| Handling Customer Card Payments Securely |
Direction Training |
| Handling Personal Data at Work |
Direction Training |
| Licensing Awareness for Operational Staff |
Direction Training |
|
| Accident Reporting Training |
iAM Learning |
| AI and GDPR |
iAM Learning |
| Anti-Bribery and Corruption |
iAM Learning |
| Choosing the Right Cloud Vendor |
iAM Learning |
| Competition Law |
iAM Learning |
| Consumer Duty |
iAM Learning |
| Control of Contractors |
iAM Learning |
| Corporate Social Responsibility |
iAM Learning |
| Cyber Protection & Infection Control |
iAM Learning |
| Data Breaches |
iAM Learning |
| Data Handling (Best Practices) |
iAM Learning |
| Dealing with Terrorism Threats |
iAM Learning |
| Denial of Service Attack |
iAM Learning |
| Disaster Recovery |
iAM Learning |
| Email Security |
iAM Learning |
| GDPR Guru |
iAM Learning |
| GDPR Overview |
iAM Learning |
| Good Governance and anti-money laundering |
iAM Learning |
| Helping People Stay Safe Online |
iAM Learning |
| Insider Dealing |
iAM Learning |
| Life in the Cloud |
iAM Learning |
| Modern Slavery |
iAM Learning |
| PCI - DSS |
iAM Learning |
| Phishing |
iAM Learning |
| Protecting Your Personal Data |
iAM Learning |
| Ransomware |
iAM Learning |
| Selling Age Restricted Products |
iAM Learning |
| Spoofing Attacks |
iAM Learning |
| Staying Safe Online |
iAM Learning |
| Stolen Devices |
iAM Learning |
| Subject Access Requests |
iAM Learning |
| The Importance of Insurance |
iAM Learning |
| The Internet of Things |
iAM Learning |
| The Role of Data Protection Officers |
iAM Learning |
| Using a Strong Password |
iAM Learning |
| Viruses and Malware |
iAM Learning |
| Whistleblowing |
iAM Learning |
| Whistleblowing (Safeguarding) |
iAM Learning |
| Whistleblowing in Schools |
iAM Learning |
| Wi-Fi Security |
iAM Learning |
| Workplace Inspections |
iAM Learning |
|
| Anti-Bribery and Anti-Corruption |
Succeed Technologies |
| Anti-Money Laundering |
Succeed Technologies |
| FERPA Compliance Training - Eligible Student |
Succeed Technologies |
| FERPA Compliance Training - Non - Eligible Student |
Succeed Technologies |
| GDPR Data Protection Awareness |
Succeed Technologies |
| HIPPA Compliance Training |
Succeed Technologies |
| Information Security Awareness |
Succeed Technologies |
| ISO 27001 Compliance Training |
Succeed Technologies |
| Preventing Facilitation of Tax Evasion |
Succeed Technologies |
|
| Confidentiality in the workplace |
20-20-Learning |
| Cyber Security and You |
20-20-Learning |
| Responsible Use of Social Media |
20-20-Learning |
|
| Cyber Security Awareness |
My Learning Cloud |
| Cyber Security Awareness (Managers) |
My Learning Cloud |
| Document and Record Keeping (Managers) |
My Learning Cloud |
| General Data Protection Regulation (GDPR) |
My Learning Cloud |
| Protecting Personal Information |
My Learning Cloud |
|
| Social Engineering Fraud |
Pearltech |
|
|
|
| Bullying and Harassment |
Kallidus |
| Competition Law |
Kallidus |
| Criminal Finances Act |
Kallidus |
| Cyber Security and Phishing |
Kallidus |
| Discipline and Grievance |
Kallidus |
| Drugs and Alcohol Misuse |
Kallidus |
| Essential Digital Skills |
Kallidus |
| Failure to Prevent Fraud |
Kallidus |
| Freedom of Information Act |
Kallidus |
| General Data Protection Regulation (GDPR) Essentials |
Kallidus |
| General Data Protection Regulation (GDPR) for non-EU businesses |
Kallidus |
| General Data Protection Regulation (GDPR) UK |
Kallidus |
| Information Security - GDPR |
Kallidus |
| International Fraud, Bribery, and Corruption |
Kallidus |
| Martyn's Law for Retail |
Kallidus |
| Martyn's Law for Venues |
Kallidus |
| Modern Slavery |
Kallidus |
