Information Security Awareness, Training and Motivation — Native Intelligence, Inc.

eLearning Security Awareness Courses

Welcome to Fabulous Security AwarenessOur security awareness courses are sticky. The content sticks with the learners and they remember more of the key ideas.

Email us for a key to view a demo.

Please use your business email account or indicate which organization you represent.

Two Types of Courses

Flash-Based Security Courses and Stand-Alone Modules

Do you need a highly visual and memorable course? Try out Flash-based, audio-narrated courses and stand-alone modules. These are ready to be hosted on your Learning Management System (LMS) or secure intranet. We can also host these courses for you. Each is designed to entertain and educate about a specific topic, such as email security, protecting information, or security principles.

You can offer your course takers new topics monthly or quarterly - or combine several modules to make a longer course that offers the topics that are most important to you.

HTML Courses

Our interactive HTML-based courses are fully compliant with section 508 of the US Rehabilitation Act. These courses are typically longer than the Flash-based courses, with a greater amount of reference materials. These courses are hosted on our Course Management System.

Hosting

Hosting refers to where the course resides. We offer SCORM-compliant courses for customers who want the course to reside on their LMS.

If you don't have an LMS, we offer hosting. Hosted courses are ideal for organizations:

  • that need to track course completions, but don't have their own Learning Management System
  • that have business partners, contractors, or others who need to take the course, but who do not have access to the client's intranet

Our Credentials

Native Intelligence has delivered more than 1,000,000 seats of Web-based Training (WBT), including courses in English, Japanese, Italian, German, Portuguese, and Spanish. We've provided newsletters in Dutch and Simplified Chinese as well.

Will this course be boring?Our courses are based on learning principles. The courses appeal to learners because they contain interesting and up-to-date material, including real-world stories, analogies, scenarios, and practical actions.

Our course developers and reviewers include published authors of security books and articles. They hold various security certifications, including CISSP and CISA. Two of our course authors had an active role in the development of  the NIST document, "Information Technology Security Training Requirements: A Role- and Performance-Based Model."  This document is for curriculum developers, professional trainers, and IT security professionals.

Two of our course developers have been awarded "Security Educator of the Year" by the Federal Information Systems Security Educators' Association.

Custom Courses

Custom courses are tailored to a client's culture, business type, policies, and other needs.

Customer Feedback

Customer comments - see what people who have taken our courses have to say about them.

Complementary Awareness Materials

You can get newsletters, posters, images, screensavers, calendars, and daily tips here as well to add to your security awareness program.