Handling Customer Card Payments Securely |
Direction Training |
Handling Personal Data at Work |
Direction Training |
Licensing Awareness for Operational Staff |
Direction Training |
|
Accident Reporting Training |
iAM Learning |
AI and GDPR |
iAM Learning |
Anti-Bribery and Corruption |
iAM Learning |
Choosing the Right Cloud Vendor |
iAM Learning |
Competition Law |
iAM Learning |
Consumer Duty |
iAM Learning |
Control of Contractors |
iAM Learning |
Corporate Social Responsibility |
iAM Learning |
Cyber Protection & Infection Control |
iAM Learning |
Data Breaches |
iAM Learning |
Data Handling (Best Practices) |
iAM Learning |
Dealing with Terrorism Threats |
iAM Learning |
Denial of Service Attack |
iAM Learning |
Disaster Recovery |
iAM Learning |
Email Security |
iAM Learning |
GDPR Guru |
iAM Learning |
GDPR Overview |
iAM Learning |
Good Governance and anti-money laundering |
iAM Learning |
Helping People Stay Safe Online |
iAM Learning |
Insider Dealing |
iAM Learning |
Life in the Cloud |
iAM Learning |
Modern Slavery |
iAM Learning |
PCI - DSS |
iAM Learning |
Phishing |
iAM Learning |
Protecting Your Personal Data |
iAM Learning |
Ransomware |
iAM Learning |
Selling Age Restricted Products |
iAM Learning |
Spoofing Attacks |
iAM Learning |
Staying Safe Online |
iAM Learning |
Stolen Devices |
iAM Learning |
Subject Access Requests |
iAM Learning |
The Importance of Insurance |
iAM Learning |
The Internet of Things |
iAM Learning |
The Role of Data Protection Officers |
iAM Learning |
Using a Strong Password |
iAM Learning |
Viruses and Malware |
iAM Learning |
Whistleblowing |
iAM Learning |
Whistleblowing (Safeguarding) |
iAM Learning |
Whistleblowing in Schools |
iAM Learning |
Wi-Fi Security |
iAM Learning |
Workplace Inspections |
iAM Learning |
|
Confidentiality in the workplace |
20-20-Learning |
Cyber Security and You |
20-20-Learning |
Responsible Use of Social Media |
20-20-Learning |
|
Social Engineering Fraud |
Pearltech |
|
Cyber Security Awareness |
My Learning Cloud |
Cyber Security Awareness (Managers) |
My Learning Cloud |
Document and Record Keeping (Managers) |
My Learning Cloud |
General Data Protection Regulation (GDPR) |
My Learning Cloud |
Protecting Personal Information |
My Learning Cloud |
|
Anti-Bribery and Anti-Corruption |
Succeed Technologies |
Anti-Money Laundering |
Succeed Technologies |
FERPA Compliance Training - Eligible Student |
Succeed Technologies |
FERPA Compliance Training - Non - Eligible Student |
Succeed Technologies |
GDPR Data Protection Awareness |
Succeed Technologies |
HIPPA Compliance Training |
Succeed Technologies |
Information Security Awareness |
Succeed Technologies |
ISO 27001 Compliance Training |
Succeed Technologies |
Preventing Facilitation of Tax Evasion |
Succeed Technologies |
|
Compliance & Data Protection |
Qube Vision |
Data Reporting |
Qube Vision |
|
|
Bullying and Harassment |
Kallidus |
Competition Law |
Kallidus |
Criminal Finances Act |
Kallidus |
Cyber Security and Phishing |
Kallidus |
Discipline and Grievance |
Kallidus |
Drugs and Alcohol Misuse |
Kallidus |
Essential Digital Skills |
Kallidus |
Freedom of Information Act |
Kallidus |
General Data Protection Regulation (GDPR) Essentials |
Kallidus |
General Data Protection Regulation (GDPR) for non-EU businesses |
Kallidus |
General Data Protection Regulation (GDPR) UK |
Kallidus |
Information Security - GDPR |
Kallidus |
International Fraud, Bribery, and Corruption |
Kallidus |
Modern Slavery |
Kallidus |
Payment Card Industry Data Security Standards (PCI DSS) |
Kallidus |
Preventing Bribery in Business |
Kallidus |
Preventing Bribery in Business (Essentials) |
Kallidus |
Preventing Bribery in Business (Managers) |
Kallidus |