| Payment Card Industry Data Security Standards (PCI DSS) |
Kallidus |
| Preventing Bribery in Business |
Kallidus |
| Preventing Bribery in Business (Essentials) |
Kallidus |
| Preventing Bribery in Business (Managers) |
Kallidus |
| Preventing Bribery in Business (Overseas) |
Kallidus |
| Preventing Money Laundering |
Kallidus |
| Preventing Money Laundering (Essentials) |
Kallidus |
| Right to Work |
Kallidus |
| The EU and UK GDPRs |
Kallidus |
| Whistleblowing |
Kallidus |
|
| Principles of Managing Information and Producing Documents |
Coleg Sir Gar |
|
| AML CTF CPF Introduction |
Marbral Advisory |
| Cyber Security Awareness with Deep Fakes |
Marbral Advisory |
| GDPR Awareness (Channel Islands) |
Marbral Advisory |
| Introduction to Sanctions in UK and Channel Islands |
Marbral Advisory |
| Introduction to the General Data Protection Regulation UK |
Marbral Advisory |
|
| An Introduction to Anti-Money Laundering |
The Learning Rooms |
| Being an Active Bystander at Work |
The Learning Rooms |
| Cybersecurity |
The Learning Rooms |
| Information Security |
The Learning Rooms |
| Introduction to GDPR in the Workplace |
The Learning Rooms |
| Policies & Procedures |
The Learning Rooms |
|
| Code of Conduct |
Nexefy |
| Cyber Security: Protect Yourself Online & Offline |
Nexefy |
| So You Want to Manage a Code of Conduct Breach |
Nexefy |
| So You want to refresh your Code of Conduct knowledge |
Nexefy |
| So you want to stay safe on social media |
Nexefy |
| The Internet of Things: Connecting the World |
Nexefy |
|
| Anti-Money Laundering |
Learner Bubble |
| Bribery and Corruption |
Learner Bubble |
| Competition Law |
Learner Bubble |
| Conduct Risk |
Learner Bubble |
| Conflicts of Interest |
Learner Bubble |
| Consumer Credit Regulations |
Learner Bubble |
| Consumer Duty - Advanced |
Learner Bubble |
| Consumer Duty - Essentials |
Learner Bubble |
| Criminal Finances Act 2017 |
Learner Bubble |
| Cybersecurity |
Learner Bubble |
| Data Protection Act 2018 |
Learner Bubble |
| Data Protection Impact Assessment |
Learner Bubble |
| EU GDPR |
Learner Bubble |
| EU GDPR for Managers |
Learner Bubble |
| Financial Crime |
Learner Bubble |
| Fraud Prevention |
Learner Bubble |
| GDPR for Managers |
Learner Bubble |
| General Data Protection Regulation |
Learner Bubble |
| Information Security and Mobile Devices |
Learner Bubble |
| Information Security for Managers |
Learner Bubble |
| Information Security Suite |
Learner Bubble |
| Insider Dealing |
Learner Bubble |
| IT Social Engineering |
Learner Bubble |
| Market Abuse |
Learner Bubble |
| Modern Slavery |
Learner Bubble |
| Password Security |
Learner Bubble |
| Payment Card Information Data Security Standards (PCI DSS) |
Learner Bubble |
| Phishing Emails |
Learner Bubble |
| Protection from Malware |
Learner Bubble |
| Senior Managers and Certification Regime |
Learner Bubble |
| Social Media at Work |
Learner Bubble |
| Social Networking |
Learner Bubble |
| Surfing the Web |
Learner Bubble |
| The Digital Personal Data Protection (DPDP) Act, 2023 |
Learner Bubble |
| The Failure to Prevent Fraud Offence |
Learner Bubble |
| The Failure to Prevent Fraud offence (for managers) |
Learner Bubble |
| The UK Digital Markets, Competition and Consumers Act 2024 |
Learner Bubble |
| Treating Customers Fairly |
Learner Bubble |
| UK GDPR |
Learner Bubble |
| UK GDPR for Managers |
Learner Bubble |
| Whistleblowing |
Learner Bubble |
|
|
|
| Common Types of Attack |
Assemble You |
| High-Performance Culture |
Assemble You |
| Introduction to Cultural Nuances |
Assemble You |
| Introduction to Malware |
Assemble You |
| Introduction to Sexual Harassment |
Assemble You |
