Welcome, Guest

Financial & Data Compliance

Title Publisher
Handling Customer Card Payments Securely Direction Training
Handling Personal Data at Work Direction Training
Licensing Awareness for Operational Staff Direction Training
Title Publisher
Accident Reporting Training iAM Learning
AI and GDPR iAM Learning
Anti-Bribery and Corruption iAM Learning
Choosing the Right Cloud Vendor iAM Learning
Competition Law iAM Learning
Consumer Duty iAM Learning
Control of Contractors iAM Learning
Corporate Social Responsibility iAM Learning
Cyber Protection & Infection Control iAM Learning
Data Breaches iAM Learning
Data Handling (Best Practices) iAM Learning
Dealing with Terrorism Threats iAM Learning
Denial of Service Attack iAM Learning
Disaster Recovery iAM Learning
Email Security iAM Learning
GDPR Guru iAM Learning
GDPR Overview iAM Learning
Good Governance and anti-money laundering iAM Learning
Helping People Stay Safe Online iAM Learning
Insider Dealing iAM Learning
Life in the Cloud iAM Learning
Modern Slavery iAM Learning
PCI - DSS iAM Learning
Phishing iAM Learning
Protecting Your Personal Data iAM Learning
Ransomware iAM Learning
Selling Age Restricted Products iAM Learning
Spoofing Attacks iAM Learning
Staying Safe Online iAM Learning
Stolen Devices iAM Learning
Subject Access Requests iAM Learning
The Importance of Insurance iAM Learning
The Internet of Things iAM Learning
The Role of Data Protection Officers iAM Learning
Using a Strong Password iAM Learning
Viruses and Malware iAM Learning
Whistleblowing iAM Learning
Whistleblowing (Safeguarding) iAM Learning
Wi-Fi Security iAM Learning
Workplace Inspections iAM Learning
Title Publisher
Confidentiality in the workplace 20-20-Learning
Cyber Security and You 20-20-Learning
Responsible Use of Social Media 20-20-Learning
Title Publisher
Social Engineering Fraud Pearltech
Title Publisher
Cyber Security Awareness My Learning Cloud
Cyber Security Awareness (Managers) My Learning Cloud
Document and Record Keeping (Managers) My Learning Cloud
General Data Protection Regulation (GDPR) My Learning Cloud
Protecting Personal Information My Learning Cloud
Title Publisher
Anti-Bribery and Anti-Corruption Succeed Technologies
Anti-Money Laundering Succeed Technologies
FERPA Compliance Training - Eligible Student Succeed Technologies
FERPA Compliance Training - Non - Eligible Student Succeed Technologies
GDPR Data Protection Awareness Succeed Technologies
HIPPA Compliance Training Succeed Technologies
Information Security Awareness Succeed Technologies
ISO 27001 Compliance Training Succeed Technologies
Preventing Facilitation of Tax Evasion Succeed Technologies
Title Publisher
Compliance & Data Protection Qube Vision
Data Reporting Qube Vision

Compliance

Title Publisher
Bullying and Harassment Kallidus
Competition Law Kallidus
Criminal Finances Act Kallidus
Cyber Security and Phishing Kallidus
Discipline and Grievance Kallidus
Drugs and Alcohol Misuse Kallidus
Essential Digital Skills Kallidus
Freedom of Information Act Kallidus
General Data Protection Regulation (GDPR) Essentials Kallidus
General Data Protection Regulation (GDPR) for non-EU businesses Kallidus
General Data Protection Regulation (GDPR) UK Kallidus
Information Security - GDPR Kallidus
International Fraud, Bribery, and Corruption Kallidus
Modern Slavery Kallidus
Payment Card Industry Data Security Standards (PCI DSS) Kallidus
Preventing Bribery in Business Kallidus
Preventing Bribery in Business (Essentials) Kallidus
Preventing Bribery in Business (Managers) Kallidus
Preventing Bribery in Business (Overseas) Kallidus
Preventing Money Laundering Kallidus
Preventing Money Laundering (Essentials) Kallidus
Right to Work Kallidus
The EU and UK GDPRs Kallidus
Whistleblowing Kallidus
Title Publisher
Bribery Act 2010 Jenison
Dangerous Substances Jenison
Data Protection Jenison
Title Publisher
Code of Conduct Nexefy
Cyber Security: Protect Yourself Online & Offline Nexefy
So You Want to Manage a Code of Conduct Breach Nexefy
