the associated cyber risks.


  • Live-action video, rich media, and interactive features engage learners and cover all key topics.
  • Training can be completed whenever and wherever convenient—on mobile phones, tablets, or computers.
  • Conceptual mastery is validated by a post-module assessment.
  • A downloadable “@ a Glance” sheet summarizes key takeaways and can be posted for on-the-job reference.

KnowCyber® PCI DSS Training


Any business that accepts payment through credit cards must achieve and maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) administered by the PCI Security Standards Council.

Focused, regular training is a key part of PCI DSS compliance. Upon hire, and annually thereafter, staff members must receive training on the importance of cardholder data security, and how to ensure it.

Our PCI DSS for Restaurant Employees module helps your counter service or table service business keep customers’ data safe. In minutes, your front-line staff members learn exactly what they need to know:

  • Their critical role in protecting cardholder data
  • Key indicators and warning signs of fraud and fraudulent behavior
  • Correct steps to take in response

Our courses give your people the cybersecurity knowledge they need.

We provide the latest technologies and best practices in learning and development.

We design anytime, anywhere training programs that engage and energize today’s workforce. Your people learn new behaviors quickly, and put them to work immediately.

We bring you the latest and best practices in human-centric cybersecurity.

As the world of cybercrime evolves, our training modules prepare your employees to act as your organization’s front line of defense against cyber threats.