| Introduction to Social Engineering |
Assemble You |
| Using and Managing Passwords |
Assemble You |
|
| Cybersecurity Awareness Essentials: Protect your Digital Realm |
Simon Sez IT |
| Cybersecurity Essentials: Stay Safe and Secure Online |
Simon Sez IT |
| Generative AI and Cybersecurity |
Simon Sez IT |
|
| Anti - Bribery & Corruption |
First Health and Safety |
| Anti-Money Laundering |
First Health and Safety |
| GDPR and Data Protection |
First Health and Safety |
| Information Security |
First Health and Safety |
| Modern Slavery |
First Health and Safety |
| Phishing Malware and Online Security |
First Health and Safety |
| Whistleblowing |
First Health and Safety |
|
| Anti-Money Laundering |
Access Group |
| Anti-Money Laundering for Law Firms |
Access Group |
| Anti-Money Laundering for Regulated Business |
Access Group |
| Anti-Money Laundering for Support Staff |
Access Group |
| Avoiding Bribery Risks for Business |
Access Group |
| Bribery Act Refresher |
Access Group |
| Bullying and Harassment, Including Sexual Harassment |
Access Group |
| Clinical Governance |
Access Group |
| Combatting Market Abuse |
Access Group |
| Competition Law |
Access Group |
| Criminal Corporate Liability for Governance, Risk, and Compliance |
Access Group |
| Cyber Security |
Access Group |
| Cyber Security Training Bundle |
Access Group |
| Data Protection in the EU |
Access Group |
| Data Protection UK |
Access Group |
| Data Protection UK including GDPR |
Access Group |
| Fair Treatment of Customers |
Access Group |
| Finance and Budgeting Basics |
Access Group |
| Finance for Non-Financial Managers |
Access Group |
| Fraud Awareness |
Access Group |
| Freedom of Information |
Access Group |
| Handling data |
Access Group |
| Information Security |
Access Group |
| Malware attack |
Access Group |
| Modern Slavery |
Access Group |
| Passwords and authentication |
Access Group |
| Payment Card Industry (PCI) Awareness |
Access Group |
| Phishing |
Access Group |
| Professional Boundaries |
Access Group |
| Protecting your business from cyber attacks |
Access Group |
| Record Keeping |
Access Group |
| Reporting cybercrime |
Access Group |
| Responding to a cyber attack |
Access Group |
| Return to Work |
Access Group |
| Safe device use |
Access Group |
| Safer Recruitment |
Access Group |
| Staying safe online |
Access Group |
| UK Data Protection for Managers |
Access Group |
| Whaling attack |
Access Group |
| Whistleblowing |
Access Group |
| Whistleblowing (Refresher) |
Access Group |
| Whistleblowing with confidence |
Access Group |
| Workplace Security |
Access Group |
|
| Cybersecurity Best Practices |
Jeff Havens Company |
| Cybersecurity Essentials |
Jeff Havens Company |
|
| End User Cybersecurity Fundamentals |
Framework Tech |
| Phishing Prevention: Secure Your Digital Life |
Framework Tech |
|
| Anti-Money Laundering |
Ultima |
| AntiBribery and Corruption |
Ultima |
| Data Protection |
Ultima |
| Distributed Working |
Ultima |
| Incident Response |
Ultima |
| ISO 9001 |
Ultima |
| Online Safety |
Ultima |
| Passwords |
Ultima |
| PCI DSS |
Ultima |
| Phishing |
Ultima |
| Physical Security |
Ultima |
| Security Essentials |
Ultima |
| Social Engineering |
Ultima |
| Telephone Attacks |
Ultima |
|
| Compliance: Establish A Code Of Conduct To Mitigate Legal Risk And Foster A Positive Company Culture |
The Expert Academy |
| Compliance: Establish Anti-Bribery And Corruption Guidelines To Mitigate Legal Risks |
The Expert Academy |
| Compliance: Establish Ethical Whistleblower Policies And Reporting Mechanisms To Combat Fraud |
The Expert Academy |
| Compliance: Navigate The Ever-Evolving Regulatory Landscape To Achieve Excellence |
