Fortinet black logo

Campaigns

Campaigns

Campaigns allow Administrators to establish the learning content which will then be assigned to learners. Administrators can choose some, or all modules, from the following lists.

Modules and videos included with the Standard level of service

Generic modules

K-12 modules

Introduction to Information Security Introduction to Information Security for Educators
Bad Actors Bad Actors for Educators
Social Engineering

Social Engineering for Educators

Phishing Attacks Phishing Attacks for Educators
Email Security Email Security for Educators
Malware and Ransomware Malware and Ransomware for Educators
Password Protection Password Protection for Educators

Micro modules (Generic)

Micro modules (K-12)

Social Engineering

Social Engineering for Educators

Phishing Attacks

Phishing Attacks for Educators

Email Security

Email Security for Educators

Malware and Ransomware

Malware and Ransomware for Educators

Password Protection

Password Protection for Educators

Nano videos (Generic)

Nano videos (K-12)

Shoulder Surfing

Shoulder Surfing for Educators

Tailgaiting

Tailgaiting for Educators

See Something, Say Something

See Something, Say Something for Educators

Follow Company Policy

Follow Company Policy for Educators

Avoid Unknown Wi-Fi Networks

Avoid Unknown Wi-Fi Networks for Educators

Good Password Hygiene

Good Password Hygiene for Educators

Think Before You Click

Think Before You Click for Educators

Modules and videos included with the Premium level of service

Generic modules

K-12 modules

Introduction to Information Security Introduction to Information Security for Educators
Bad Actors Bad Actors for Educators
Social Engineering

Social Engineering for Educators

Phishing Attacks Phishing Attacks for Educators
Email Security Email Security for Educators
Malware and Ransomware Malware and Ransomware for Educators
Password Protection Password Protection for Educators
Multi-Factor Authentication Multi-Factor Authentication for Educators
Data Security Data Security for Educators
Data Privacy Data Privacy for Educators
Access Control Access Control for Educators
Mobile Security Mobile Security for Educators
Insider Threat Insider Threat for Educators
Clean Desk Policy Clean Desk Policy for Educators
Working Remotely Working Remotely for Educators
Web Conference Security Web Conference Security for Educators
Business Email Compromise Business Email Compromise for Educators
Intellectual Property Intellectual Property for Educators
Secure Travel Tips Secure Travel Tips for Educators
Social Media Social Media for Educators

Micro modules (Generic)

Micro modules (K-12)

Social Engineering

Social Engineering for Educators

Phishing Attacks

Phishing Attacks for Educators

Email Security

Email Security for Educators

Malware and Ransomware

Malware and Ransomware for Educators

Password Protection

Password Protection for Educators

Data Security Data Security for Educators
Data Privacy Data Privacy for Educators
Business Email Compromise Business Email Compromise for Educators
Insider Threat Insider Threat for Educators
Clean Desk Policy Clean Desk Policy for Educators

Nano videos (Generic)

Nano videos (K-12)

Shoulder Surfing

Shoulder Surfing for Educators

Tailgaiting

Tailgaiting for Educators

See Something, Say Something

See Something, Say Something for Educators

Follow Company Policy

Follow Company Policy for Educators

Avoid Unknown Wi-Fi Networks

Avoid Unknown Wi-Fi Networks for Educators

Good Password Hygiene

Good Password Hygiene for Educators

Think Before You Click

Think Before You Click for Educators

Web Conference Tips Web Conference Tips for Educators
Travel Tips Travel Tips for Educators
Back Up Your Data Back Up Your Data for Educators
Good Mobile Habits Good Mobile Habits for Educators
Encrypt Sensitive Data Encrypt Sensitive Data for Educators
Update Your Software Update Your Software for Educators
Protect Your Devices Protect Your Devices for Educators
Non-discoverable Bluetooth Non-discoverable Bluetooth for Educators
Use Multi-factor Authentication Use Multi-factor Authentication for Educators
Device Disposal Device Disposal for Educators
Enable Screen Locks Enable Screen Locks for Educators
Clean Desk Tips Clean Desk Tips for Educators
Phishing Attacks Phishing Attacks for Educators