So You want to refresh your Code of Conduct knowledge Nexefy
So you want to stay safe on social media Nexefy
The Internet of Things: Connecting the World Nexefy
Title Publisher
Anti-Money Laundering Learner Bubble
Bribery and Corruption Learner Bubble
Competition Law Learner Bubble
Conduct Risk Learner Bubble
Conflicts of Interest Learner Bubble
Consumer Credit Regulations Learner Bubble
Consumer Duty - Advanced Learner Bubble
Consumer Duty - Essentials Learner Bubble
Criminal Finances Act 2017 Learner Bubble
Data Protection Act 2018 Learner Bubble
Data Protection Impact Assessment Learner Bubble
Financial Crime Learner Bubble
Fraud Prevention Learner Bubble
GDPR for Managers Learner Bubble
General Data Protection Regulation Learner Bubble
Information Security and Mobile Devices Learner Bubble
Information Security for Managers Learner Bubble
Information Security Suite Learner Bubble
Insider Dealing Learner Bubble
IT Social Engineering Learner Bubble
Market Abuse Learner Bubble
Modern Slavery Learner Bubble
Password Security Learner Bubble
Payment Card Information Data Security Standards (PCI DSS) Learner Bubble
Phishing Emails Learner Bubble
Protection from Malware Learner Bubble
Senior Managers and Certification Regime Learner Bubble
Social Media at Work Learner Bubble
Social Networking Learner Bubble
Surfing the Web Learner Bubble
The Digital Personal Data Protection (DPDP) Act, 2023 Learner Bubble
Treating Customers Fairly Learner Bubble
Whistleblowing Learner Bubble
Title Publisher
AML CTF CPF Introduction Marbral Advisory
Cyber Security Awareness with Deep Fakes Marbral Advisory
GDPR Awareness (Channel Islands) Marbral Advisory
Introduction to Sanctions in UK and Channel Islands Marbral Advisory
Introduction to the General Data Protection Regulation UK Marbral Advisory
Title Publisher
Cybersecurity The Learning Rooms
Information Security The Learning Rooms
Introduction to GDPR in the Workplace The Learning Rooms
Policies & Procedures The Learning Rooms

Compliance

Title Publisher
Common Types of Attack Assemble You
High-Performance Culture Assemble You
Introduction to Cultural Nuances Assemble You
Introduction to Malware Assemble You
Introduction to Sexual Harassment Assemble You
Introduction to Social Engineering Assemble You
Using and Managing Passwords Assemble You
Title Publisher
Cybersecurity Awareness Essentials: Protect your Digital Realm Simon Sez IT
Cybersecurity Essentials: Stay Safe and Secure Online Simon Sez IT
Generative AI and Cybersecurity Simon Sez IT
Title Publisher
Anti-Money Laundering Access Group
Anti-Money Laundering for Law Firms Access Group
Anti-Money Laundering for Regulated Business Access Group
Anti-Money Laundering for Support Staff Access Group
Anti-Slavery Access Group
Avoiding Bribery Risks for Business Access Group
Bribery Act Refresher Access Group
Budgeting Basics Access Group
Bullying and Harassment, Including Sexual Harassment Access Group
Clinical Governance Access Group
Combatting Market Abuse Access Group
Competition Law Access Group
Compliance with the Criminal Finances Act 2017 Access Group
Customer Experience Access Group
Cyber Security Access Group
Cyber Security Training Bundle Access Group
Data Protection in the EU Access Group
Data Protection UK Access Group
Data Protection UK including GDPR Access Group
Fair Treatment of Customers Access Group
Finance for Non-Financial Managers Access Group
Fraud Awareness Access Group
Freedom of Information Access Group
Freedom of Information Act Access Group
Handling data Access Group
Information Security Access Group
Malware attack Access Group
Modern Slavery Access Group
Modern Slavery Act Access Group
Passwords and authentication Access Group
Payment Card Industry (PCI) Awareness Access Group
Phishing Access Group
Prevent Access Group
Professional Boundaries Access Group
Protecting your business from cyber attacks Access Group
Record Keeping Access Group
Reporting cybercrime Access Group
Responding to a cyber attack Access Group
Return to Work Access Group
Safe device use Access Group