Preventing Bribery in Business (Overseas) |
Kallidus |
Preventing Money Laundering |
Kallidus |
Preventing Money Laundering (Essentials) |
Kallidus |
Right to Work |
Kallidus |
The EU and UK GDPRs |
Kallidus |
Whistleblowing |
Kallidus |
|
Bribery Act 2010 |
Jenison |
Dangerous Substances |
Jenison |
Data Protection |
Jenison |
|
Code of Conduct |
Nexefy |
Cyber Security: Protect Yourself Online & Offline |
Nexefy |
So You Want to Manage a Code of Conduct Breach |
Nexefy |
So You want to refresh your Code of Conduct knowledge |
Nexefy |
So you want to stay safe on social media |
Nexefy |
The Internet of Things: Connecting the World |
Nexefy |
|
Anti-Money Laundering |
Learner Bubble |
Bribery and Corruption |
Learner Bubble |
Competition Law |
Learner Bubble |
Conduct Risk |
Learner Bubble |
Conflicts of Interest |
Learner Bubble |
Consumer Credit Regulations |
Learner Bubble |
Consumer Duty - Advanced |
Learner Bubble |
Consumer Duty - Essentials |
Learner Bubble |
Criminal Finances Act 2017 |
Learner Bubble |
Data Protection Act 2018 |
Learner Bubble |
Data Protection Impact Assessment |
Learner Bubble |
Financial Crime |
Learner Bubble |
Fraud Prevention |
Learner Bubble |
GDPR for Managers |
Learner Bubble |
General Data Protection Regulation |
Learner Bubble |
Information Security and Mobile Devices |
Learner Bubble |
Information Security for Managers |
Learner Bubble |
Information Security Suite |
Learner Bubble |
Insider Dealing |
Learner Bubble |
IT Social Engineering |
Learner Bubble |
Market Abuse |
Learner Bubble |
Modern Slavery |
Learner Bubble |
Password Security |
Learner Bubble |
Payment Card Information Data Security Standards (PCI DSS) |
Learner Bubble |
Phishing Emails |
Learner Bubble |
Protection from Malware |
Learner Bubble |
Senior Managers and Certification Regime |
Learner Bubble |
Social Media at Work |
Learner Bubble |
Social Networking |
Learner Bubble |
Surfing the Web |
Learner Bubble |
The Digital Personal Data Protection (DPDP) Act, 2023 |
Learner Bubble |
The Failure to Prevent Fraud offence |
Learner Bubble |
The Failure to Prevent Fraud offence (for managers) |
Learner Bubble |
Treating Customers Fairly |
Learner Bubble |
Whistleblowing |
Learner Bubble |
|
AML CTF CPF Introduction |
Marbral Advisory |
Cyber Security Awareness with Deep Fakes |
Marbral Advisory |
GDPR Awareness (Channel Islands) |
Marbral Advisory |
Introduction to Sanctions in UK and Channel Islands |
Marbral Advisory |
Introduction to the General Data Protection Regulation UK |
Marbral Advisory |
|
An Introduction to Anti-Money Laundering |
The Learning Rooms |
Being an Active Bystander at Work |
The Learning Rooms |
Cybersecurity |
The Learning Rooms |
Information Security |
The Learning Rooms |
Introduction to GDPR in the Workplace |
The Learning Rooms |
Policies & Procedures |
The Learning Rooms |
|
|
Common Types of Attack |
Assemble You |
High-Performance Culture |
Assemble You |
Introduction to Cultural Nuances |
Assemble You |
Introduction to Malware |
Assemble You |
Introduction to Sexual Harassment |
Assemble You |
Introduction to Social Engineering |
Assemble You |
Using and Managing Passwords |
Assemble You |
|
Cybersecurity Awareness Essentials: Protect your Digital Realm |
Simon Sez IT |
Cybersecurity Essentials: Stay Safe and Secure Online |
Simon Sez IT |
Generative AI and Cybersecurity |
Simon Sez IT |
|
Anti-Money Laundering |
Access Group |
Anti-Money Laundering for Law Firms |
Access Group |
Anti-Money Laundering for Regulated Business |
Access Group |
Anti-Money Laundering for Support Staff |
Access Group |
Avoiding Bribery Risks for Business |
Access Group |
Bribery Act Refresher |
Access Group |
Budgeting Basics |
Access Group |
Bullying and Harassment, Including Sexual Harassment |