The Expert Academy |
| Compliance: Prevent Sexual Harassment To Foster A Safe And Respectful Workplace Culture |
The Expert Academy |
| Compliance: Understand Types Of Harassment And Implement Policies To Ensure Employee Safety |
The Expert Academy |
| Cybersecurity: Defend Your Business From Hackers And Protect Your Data To Stay Safe Online |
The Expert Academy |
| Cybersecurity: Detect And Defend Your Organisation From Phishing Attacks |
The Expert Academy |
| Cybersecurity: Implement Data Protection Best Practices To Safeguard Consumer Privacy |
The Expert Academy |
|
| Addressing Sexual Harassment in the Workplace: Creating a Safe and Respectful Environment |
Mint Interactive |
| Anti-Bribery Essentials: Identifying, Preventing, and Managing Bribery Risks |
Mint Interactive |
| Combatting Modern Slavery and Human Trafficking: Awareness, Identification, and Reporting |
Mint Interactive |
| Cyber and Data Security: A Comprehensive Overview to Keep Your Data Safe |
Mint Interactive |
| Empowering Consumers: An Introduction to FCA's New Consumer Duty and Financial Regulation |
Mint Interactive |
| Mastering GDPR Compliance: An Introduction for Beginners |
Mint Interactive |
| Safeguarding within organisations with PREVENT |
Mint Interactive |
|
| Bullying and Harassment in the Workplace |
Embrace Resilience |
| Data Protection and the UK GDPR |
Embrace Resilience |
| General Data Protection Regulation (GDPR) |
Embrace Resilience |
|
| Cyber Security: Email Security |
Real Projects |
| Cyber Security: Keeping your Laptop Safe and Secure |
Real Projects |
| Cyber Security: Top Tips |
Real Projects |
| Cyber Security: Using Your Mobile Device Safe and Securely |
Real Projects |
| How To Keep Confidential Information Secure |
Real Projects |
| Information Security: Email Security |
Real Projects |
| Information Security: Malware and Viruses |
Real Projects |
| Information Security: Passwords |
Real Projects |
| Information Security: Phishing |
Real Projects |
| Information Security: Social Engineering Attacks |
Real Projects |
| Information Security: Staying Safe Online |
Real Projects |
| Information Security: Text-Based Phishing |
Real Projects |
| Information Security: What Are Malicious Macros |
Real Projects |
| Introduction to Data Security |
Real Projects |
| Keeping Digital Information Secure When Travelling |
Real Projects |
| Situational Awareness |
Real Projects |
| Travel Security: Air Travel |
Real Projects |
| Travel Security: During your Trip |
Real Projects |
| Travel Security: Preparing for your Trip |
Real Projects |
| Travel Security: The Traveller’s Short Guide to Safety and Wellbeing |
Real Projects |
| Traveling for work: Air Travel |
Real Projects |
| Travelling for Work: Conferences & Exhibitions |
Real Projects |
| Travelling for Work: Situational Awareness |
Real Projects |
| What is Cloud Computing? |
Real Projects |
| Workplace Security: Introduction to Access Control |
Real Projects |
|
| Anti Sexual Harassment Training |
Talent Quest |
| Anti Workplace Harassment Training: Part 1 |
Talent Quest |
| Anti Workplace Harassment Training: Part 2 |
Talent Quest |
| Dealing with Active Shooters |
Talent Quest |
| Dealing with Bomb and Arson Threats in your Workplace |
Talent Quest |
| Effects of workplace politics |
Talent Quest |
| How to Protect Yourself from Cyber Security Threats |
Talent Quest |
|
| Bribery Act Awareness |
CPL Learning |
| Disability Awareness |
CPL Learning |
| Drink Spiking |
CPL Learning |
| GDPR for Hospitality |
CPL Learning |
| Money Laundering Awareness |
CPL Learning |
| PCI Data Security Standards |
CPL Learning |
| Right to Work |
CPL Learning |
|
| Advanced Data Protection |
Dynamic Business |