Safer Recruitment Access Group
Sexual Harassment Access Group
Staying safe online Access Group
UK Data Protection for Managers Access Group
Whaling attack Access Group
Whistleblowing Access Group
Whistleblowing (Refresher) Access Group
Whistleblowing with confidence Access Group
Workplace Bullying Access Group
Workplace Security Access Group
Title Publisher
Cybersecurity Best Practices Jeff Havens Company
Cybersecurity Essentials Jeff Havens Company
Title Publisher
End User Cybersecurity Fundamentals Framework Tech
Phishing Prevention: Secure Your Digital Life Framework Tech
Title Publisher
Anti-Money Laundering Ultima
AntiBribery and Corruption Ultima
Data Protection Ultima
Distributed Working Ultima
Incident Response Ultima
ISO 9001 Ultima
Online Safety Ultima
Passwords Ultima
PCI DSS Ultima
Phishing Ultima
Physical Security Ultima
Security Essentials Ultima
Social Engineering Ultima
Telephone Attacks Ultima
Title Publisher
Anti Bribery Essential Skillz
Code of Conduct Essential Skillz
Fraud Prevention Essential Skillz
Freedom of Information Essential Skillz
General Data Protection Regulations (GDPR) Essential Skillz
Modern Slavery Essential Skillz
Money Laundering Essential Skillz
Phishing Awareness Essential Skillz
Prevent Duty Essential Skillz
Sexual Harassment (UK) Essential Skillz
Whistleblowing Essential Skillz
Title Publisher
Bullying and Harassment in the Workplace Embrace Resilience
Data Protection and the UK GDPR Embrace Resilience
General Data Protection Regulation (GDPR) Embrace Resilience
Title Publisher
Unconscious Bias Mindscaling
Title Publisher
Cyber Security: Email Security Real Projects
Cyber Security: Keeping your Laptop Safe and Secure Real Projects
Cyber Security: Top Tips Real Projects
Cyber Security: Using Your Mobile Device Safe and Securely Real Projects
How To Keep Confidential Information Secure Real Projects
Information Security: Email Security Real Projects
Information Security: Malware and Viruses Real Projects
Information Security: Passwords Real Projects
Information Security: Phishing Real Projects
Information Security: Social Engineering Attacks Real Projects
Information Security: Staying Safe Online Real Projects
Information Security: Text-Based Phishing Real Projects
Information Security: What Are Malicious Macros Real Projects
Introduction to Data Security Real Projects
Keeping Digital Information Secure When Travelling Real Projects
Situational Awareness Real Projects
Travel Security: Air Travel Real Projects
Travel Security: During your Trip Real Projects
Travel Security: Preparing for your Trip Real Projects
Travel Security: The Traveller’s Short Guide to Safety and Wellbeing Real Projects
Traveling for work: Air Travel Real Projects
Travelling for Work: Conferences & Exhibitions Real Projects
Travelling for Work: Situational Awareness Real Projects
What is Cloud Computing? Real Projects
Workplace Security: Introduction to Access Control Real Projects
Title Publisher
Anti - Bribery & Corruption First Health and Safety
Anti-Money Laundering First Health and Safety
GDPR and Data Protection First Health and Safety
Information Security First Health and Safety
Modern Slavery First Health and Safety
Phishing Malware and Online Security First Health and Safety
Whistleblowing First Health and Safety
Title Publisher
Anti Sexual Harassment Training Talent Quest
Anti Workplace Harassment Training: Part 1 Talent Quest
Anti Workplace Harassment Training: Part 2 Talent Quest
Dealing with Active Shooters Talent Quest
Dealing with Bomb and Arson Threats in your Workplace Talent Quest
Effects of workplace politics Talent Quest
How to Protect Yourself from Cyber Security Threats Talent Quest
Title Publisher
Supply Chain Due Diligence Vinci Works
Title Publisher
Alcohol and Drug Awareness Open eLMS
Alcohol Awareness for Managers Open eLMS
Amphetamine Awareness for Managers Open eLMS
Anti Money Laundering Introduction Open eLMS
Anti Money Laundering Regulated Activities Open eLMS
Anti Social Behaviour for Community Safety Officers Open eLMS
