Training Packages

SecureSuite® Security Awareness Training Packages

GLS has designed its entire security training program around the “human element” of cybersecurity. Our Human Firewall-focused approach to security awareness training is a flexible framework for building an effective training program that best meets your organization’s needs and focuses on your most important asset – your people.

Why SecureSuite?

Organizations often focus on hardware, software systems and policy as the core elements of creating a secure infrastructure. Yet 90% of security incidents are caused by human error. How can you protect your organization from falling victim to the next data breach or ransomware attack? Simple, build a Human Firewall. GLS’s Human Firewall 2.0 training methodology represents a simplified and streamlined way to purchase and implement security awareness training. Rather than choosing from many à la carte items, we’ve grouped our training, phishing and reinforcement assets into logical packages – known as SecureSuite packages – that deliver a more effective solution. GLS’s security awareness training packages contain all of the resources you will need for a successful program, no matter where you are in your security awareness journey.

SecureSuite Security Awareness Training Packages

Most Popular
COMPONENTS
ESSENTIAL
21 content assets
STANDARD
41 content assets
COMPREHENSIVE
67 content assets
ELITE
119 content assets
Foundational Courses(s) (30 Minutes) ✔ ✔ ✔ ✔
Reinforcement Assets – Training Modules (8-10 minutes) ✔ ✔ ✔ ✔
Reinforcement Assets – Training Videos (3-5 minutes) ✔ ✔ ✔ ✔
Posters ✔ ✔ ✔ ✔
Shock & Awe Internal Marketing Videos ✔ ✔ ✔ ✔
Quarterly Newsletters ✔ ✔ ✔ ✔
Tips & Tweets ✔ ✔ ✔ ✔
CEO Letter ✔ ✔ ✔ ✔
Handouts ✔ ✔
SecureGenius Pre-Assessment ✔ ✔ ✔ ✔
SecureGenius Post-Assessment ✔ ✔ ✔ ✔
SecureGenius Behavioral Assessment* ✔ ✔ ✔
SecureGenius Cultural Assessment* ✔ ✔
CyberIQ Games ✔ ✔ ✔
Localized Content (all available languages) ✔ ✔ ✔ ✔
GLS OnDemand Hosted LMS ✔ ✔ ✔ ✔
SecurePhish Simulation Platform ✔ ✔ ✔ ✔
Unlimited Product Support for Admins ✔ ✔ ✔ ✔
60 Minute Session with an InfoSec Security Consultant ✔
Single Sign On Optional Optional Optional ✔
SCORM Dispatch Optional Optional Optional Optional

*Coming Soon

 
Components
Essential
21 content assets
Standard
41 content assets
Foundational Courses(s) (30 Minutes) ✔ ✔
Reinforcement Assets – Training Modules (8-10 minutes) ✔ ✔
Reinforcement Assets – Training Videos (3-5 minutes) ✔ ✔
Posters ✔ ✔
Shock & Awe Internal Marketing Videos ✔ ✔
Quarterly Newsletters ✔ ✔
Tips & Tweets ✔ ✔
CEO Letter ✔ ✔
Handouts
SecureGenius Pre-Assessment ✔ ✔
SecureGenius Post-Assessment ✔ ✔
SecureGenius Behavioral Assessment* ✔
SecureGenius Cultural Assessment*
CyberIQ Games ✔
Localized Content (all available languages) ✔ ✔
GLS OnDemand Hosted LMS ✔ ✔
SecurePhish Simulation Platform ✔ ✔
Unlimited Product Support for Admins ✔ ✔
60 Minute Session with an InfoSec Security Consultant
Single Sign On Optional Optional
SCORM Dispatch Optional Optional

*Coming Soon

 
Most Popular
Components
Comprehensive
67 content assets
Elite
119 content assets
Foundational Courses(s) (30 Minutes) ✔ ✔
Reinforcement Assets – Training Modules (8-10 minutes) ✔ ✔
Reinforcement Assets – Training Videos (3-5 minutes) ✔ ✔
Posters ✔ ✔
Shock & Awe Internal Marketing Videos ✔ ✔
Quarterly Newsletters ✔ ✔
Tips & Tweets ✔ ✔
CEO Letter ✔ ✔
Handouts ✔ ✔
SecureGenius Pre-Assessment ✔ ✔
SecureGenius Post-Assessment ✔ ✔
SecureGenius Behavioral Assessment* ✔ ✔
SecureGenius Cultural Assessment* ✔ ✔
CyberIQ Games ✔ ✔
Localized Content (all available languages) ✔ ✔
GLS OnDemand Hosted LMS ✔ ✔
SecurePhish Simulation Platform ✔ ✔
Unlimited Product Support for Admins ✔ ✔
60 Minute Session with an InfoSec Security Consultant ✔
Single Sign On Optional ✔
SCORM Dispatch Optional Optional

*Coming Soon

Elements of Effective Security Awareness Training

Each package provides an integrated suite of training assets that include a variety of SecureGenius assessments, core training curriculum with gamification options, best practices modules, and microlearning videos, combined with our Communications Toolbox, CyberIQ games, SecureDev training and SecurePhish phishing simulation tool within GLS’ OnDemand platform. SecureSuite security awareness training packages can also be customized to meet your specific requirements.