| Anti-bribery |
Dynamic Business |
| Anti-money Laundering |
Dynamic Business |
| Antisocial Behaviour |
Dynamic Business |
| Bullying and Harassment |
Dynamic Business |
| Competition Law |
Dynamic Business |
| Cyber Security |
Dynamic Business |
| GDPR |
Dynamic Business |
| Information Security |
Dynamic Business |
| Mental Capacity Act |
Dynamic Business |
| Modern Day Slavery |
Dynamic Business |
| Saving Energy |
Dynamic Business |
| Tax Evasion Awareness |
Dynamic Business |
| Underage Sales |
Dynamic Business |
| Waste management (non clinical) |
Dynamic Business |
| Whistleblowing |
Dynamic Business |
|
| Alcohol and Drug Awareness |
Open eLMS |
| Alcohol Awareness for Managers |
Open eLMS |
| Amphetamine Awareness for Managers |
Open eLMS |
| Anti Money Laundering Introduction |
Open eLMS |
| Anti Money Laundering Regulated Activities |
Open eLMS |
| Anti Social Behaviour for Community Safety Officers |
Open eLMS |
| Anti Social Behaviour for General Employees |
Open eLMS |
| Bribery Act |
Open eLMS |
| Cannabis Awareness for Managers |
Open eLMS |
| Cocaine Awareness for Managers |
Open eLMS |
| Data Protection |
Open eLMS |
| Drugs and Young People |
Open eLMS |
| Ecstasy Awareness for Managers |
Open eLMS |
| GDPR Awareness |
Open eLMS |
| GDPR Customer Service |
Open eLMS |
| General Security |
Open eLMS |
| Heroin Awareness for Managers |
Open eLMS |
| Implementing the GDPR |
Open eLMS |
| ISO 14001 Environmental Management Systems |
Open eLMS |
| ISO 27001 Information Security Management Systems |
Open eLMS |
| ISO 50001 Energy Management Systems |
Open eLMS |
| ISO 9001 Quality Management Systems |
Open eLMS |
| ISO Advanced |
Open eLMS |
| ISO Beginners |
Open eLMS |
| IT Security |
Open eLMS |
| Law and Journalism |
Open eLMS |
| Legal High Awareness for Managers |
Open eLMS |
| Legal Issues Concerning Media Assets |
Open eLMS |
| Managing your Digital Footprint |
Open eLMS |
| Modern Slavery |
Open eLMS |
| Money Laundering |
Open eLMS |
| Navigating UK Employment Law Changes |
Open eLMS |
| Prevent Strategy |
Open eLMS |
| Social Media Usage |
Open eLMS |
| Volatile Substances Awareness for Managers |
Open eLMS |
|
| Anti-Bribery and Corruption Adaptive |
Vinci Works |
| Anti-Bribery Fundamentals |
Vinci Works |
| Anti-Bribery Global |
Vinci Works |
| Anti-Bribery: The Basics |
Vinci Works |
| Anti-Money Laundering Adaptive |
Vinci Works |
| Anti-Money Laundering Advanced (Non-Regulated Business) |
Vinci Works |
| Anti-Money Laundering Advanced (Regulated Business) |
Vinci Works |
| Anti-Money Laundering Fundamentals (Non-Regulated Business) |
Vinci Works |
| Anti-Money Laundering Fundamentals (Regulated Business) |
Vinci Works |
| Anti-Money Laundering: A 30-Minute Refresher |
Vinci Works |
| Business Continuity |
Vinci Works |
| Code of Conduct |
Vinci Works |
| Conflict Resolution: Building Workplace Culture |
Vinci Works |
| Conflicts of Interest in the Workplace: Understand Your Influences |
Vinci Works |
| Criminal Finances Act: A Practical Overview |
Vinci Works |
| Cyber Security: Journey to Safety |
Vinci Works |
| Cyber Security: Practical Applications |
Vinci Works |
| Data (Use and Access) Act 2025: What You Need to Know |
Vinci Works |
| Data Protection Adaptive |
Vinci Works |
| Data Protection: A Global Outlook |
Vinci Works |
| Data Protection: A UK Outlook |
Vinci Works |
| Financial Crime: An Overview of the Core Topic Areas |
Vinci Works |
| Fraud: Failure to Prevent |
Vinci Works |
| Freedom of Information |
Vinci Works |
| GDPR: A Practical Overview |
Vinci Works |
| GDPR: The Basics |
Vinci Works |
| Implementing Reasonable Adjustments |
Vinci Works |
| Information Security: A Practical Overview For Our Business |