Access Group |
Clinical Governance |
Access Group |
Combatting Market Abuse |
Access Group |
Competition Law |
Access Group |
Compliance with the Criminal Finances Act 2017 |
Access Group |
Cyber Security |
Access Group |
Cyber Security Training Bundle |
Access Group |
Data Protection in the EU |
Access Group |
Data Protection UK |
Access Group |
Data Protection UK including GDPR |
Access Group |
Fair Treatment of Customers |
Access Group |
Finance for Non-Financial Managers |
Access Group |
Fraud Awareness |
Access Group |
Freedom of Information |
Access Group |
Handling data |
Access Group |
Information Security |
Access Group |
Malware attack |
Access Group |
Modern Slavery |
Access Group |
Passwords and authentication |
Access Group |
Payment Card Industry (PCI) Awareness |
Access Group |
Phishing |
Access Group |
Prevent |
Access Group |
Preventing Radicalisation and Extremism |
Access Group |
Professional Boundaries |
Access Group |
Protecting your business from cyber attacks |
Access Group |
Record Keeping |
Access Group |
Reporting cybercrime |
Access Group |
Responding to a cyber attack |
Access Group |
Return to Work |
Access Group |
Safe device use |
Access Group |
Safer Recruitment |
Access Group |
Staying safe online |
Access Group |
UK Data Protection for Managers |
Access Group |
Whaling attack |
Access Group |
Whistleblowing |
Access Group |
Whistleblowing (Refresher) |
Access Group |
Whistleblowing with confidence |
Access Group |
Workplace Security |
Access Group |
|
Cybersecurity Best Practices |
Jeff Havens Company |
Cybersecurity Essentials |
Jeff Havens Company |
|
End User Cybersecurity Fundamentals |
Framework Tech |
Phishing Prevention: Secure Your Digital Life |
Framework Tech |
|
Anti-Money Laundering |
Ultima |
AntiBribery and Corruption |
Ultima |
Data Protection |
Ultima |
Distributed Working |
Ultima |
Incident Response |
Ultima |
ISO 9001 |
Ultima |
Online Safety |
Ultima |
Passwords |
Ultima |
PCI DSS |
Ultima |
Phishing |
Ultima |
Physical Security |
Ultima |
Security Essentials |
Ultima |
Social Engineering |
Ultima |
Telephone Attacks |
Ultima |
|
Compliance: Establish A Code Of Conduct To Mitigate Legal Risk And Foster A Positive Company Culture |
The Expert Academy |
Compliance: Establish Anti-Bribery And Corruption Guidelines To Mitigate Legal Risks |
The Expert Academy |
Compliance: Establish Ethical Whistleblower Policies And Reporting Mechanisms To Combat Fraud |
The Expert Academy |
Compliance: Navigate The Ever-Evolving Regulatory Landscape To Achieve Excellence |
The Expert Academy |
Cybersecurity: Defend Your Business From Hackers And Protect Your Data To Stay Safe Online |
The Expert Academy |
Cybersecurity: Detect And Defend Your Organisation From Phishing Attacks |
The Expert Academy |
Cybersecurity: Implement Data Protection Best Practices To Safeguard Consumer Privacy |
The Expert Academy |
Prevent Sexual Harassment To Foster A Safe And Respectful Workplace Culture |
The Expert Academy |
Understand All Types Of Workplace Harassment And Implement Policies To Ensure Employee Safety |
The Expert Academy |
|
Addressing Sexual Harassment in the Workplace: Creating a Safe and Respectful Environment |
Mint Interactive |
Anti-Bribery Essentials: Identifying, Preventing, and Managing Bribery Risks |
Mint Interactive |
Combatting Modern Slavery and Human Trafficking: Awareness, Identification, and Reporting |
Mint Interactive |
Cyber and Data Security: A Comprehensive Overview to Keep Your Data Safe |
Mint Interactive |
Empowering Consumers: An Introduction to FCA's New Consumer Duty and Financial Regulation |
Mint Interactive |
Mastering GDPR Compliance: An Introduction for Beginners |
Mint Interactive |