Our Consulting Services packages can be added to each package for additional hands-on service and support in planning, implementing and rolling out your specific program. 

Blue tablet and orange screen representing our quality videos.

Videos

Videos

Quick engaging and topic specific videos designed to grab learners attention. Great for internal marketing of any Security Awareness Training program.
A blue laptop and tablet with orange upon it, representing our relevant courseware.

Courseware

Courseware

Relevant, engaging, traditional training content covering a specific content area (and sub-content areas) in depth. Typically 20-25 minutes in length.
Blue and orange puzzle pieces fitting together representing our modular training.

Modules

Modules

A core component of GLS’s Human Firewall solution includes powerful, topic-specific modular training to enhance your training program and reinforce specific behavior change.
Learn More!
A blue video game controller with orange buttons, representing our game based training.

Games

Games

Engage learners on a whole new level with problem solving games, scenarios and puzzles. Makes training a fun (and competitive) interactive activity for everyone.
Learn More!
A blue envelope containing an orange webpage letter. Representing our newsletter

Newsletters

Newsletters

Provide the latest information on key security topics to learners quarterly. Emphasizes their role in keeping information secure during an ever changing threat landscape.
Blue web pages protected by an orange shield with a check mark crest. Representing our SecureGenius® program

SecureGenius®

SecureGenius®

Assessment tool that establishes a baseline for learners, provides the data used to tailor training content to meet gap areas and measure program success.
Learn More!
A blue laptop with an orange website representing our digital posters.

Digital Posters

Digital Posters

Enforce a specific topic using attention-grabbing imagery and content that is easy to absorb quickly. Great resource for internal marketing of any Security Awareness Training program.
A blue bird with orange wings representing our tips and tweets.

Tips & Tweets

Tips & Tweets

Designed to regularly engage learners by providing tips on how to be proactive in securing information. Engage users through social media by providing periodic tweets to encourage secure behaviors.
Blue webpages with an orange magnifying glass upon them, representing our microlearning.

Microlearning

Microlearning

Rich, in-depth training content derived from courseware. Provided in bite-sized segments designed to engage learners and build awareness on specific topics.

Why Choose GLS as Your Training Partner?

Our emphasis on annual planning and growth in maturity year over year continues to differentiate us from other vendors. Using our SecureSuite training solution built upon the principles of our Human Firewall 2.0 methodology, customers can select a security awareness training package that truly focuses on where they are in their cybersecurity awareness journey.

Training managers, IT professionals and HR professionals can choose a plan that provides a variety of content in diversified training modalities, focused on the topics needed for creating a security-minded culture. Coupled with our training plans and managed services, organizations receive an array of tools designed using the Human Firewall security awareness training approach.

The SecureSuite training solution makes it easy to plan and execute 8- to 10-week campaigns around particular topics interspersed with phishing simulations.

GLS Security Awareness Training Delivers

Substance – A carefully-designed variety of program materials aligns with user roles to change behavior and build a security- and compliance-oriented culture.

Relevance – Fresh materials ensure users understand the latest threats and regulations so they can better protect your organization.

Ease – Simplified, cost-effective options get you started quickly, or you can customize your program materials to reflect your policies and environment.

Service – Regardless of company size or where you are in your security awareness journey, you receive the right level of consultation, program management and support.

Return – Using a proven scorecard of behavioral metrics, we help you measure and optimize your program to achieve the desired results.

Start Your Security Awareness Training Today

From modules to games to full length courses, GLS’s security awareness training packages provide engaging and varied training materials that reach learners in different ways. Contact us today to learn more about designing a security awareness program that meets the needs of your organization or learn more about how GLS is helping our clients successfully tackle today’s ever-growing cybersecurity challenges. 

