Security Awareness Training

Protect your network and your workforce.


Empower people to protect their organization.

No matter how advanced your security technology every organization has risk associated with its workforce. Human risk is difficult to quantify because stakeholders must consider every type of threat, malicious, negligent, and unwitting. Investing in a holistic program to educate and empower everyone who touches your network, inherently reduces the risk by increasing awareness and impacting culture.



We customize our comprehensive security awareness training programs for your organization based on uncovered or perceived threats targeting your people. Meaningful, relevant, current training content establishes a solid foundation and threat emulation campaigns (phishing, USB drops) provide insight and create opportunities for risk mitigation.

Transform your organization with training.

Learn Icon




We work with your stakeholders to identify appropriate general end user and role-based training providing meaningful business impacts and personal relevance to end users.


Experience Icon




Create an environment of awareness outside of formalized training with newsletters, posters, digital vignettes, and threat emulation campaigns (phishing, USB drops).


Transform Icon




Our security awareness training program is more than just content – it’s a strategy. Let’s help you transform your organization’s culture into one of awareness and ownership through positive behavior change.


Learn more about our training.

Security Awareness Training Service Guide

Optiv provides eLearning courses and Threat Emulation services for organizations of all sizes and industries. See the customizable programs we have available. Download here.

Security Awareness Training Brief

Tremendous advances in understanding how the mind learns is paving the way for more impactful employee training. Understand 7 ways in which you can improve employee retention regarding security awareness. Download here.

Remote Worker Security Awareness

Remote work is increasingly common for a wide range of businesses. While telework can be extremely beneficial for companies and employees alike, it also opens to door to an array of cybersecurity risks. On this page we provide a series of videos aimed at informing workers and companies against common cyber threats. Learn more.

In Texas and need to meet the requirements of Texas House Bill (HB) 3834?

The Texas Department of Information Resources has certified three Optiv cybersecurity training programs for state and government employees. Learn more.

Training that fits your unique culture and needs.

Choose from three general end user awareness portfolios that align to different organization cultures: Rapid Awareness, CyberBOT® and Security Awareness Circuit Training.



They all provide:



  • Positive behavior change through engaging, meaningful training courses and real-world threat emulation.
  • A holistic approach that improves employee preparedness for cyber threats to your industry, your organization, and their specific role. 
  • Up to date content that covers new threats and threat vectors, to align with current threat and risk mitigation intelligence.
  • Continual reinforcement, because effective security awareness training is more than an annual course. Our supporting materials and threat emulation campaigns cultivate your organization’s awareness culture.
  • Plus, our Security Awareness Training solutions  can be delivered as-a-service freeing up your internal resources and letting them do what they do best as security professionals.

Pick a topic. We have you covered.


Awareness Icon

General Awareness Topics - Business Travel, Cloud Security, Cyber Security at Home, Data Privacy, Email Security, Identity Theft, Insider Threat, Malicious Downloads, Mobile Security, Password Security, Social Engineering, Social Media Security, Workplace Security.



Microlearning Icon

Microlearning Topics - Cyber Threat Actors, Spear Phishing, Cyber Hygiene, Spyware, Coordinated Phishing & Vishing Campaigns, Encryption Basics, Phishing Attachments, Wire Transfer Fraud, Attacks on Smart Phones, Ransomware in the Workplace, Phishing Replies, and more.



Role-Based Icon

Role-Based Topics - Secure Coding, OWASP Top 10, OWASP Mobile Top 10, OWASP Proactive Controls, Threat Modeling, Executive Insights, Credit Card Handling, and more.



Compliance Icon


Compliance Topics - GDPR Overview, GDPR Deep Dive, HIPAA Privacy & Security Basics, PIPEDA, CCPA, Intro to PCI, and more.