Safeguarding within organisations with PREVENT |
Mint Interactive |
|
Bullying and Harassment in the Workplace |
Embrace Resilience |
Data Protection and the UK GDPR |
Embrace Resilience |
General Data Protection Regulation (GDPR) |
Embrace Resilience |
|
Unconscious Bias |
Mindscaling |
|
Cyber Security: Email Security |
Real Projects |
Cyber Security: Keeping your Laptop Safe and Secure |
Real Projects |
Cyber Security: Top Tips |
Real Projects |
Cyber Security: Using Your Mobile Device Safe and Securely |
Real Projects |
How To Keep Confidential Information Secure |
Real Projects |
Information Security: Email Security |
Real Projects |
Information Security: Malware and Viruses |
Real Projects |
Information Security: Passwords |
Real Projects |
Information Security: Phishing |
Real Projects |
Information Security: Social Engineering Attacks |
Real Projects |
Information Security: Staying Safe Online |
Real Projects |
Information Security: Text-Based Phishing |
Real Projects |
Information Security: What Are Malicious Macros |
Real Projects |
Introduction to Data Security |
Real Projects |
Keeping Digital Information Secure When Travelling |
Real Projects |
Situational Awareness |
Real Projects |
Travel Security: Air Travel |
Real Projects |
Travel Security: During your Trip |
Real Projects |
Travel Security: Preparing for your Trip |
Real Projects |
Travel Security: The Traveller’s Short Guide to Safety and Wellbeing |
Real Projects |
Traveling for work: Air Travel |
Real Projects |
Travelling for Work: Conferences & Exhibitions |
Real Projects |
Travelling for Work: Situational Awareness |
Real Projects |
What is Cloud Computing? |
Real Projects |
Workplace Security: Introduction to Access Control |
Real Projects |
|
Anti - Bribery & Corruption |
First Health and Safety |
Anti-Money Laundering |
First Health and Safety |
GDPR and Data Protection |
First Health and Safety |
Information Security |
First Health and Safety |
Modern Slavery |
First Health and Safety |
Phishing Malware and Online Security |
First Health and Safety |
Whistleblowing |
First Health and Safety |
|
Anti Sexual Harassment Training |
Talent Quest |
Anti Workplace Harassment Training: Part 1 |
Talent Quest |
Anti Workplace Harassment Training: Part 2 |
Talent Quest |
Dealing with Active Shooters |
Talent Quest |
Dealing with Bomb and Arson Threats in your Workplace |
Talent Quest |
Effects of workplace politics |
Talent Quest |
How to Protect Yourself from Cyber Security Threats |
Talent Quest |
|
Code of Conduct |
Vinci Works |
Supply Chain Due Diligence |
Vinci Works |
|
Alcohol and Drug Awareness |
Open eLMS |
Alcohol Awareness for Managers |
Open eLMS |
Amphetamine Awareness for Managers |
Open eLMS |
Anti Money Laundering Introduction |
Open eLMS |
Anti Money Laundering Regulated Activities |
Open eLMS |
Anti Social Behaviour for Community Safety Officers |
Open eLMS |
Anti Social Behaviour for General Employees |
Open eLMS |
Bribery Act |
Open eLMS |
Cannabis Awareness for Managers |
Open eLMS |
Cocaine Awareness for Managers |
Open eLMS |
Data Protection |
Open eLMS |
Drugs and Young People |
Open eLMS |
Ecstasy Awareness for Managers |
Open eLMS |
GDPR Awareness |
Open eLMS |
GDPR Customer Service |
Open eLMS |
General Security |
Open eLMS |
Heroin Awareness for Managers |
Open eLMS |
Implementing the GDPR |
Open eLMS |
ISO 14001 Environmental Management Systems |
Open eLMS |
ISO 27001 Information Security Management Systems |
Open eLMS |
ISO 50001 Energy Management Systems |
Open eLMS |
ISO 9001 Quality Management Systems |
Open eLMS |
ISO Advanced |
Open eLMS |
ISO Beginners |
Open eLMS |
IT Security |
Open eLMS |
Law and Journalism |
Open eLMS |
Legal High Awareness for Managers |
Open eLMS |