GLS Logo

SecureSuite Standard Training Package

Includes
Courseware
Cyber Awareness Challenge Security Brief: Cybersecurity Fundamentals
Anti-Phishing Essentials Security Awareness Challenge
Training Modules
BPM: Avoiding Phishing Message Threats BPM: Business Email Compromise (BEC) Scams
BPM: Setting Up Secure Passwords BPM: Securing Your Work From Home
BPM: Avoiding Spear Phishing Message Threats
Training Videos
MSS: Individual Responsibility MSS: Ransomware
MSS: The Human Firewall MSS: SMiSing
MSS: Phishing Emails MSS: Voice Phishing
Communications Toolbox
Assorted Digital Posters: General Cyber Security (Responsibility) SA: Responsibility
Assorted Digital Posters: Phishing Basic SA: Phishing
Assorted Digital Posters: Phishing Advanced SA: Passwords
Assorted Digital Posters: Mobile SA: Work at Home
Assorted Digital Posters: Work in Public SA: Business Email Compromise (BEC)
Assorted Digital Posters: Passwords SA: Mobile
Assorted Digital Posters: Work at Home CEO Letter
Tips & Tweets Quarterly Newsletters
SecureGenius Assessments
Cultural Assessment (NEW) Pre-Assessment (Content focused)
Behavioral Assessment (NEW)
CyberIQ Games
Cybersecurity IQ Challenge Data Protection IQ Challenge
GLS Logo

SecureSuite Comprehensive Training Package

Includes
Courseware
Cyber Awareness ChallengePrivacy and Data Protection Essentials
Anti-Phishing EssentialsPCI DSS Introduction (Essentials)
Security Brief: Cybersecurity FundamentalsHIPAA Awareness Training
Security Awareness ChallengeRole-based Training for IT Administrators & Engineers
Leading a Secure OrganizationRole-based Training for Security Managers
Introduction to OWASPRole-based Training for Security Specialists
General Data Protection Regulation (GDPR) Essentials
Training Modules
BPM: Avoiding Phishing Message ThreatsBPM: Securing Your Mobile Devices
BPM: Setting Up Secure PasswordsBPM: Safe Social Networking
BPM: Avoiding Spear Phishing Message ThreatsBPM: Securing Information at the Office
BPM: Business Email Compromise (BEC) ScamsBPM: Browsing the Web Securely
BPM: Securing Your Work From Home 
Training Videos
MSS: Individual ResponsibilityMSS: SMiSing
MSS: The Human FirewallMSS: Voice Phishing
MSS: Phishing EmailsMSS: Social Engineering in Social Networks
MSS: RansomwareMSS: Social Media Posts
Communications Toolbox
Assorted Digital Posters: General Cyber Security (Responsibility)Assorted Digital Posters: Cloud
Assorted Digital Posters: Phishing BasicAssorted Digital Posters: Network Security
Assorted Digital Posters: Phishing AdvancedTips & Tweets
Assorted Digital Posters: MobileSA: Responsibility
Assorted Digital Posters: Work in PublicSA: Phishing
Assorted Digital Posters: PasswordsSA: Passwords
Assorted Digital Posters: Work at HomeSA: Work at Home
Assorted Digital Posters: WebSA: Business Email Compromise (BEC)
Assorted Digital Posters: TravelSA: Mobile
Assorted Digital Posters: Workplace/PhysicalSA: Social Networking
Assorted Digital Posters: Social MediaCEO Letter
 Quarterly Newsletters
SecureGenius Assessments
Pre-Assessment (Content focused)Cultural Assessment (NEW)
Post Assessment (Content focused)Behavioral Assessment (NEW)
CyberIQ Games
Cybersecurity IQ ChallengePhishing IQ Challenge
Data Protection IQ ChallengeRemote Work IQ Challenge
Passwords and Authentication IQ Challenge 
 
