D25

Welcome to Drive25

Interactive cyber awareness training scenarios

Interactive Training Series

Phishing Awareness
BeginnerEmail SecurityMost Popular

Phishing Awareness

Learn to identify and defend against various phishing attacks targeting your information.

35 min5 episodes
Social Engineering Defense
IntermediateHuman Factor

Social Engineering Defense

Develop skills to recognize and protect against manipulation tactics used by attackers.

50 min2 episodes
Secure Credentials
PREMIUM
BeginnerEssential

Secure Credentials

Master the art of creating and managing strong, secure passwords and authentication methods.

20 min1 episode
Data Protection
Coming Soon
AdvancedPrivacy

Data Protection

Discover methods to secure your personal data and minimize your digital footprint.

30 min1 episode
Ransomware Defense
Coming Soon
AdvancedComing Soon

Ransomware Defense

Learn how to protect your organization from devastating ransomware attacks and data encryption.

193 min0 episodes

Continue Learning

Impersonation Defense
IntermediateSocial Engineering

Impersonation Defense

Discover techniques to verify identities and protect against social engineering attacks.

90/100
4/5
25 min
Password Fortress
BeginnerPassword Security

Password Fortress

Master the art of creating and managing secure passwords that are both strong and memorable.

40/100
1/5
20 min

Popular Scenarios

Email Deception
BeginnerPhishing

Email Deception

Learn to identify suspicious emails and phishing attempts from seemingly legitimate sources.

85/100
3/5
15 min
URL Analysis
IntermediatePhishing

URL Analysis

Learn to identify suspicious URLs and website clones designed to steal your information.

70/100
2/5
20 min
Attachment Dangers
BeginnerPhishing

Attachment Dangers

Identify risky email attachments and learn safe handling practices to prevent malware infection.

15 min
Need 80+
Score 80+ on previous scenario to unlock
Current score: 70/100
Social Media Phishing
IntermediatePhishing

Social Media Phishing

Recognize and avoid increasingly common phishing tactics targeting social media users.

18 min
Locked
Complete the previous scenario first
Spear Phishing Defense
AdvancedPhishing

Spear Phishing Defense

Learn to identify and protect against highly targeted phishing attacks customized to specific individuals.

25 min
Locked
Complete the previous scenario first
Impersonation Defense
IntermediateSocial Engineering

Impersonation Defense

Discover techniques to verify identities and protect against social engineering attacks.

90/100
4/5
25 min