Legal Issues Concerning Media Assets |
Open eLMS |
Managing your Digital Footprint |
Open eLMS |
Modern Slavery |
Open eLMS |
Money Laundering |
Open eLMS |
Navigating UK Employment Law Changes |
Open eLMS |
Prevent Strategy |
Open eLMS |
Social Media Usage |
Open eLMS |
Volatile Substances Awareness for Managers |
Open eLMS |
|
Bribery Act Awareness |
CPL Learning |
Disability Awareness |
CPL Learning |
Drink Spiking |
CPL Learning |
GDPR for Hospitality |
CPL Learning |
Money Laundering Awareness |
CPL Learning |
PCI Data Security Standards |
CPL Learning |
Right to Work |
CPL Learning |
|
Advanced Data Protection |
Dynamic Business |
Anti-bribery |
Dynamic Business |
Anti-money Laundering |
Dynamic Business |
Antisocial Behaviour |
Dynamic Business |
Bullying and Harassment |
Dynamic Business |
Competition Law |
Dynamic Business |
Cyber Security |
Dynamic Business |
GDPR |
Dynamic Business |
Information Security |
Dynamic Business |
Mental Capacity Act |
Dynamic Business |
Modern Day Slavery |
Dynamic Business |
Saving Energy |
Dynamic Business |
Tax Evasion Awareness |
Dynamic Business |
Underage Sales |
Dynamic Business |
Waste management (non clinical) |
Dynamic Business |
Whistleblowing |
Dynamic Business |
|
Blowing the Whistle |
Maguire Training |
Corporate Governance |
Maguire Training |
Corporate Social Responsibility |
Maguire Training |
Cyber Security 101 |
Maguire Training |
General Data Protection Regulation (GDPR) Awareness |
Maguire Training |
Sexual Harassment in the Workplace |
Maguire Training |
Sexual Harassment in the Workplace for Employers |
Maguire Training |
Tackling Bribery within the Workplace |
Maguire Training |
Tackling Phishing in the Workplace |
Maguire Training |
The Ethical Implications of Plagiarism |
Maguire Training |
|
Anti-Bribery and Corruption |
Me Learning |
Data Protection Law, Definitions and Principles |
Me Learning |
Disability Awareness |
Me Learning |
Fighting Fraud in Local Government |
Me Learning |
Fraud Awareness |
Me Learning |
Freedom of Information Act |
Me Learning |
General Data Protection Regulation (GDPR) - for the Marketer |
Me Learning |
General Data Protection Regulation - GDPR - Board Training |
Me Learning |
General Data Protection Regulation - GDPR - Core for Staff |
Me Learning |
General Data Protection Regulation - GDPR - For the HR Professional |
Me Learning |
General Data Protection Regulation - GDPR - Foundation Training |
Me Learning |
General Data Protection Regulation - GDPR - Practitioner Training |
Me Learning |
General Data Protection Regulation - GDPR Refresher |
Me Learning |
Information and Cyber Security |
Me Learning |
Information Governance |
Me Learning |
Information Governance for Health |
Me Learning |
Whistleblowing |
Me Learning |
|
FCA - Why and how the FCA regulates consumer credit firms |
Consumer Credit Compliance |
Financial Crime - Bribery, Corruption and Money Laundering |
Consumer Credit Compliance |
General Data Protection Regulation (GDPR) |
Consumer Credit Compliance |
General Insurance - An overview of the GI marketplace and regulation in the UK |
Consumer Credit Compliance |
The Consumer Duty |
Consumer Credit Compliance |
Treating Customers Fairly and the care of Vulnerable Customers |
Consumer Credit Compliance |
|
Anti-Bribery |
Flick Learning |
Anti-Money Laundering |
Flick Learning |
Anti-Terrorist Financing |
Flick Learning |
Customer Due Diligence |
Flick Learning |
Cyber Security |
Flick Learning |
Data Protection and The GDPR |
Flick Learning |
Data Protection in Education |
Flick Learning |
Data Protection in Marketing |
Flick Learning |
Financial Crime |
Flick Learning |
Fraud Prevention |
Flick Learning |
Information Security |
Flick Learning |
Whistleblowing |
Flick Learning |
|