GLS Logo

SecureSuite Elite Training Package

Includes
Courseware
Cyber Awareness Challenge Secure Coding with OWASP Top 10 (Full Course)
Anti-Phishing Essentials Addressing Ethics and Compliance at Work
Security Brief: Cybersecurity Fundamentals Anti-Money Laundering
Security Awareness Challenge Ethics and Code of Conduct
Leading a Secure Organization Privacy Laws and Practices
Introduction to OWASP California Workplace Harassment Training for Employees
General Data Protection Regulation (GDPR) Essentials California Workplace Harassment Training for Managers
Privacy and Data Protection Essentials Connecticut Sexual Harassment Training for Employees
PCI DSS Introduction (Essentials) Connecticut Sexual Harassment Training for Supervisors
HIPAA Awareness Training Delaware Preventing Sexual Harassment for Employees
Role-based Training for IT Administrators & Engineers Delaware Preventing Sexual Harassment for Managers
Role-based Training for Security Managers Diversity and Inclusion: Valuing Differences for Mutual Success
Role-based Training for Security Specialists Harassment and Bullying: Managing Threats to a Respectful Work Culture
Introduction to OWASP Harassment: Ensuring a Respectful Workplace
OWASP Mod 01: Injection Illinois Preventing Sexual Harassment for Employees
OWASP Mod 02: Broken Authentication and Session Management Illinois Preventing Sexual Harassment for Managers
OWASP Mod 03: Sensitive Data Exposure Maine Sexual Harassment Training for Employees
OWASP Mod 04: XML External Entities (XXE) Maine Sexual Harassment Training for Managers
OWASP Mod 05: Broken Access Control Managing Ethics and Compliance at Work
OWASP Mod 06: Security Misconfiguration New York Sexual Harassment Training for Employees
OWASP Mod 07: Cross-Site Scripting (XSS) New York Sexual Harassment Training for Managers
OWASP Mod 08: Insecure Deserialization Preventing Sexual Harassment for Employees
OWASP Mod 09: Using Components with Known Vulnerabilities Preventing Sexual Harassment for Managers
OWASP Mod 10: Insufficient Logging and Monitoring Preventing Workplace Harassment for Employees
Preventing Workplace Harassment for Managers
Training Modules
BPM: Avoiding Phishing Message Threats BPM: Working Securely in Public Places
BPM: Setting Up Secure Passwords BPM: Securing Your Office Network
BPM: Avoiding Spear Phishing Message Threats BPM: Cybersecurity Beyond the Workplace: Security On The Go
BPM: Business Email Compromise (BEC) Scams BPM: Cybersecurity Beyond the Workplace: Security for Kids
BPM: Securing Your Work From Home Executive BPM: Leading a Secure Organization: Organization Cyber Risk
BPM: Securing Your Mobile Devices Executive BPM: Leading a Secure Organization: The Human Firewall
BPM: Safe Social Networking Executive BPM: Leading a Secure Organization: Your Data and Devices
BPM: Securing Information at the Office
BPM: Browsing the Web Securely
BPM: Securing Your Information During Travel
BPM: Securing Your Information in the Cloud
Training Videos
MSS: Individual Responsibility MSS: Voice Phishing
MSS: The Human Firewall MSS: Social Engineering in Social Networks
MSS: Phishing Emails MSS: Social Media Posts
MSS: Ransomware MSS: Be More Cyber-Secure in the New Normal
MSS: SMiSing MSS: Insider Threat
Communications Toolbox
Assorted Digital Posters: General Cyber Security (Responsibility) Assorted Digital Posters: Cloud
Assorted Digital Posters: Phishing Basic Assorted Digital Posters: Beyond the Workplace
Assorted Digital Posters: Phishing Advanced Tips & Tweets
Assorted Digital Posters: Mobile SA: Responsibility
Assorted Digital Posters: Work in Public SA: Phishing
Assorted Digital Posters: Passwords SA: Passwords
Assorted Digital Posters: Work at Home SA: Work at Home
Assorted Digital Posters: Web SA: Business Email Compromise (BEC)
Assorted Digital Posters: Travel SA: Mobile
Assorted Digital Posters: Workplace/Physical SA: Social Networking
Assorted Digital Posters: Social Media SA: Web Security
Assorted Digital Posters: Cloud Quarterly Newsletters
Assorted Digital Posters: Network Security CEO Letter
Assorted Digital Posters: Network Security Personal Security Handouts
SecureGenius Assessments
Pre-Assessment (Content focused) Cultural Assessment (NEW)
Post Assessment (Content focused) Behavioral Assessment (NEW)
CyberIQ Games
Cybersecurity IQ Challenge Phishing IQ Challenge
Data Protection IQ Challenge Remote Work IQ Challenge
Passwords and Authentication IQ Challenge
GLS Logo

SecureSuite Essentials Training Package

Includes
Courseware
Cyber Awareness ChallengeAnti-Phishing Essentials
Training Modules
BPM: Avoiding Phishing Message ThreatsBPM: Setting Up Secure Passwords
Training Videos
MSS: Individual ResponsibilityMSS: Phishing Emails
MSS: The Human Firewall 
Communications Toolbox
Assorted Digital Posters: General Cyber Security (Responsibility)SA: Responsibility
Assorted Digital Posters: Phishing BasicSA: Phishing
Tips & TweetsSA: Passwords
 CEO Letter
 Quarterly Newsletters
SecureGenius Assessments
Cultural Assessment (New)Behavioral Assessment (NEW)
 

Training Promotions

See Our Current Promotions

GLS Logo
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?