Vinci Works |
| Information Security: Background and Best Practice |
Vinci Works |
| Introduction to Information Security |
Vinci Works |
| Modern Slavery: Practical Overview |
Vinci Works |
| Modern Slavery: Practical Steps for Procurement |
Vinci Works |
| PCI DSS Compliance: A Guide for All Staff |
Vinci Works |
| Phishing Awareness |
Vinci Works |
| Records Management |
Vinci Works |
| Sanctions: Know Your Transaction |
Vinci Works |
| Sanctions: Latest Developments (Regulated Business) |
Vinci Works |
| Social Media Awareness |
Vinci Works |
| Supply Chain Due Diligence: Sustainability Essentials |
Vinci Works |
| Tax Evasion: Failure to Prevent |
Vinci Works |
| Understanding Fraud: Identify and Prevent Workplace Fraud |
Vinci Works |
| Understanding Sanctions |
Vinci Works |
| Whistleblowing Adaptive |
Vinci Works |
| Whistleblowing: Understand Your Rights in the UK |
Vinci Works |
|
| Blowing the Whistle |
Maguire Training |
| Corporate Governance |
Maguire Training |
| Corporate Social Responsibility |
Maguire Training |
| Cyber Security 101 |
Maguire Training |
| Fraud Awareness in the Workplace |
Maguire Training |
| General Data Protection Regulation (GDPR) Awareness |
Maguire Training |
| Sexual Harassment in the Workplace |
Maguire Training |
| Sexual Harassment in the Workplace for Employers |
Maguire Training |
| Tackling Bribery within the Workplace |
Maguire Training |
| Tackling Phishing in the Workplace |
Maguire Training |
| The Ethical Implications of Plagiarism |
Maguire Training |
|
| Anti-Bribery and Corruption |
Me Learning |
| Data Protection Law, Definitions and Principles |
Me Learning |
| Disability Awareness |
Me Learning |
| Fighting Fraud in Local Government |
Me Learning |
| Fraud Awareness |
Me Learning |
| Freedom of Information Act |
Me Learning |
| General Data Protection Regulation (GDPR) - Board Training |
Me Learning |
| General Data Protection Regulation (GDPR) - Core for Staff |
Me Learning |
| General Data Protection Regulation (GDPR) - For the HR Professional |
Me Learning |
| General Data Protection Regulation (GDPR) - for the Marketer |
Me Learning |
| General Data Protection Regulation (GDPR) - Foundation Training |
Me Learning |
| General Data Protection Regulation (GDPR) - Practitioner Training |
Me Learning |
| General Data Protection Regulation (GDPR) - Refresher |
Me Learning |
| Information and Cyber Security |
Me Learning |
| Information Governance |
Me Learning |
| Information Governance for Health |
Me Learning |
| Whistleblowing |
Me Learning |
|
| FCA - Why and how the FCA regulates consumer credit firms |
Consumer Credit Compliance |
| Financial Crime - Bribery, Corruption and Money Laundering |
Consumer Credit Compliance |
| General Data Protection Regulation (GDPR) |
Consumer Credit Compliance |
| General Insurance - An overview of the GI marketplace and regulation in the UK |
Consumer Credit Compliance |
| The Consumer Duty |
Consumer Credit Compliance |
| Treating Customers Fairly and the care of Vulnerable Customers |
Consumer Credit Compliance |
|
| Anti-Bribery |
Flick Learning |
| Anti-Money Laundering |
Flick Learning |
| Anti-Terrorist Financing |
Flick Learning |
| Customer Due Diligence |
Flick Learning |
| Cyber Security |
Flick Learning |
| Data Protection and The GDPR |
Flick Learning |
| Data Protection in Education |
Flick Learning |
| Data Protection in Marketing |
Flick Learning |
| Financial Crime |
Flick Learning |
| Fraud Prevention |
Flick Learning |
| Information Security |
Flick Learning |
| Whistleblowing |
Flick Learning |
|
| The Escape Room (Cyber Security Virtual Office Experience) |
Surrey Cyber Security Cluster |
|