Anti Social Behaviour for General Employees Open eLMS
Bribery Act Open eLMS
Cannabis Awareness for Managers Open eLMS
Cocaine Awareness for Managers Open eLMS
Data Protection Open eLMS
Drugs and Young People Open eLMS
Ecstasy Awareness for Managers Open eLMS
GDPR Awareness Open eLMS
GDPR Customer Service Open eLMS
General Security Open eLMS
Heroin Awareness for Managers Open eLMS
Implementing the GDPR Open eLMS
ISO 14001 Environmental Management Systems Open eLMS
ISO 27001 Information Security Management Systems Open eLMS
ISO 50001 Energy Management Systems Open eLMS
ISO 9001 Quality Management Systems Open eLMS
ISO Advanced Open eLMS
ISO Beginners Open eLMS
IT Security Open eLMS
Law and Journalism Open eLMS
Legal High Awareness for Managers Open eLMS
Legal Issues Concerning Media Assets Open eLMS
Managing your Digital Footprint Open eLMS
Modern Slavery Open eLMS
Money Laundering Open eLMS
Prevent Strategy Open eLMS
Social Media Usage Open eLMS
Volatile Substances Awareness for Managers Open eLMS
Title Publisher
Bribery Act Awareness CPL Learning
Disability Awareness CPL Learning
GDPR for Hospitality CPL Learning
Money Laundering Awareness CPL Learning
PCI Data Security Standards CPL Learning
Right to Work CPL Learning
Title Publisher
Advanced Data Protection Dynamic Business
Anti-bribery Dynamic Business
Anti-money Laundering Dynamic Business
Antisocial Behaviour Dynamic Business
Bullying and Harassment Dynamic Business
Competition Law Dynamic Business
Cyber Security Dynamic Business
GDPR Dynamic Business
Information Security Dynamic Business
Mental Capacity Act Dynamic Business
Modern Day Slavery Dynamic Business
Saving Energy Dynamic Business
Tax Evasion Awareness Dynamic Business
Underage Sales Dynamic Business
Waste management (non clinical) Dynamic Business
Whistleblowing Dynamic Business
Title Publisher
Blowing the Whistle Maguire Training
Corporate Governance Maguire Training
Corporate Social Responsibility Maguire Training
Cyber Security 101 Maguire Training
General Data Protection Regulation (GDPR) Awareness Maguire Training
Tackling Bribery within the Workplace Maguire Training
Title Publisher
Anti-Bribery and Corruption Me Learning
Data Protection Law, Definitions and Principles Me Learning
Disability Awareness Me Learning
Fighting Fraud in Local Government Me Learning
Fraud Awareness Me Learning
Freedom of Information Act Me Learning
General Data Protection Regulation (GDPR) - for the Marketer Me Learning
General Data Protection Regulation - GDPR - Board Training Me Learning
General Data Protection Regulation - GDPR - Core for Staff Me Learning
General Data Protection Regulation - GDPR - For the HR Professional Me Learning
General Data Protection Regulation - GDPR - Foundation Training Me Learning
General Data Protection Regulation - GDPR - Practitioner Training Me Learning
General Data Protection Regulation - GDPR Refresher Me Learning
Information and Cyber Security Me Learning
Information Governance Me Learning
Information Governance for Health Me Learning
Whistleblowing Me Learning
Title Publisher
FCA - Why and how the FCA regulates consumer credit firms Consumer Credit Compliance
Financial Crime - Bribery, Corruption and Money Laundering Consumer Credit Compliance
General Data Protection Regulation (GDPR) Consumer Credit Compliance
General Insurance - An overview of the GI marketplace and regulation in the UK Consumer Credit Compliance
The Consumer Duty Consumer Credit Compliance
Treating Customers Fairly and the care of Vulnerable Customers Consumer Credit Compliance
Title Publisher
Anti-Bribery Flick Learning
Anti-Money Laundering Flick Learning
Anti-Terrorist Financing Flick Learning
Customer Due Diligence Flick Learning
Cyber Security Flick Learning
Data Protection and The GDPR Flick Learning
Data Protection in Education Flick Learning
Data Protection in Marketing Flick Learning
Financial Crime Flick Learning
Fraud Prevention Flick Learning
Information Security Flick Learning
Whistleblowing Flick Learning