Campaign templates included with the Premium level of service

For Premium profile customers, in addition to the Premium profile modules listed above, the system comes pre-loaded with several, generic Campaign Templates. These contain the following content and modules:

  • Manager Modules

    • Security Awareness for Managers

    • Cyber Security Frameworks for Managers

    • Deploying and Managing the Fortinet Security Awareness and Training Service

  • Common Attacks

    • Social Engineering

    • Phishing

    • Business Email Compromise

  • Authentication

    • Password Protection

    • Multi-Factor Authentication

    • Access Control

  • Data Privacy and Security

    • Mobile Security

    • Data Security

    • Email Security

    • Data Privacy

    • Intellectual Property

  • Physical Security

    • Insider Threat

  • Online Safety

    • Working Remotely

    • Web Conference Security

    • Bad Actors

    • Social Media

    For Premium profile customers, in addition to the Premium Profile modules listed above, the system comes pre-loaded with several, K-12 Campaign Templates for the Education Industry. These contain the following content/modules:

    • Educators – Protecting Sensitive Data

      • Education – Bad Actors

      • Education – Clean Desk

      • Education – Data Privacy

      • Education – Data Security

      • Education – Insider Threat

      • Education – Introduction to Information Security

    • Educators – Online and Email Best Practices

      • Education – Business Email Compromise

      • Education – Email Security

      • Education – Introduction to Information Security

      • Education – Phishing

      • Education – Social Engineering

      • Education – Social Media

      • Education – Web Conference Security

    • Educators – Securing Your Digital World

      • Education – Bad Actors

      • Education – Insider Threat

      • Education – Introduction to Information Security

      • Education – Malware

      • Education – Mobile Security

      • Education – Multi-Factor Authentication

      • Education – Password Protection

Campaigns

Campaigns allow Administrators to establish the learning content which will then be assigned to learners. Administrators can choose some, or all modules, from the following lists.

Modules and videos included with the Standard level of service

Generic modules

K-12 modules

Introduction to Information Security Introduction to Information Security for Educators
Bad Actors Bad Actors for Educators
Social Engineering

Social Engineering for Educators

Phishing Attacks Phishing Attacks for Educators
Email Security Email Security for Educators
Malware and Ransomware Malware and Ransomware for Educators
Password Protection Password Protection for Educators

Micro modules (Generic)

Micro modules (K-12)

Social Engineering

Social Engineering for Educators

Phishing Attacks

Phishing Attacks for Educators

Email Security

Email Security for Educators

Malware and Ransomware

Malware and Ransomware for Educators

Password Protection

Password Protection for Educators

Nano videos (Generic)

Nano videos (K-12)

Shoulder Surfing

Shoulder Surfing for Educators

Tailgaiting

Tailgaiting for Educators

See Something, Say Something

See Something, Say Something for Educators

Follow Company Policy

Follow Company Policy for Educators

Avoid Unknown Wi-Fi Networks

Avoid Unknown Wi-Fi Networks for Educators

Good Password Hygiene

Good Password Hygiene for Educators

Think Before You Click

Think Before You Click for Educators

Modules and videos included with the Premium level of service

Generic modules

K-12 modules

Introduction to Information Security Introduction to Information Security for Educators
Bad Actors Bad Actors for Educators
Social Engineering

Social Engineering for Educators

Phishing Attacks Phishing Attacks for Educators
Email Security Email Security for Educators
Malware and Ransomware Malware and Ransomware for Educators
Password Protection Password Protection for Educators
Multi-Factor Authentication Multi-Factor Authentication for Educators
Data Security Data Security for Educators
Data Privacy Data Privacy for Educators
Access Control Access Control for Educators
Mobile Security Mobile Security for Educators
Insider Threat Insider Threat for Educators
Clean Desk Policy Clean Desk Policy for Educators
Working Remotely Working Remotely for Educators
Web Conference Security Web Conference Security for Educators
Business Email Compromise Business Email Compromise for Educators
Intellectual Property Intellectual Property for Educators
Secure Travel Tips Secure Travel Tips for Educators
Social Media Social Media for Educators

Micro modules (Generic)

Micro modules (K-12)

Social Engineering

Social Engineering for Educators

Phishing Attacks

Phishing Attacks for Educators

Email Security

Email Security for Educators

Malware and Ransomware

Malware and Ransomware for Educators

Password Protection

Password Protection for Educators

Data Security Data Security for Educators
Data Privacy Data Privacy for Educators
Business Email Compromise Business Email Compromise for Educators
Insider Threat Insider Threat for Educators
Clean Desk Policy Clean Desk Policy for Educators

Nano videos (Generic)

Nano videos (K-12)

Shoulder Surfing

Shoulder Surfing for Educators

Tailgaiting

Tailgaiting for Educators

See Something, Say Something

See Something, Say Something for Educators

Follow Company Policy

Follow Company Policy for Educators

Avoid Unknown Wi-Fi Networks

Avoid Unknown Wi-Fi Networks for Educators

Good Password Hygiene

Good Password Hygiene for Educators

Think Before You Click

Think Before You Click for Educators

Web Conference Tips Web Conference Tips for Educators
Travel Tips Travel Tips for Educators
Back Up Your Data Back Up Your Data for Educators
Good Mobile Habits Good Mobile Habits for Educators
Encrypt Sensitive Data Encrypt Sensitive Data for Educators
Update Your Software Update Your Software for Educators
Protect Your Devices Protect Your Devices for Educators
Non-discoverable Bluetooth Non-discoverable Bluetooth for Educators
Use Multi-factor Authentication Use Multi-factor Authentication for Educators
Device Disposal Device Disposal for Educators
Enable Screen Locks Enable Screen Locks for Educators
Clean Desk Tips Clean Desk Tips for Educators
Phishing Attacks Phishing Attacks for Educators

Campaign templates included with the Premium level of service

For Premium profile customers, in addition to the Premium profile modules listed above, the system comes pre-loaded with several, generic Campaign Templates. These contain the following content and modules:

  • Manager Modules

    • Security Awareness for Managers

    • Cyber Security Frameworks for Managers

    • Deploying and Managing the Fortinet Security Awareness and Training Service

  • Common Attacks

    • Social Engineering

    • Phishing

    • Business Email Compromise

  • Authentication

    • Password Protection

    • Multi-Factor Authentication

    • Access Control

  • Data Privacy and Security

    • Mobile Security

    • Data Security

    • Email Security

    • Data Privacy

    • Intellectual Property

  • Physical Security

    • Insider Threat

  • Online Safety

    • Working Remotely

    • Web Conference Security

    • Bad Actors

    • Social Media

    For Premium profile customers, in addition to the Premium Profile modules listed above, the system comes pre-loaded with several, K-12 Campaign Templates for the Education Industry. These contain the following content/modules:

    • Educators – Protecting Sensitive Data

      • Education – Bad Actors

      • Education – Clean Desk

      • Education – Data Privacy

      • Education – Data Security

      • Education – Insider Threat

      • Education – Introduction to Information Security

    • Educators – Online and Email Best Practices

      • Education – Business Email Compromise

      • Education – Email Security

      • Education – Introduction to Information Security

      • Education – Phishing

      • Education – Social Engineering

      • Education – Social Media

      • Education – Web Conference Security

    • Educators – Securing Your Digital World

      • Education – Bad Actors

      • Education – Insider Threat

      • Education – Introduction to Information Security

      • Education – Malware

      • Education – Mobile Security

      • Education – Multi-Factor Authentication

      • Education – Password Protection