Phone Icon 0333 323 3981

Contact us

GCHQ Certified E-learning

GCHQ Certified Training - mitigate

Our latest development, mitigate, is certified by the UK Government’s Communications Headquarters, GCHQ, and incorporates easy-to-follow scenario-based e-learning modules.

It is the most cost-effective way to provide as many employees, in a quick and consistent environment, to gain the skills and confidence to achieve “Cyber Trusted Status”.

The mitigate process is designed to reduce internal risks through four simple steps:

  • Institute a suite of clear, strong policies on various aspects of cyber security
  • Access an easy-to-use, engaging e-learning model to train all employees, certified by GCHQ
  • Enforce the policies, as learners sign off on each policy throughout the learning process
  • Manage and audit your employees to maximise the results, record progress and motivate learners

The learner is immersed in a realistic or situational simulation that is inspired by real-life incidents and is asked to follow a storyline, attempt certain tasks and gather skills and knowledge that they will recall for future use.

Twelve bite-size sections, in four simple bundles:

Online Security Training Bundle

Providing the learner with basic tools to ensure all internet usage is safe, knowing how to keep email communications secure and be alerted of the potential risks and share little-known techniques to create truly protected passwords for your various devices and accounts.

Remote Security Training Bundle

Providing the learner with the risks associated with remote devices, in terms of personal equipment, company-provided equipment and how they both interact with any public Wifi network or other networks that could host potential vulnerabilities for the user.

Information Security Training Bundle

Providing the learner with the intermediate skills to manage data and information, through a knowledge of the various level of classification of data, and the respective levels of risk and responsibility surrounding them, as well as how to encrypt and back up data, to mitigate against attacks or human error.

Workstation Security Training Bundle

Providing the learner with the advanced skills to spot potential physical vulnerabilities in their own cyber security at work, understanding what and how to destroy and dispose of in terms of confidential information and to create a vigilance of the threat of attack through social engineering. 


mitigate provides an easy-to-use back-end system which records the progress of each learner, awards successful completion and motivates learners. Motivation is crucial to effective learning and skill building, and the system provides more motivation for policy sign-offs than simply by their mandatory nature.

At the same time, the same back-end system offers administrators the opportunity to get a high-level view of employee progress with respect to completed awareness training, policy sign-offs and adoption, hence putting the company in a more actiove and 'in-control' role in the effort of reinforcing the security posture and culture of the organisation through successful use of policies. 

  • Monitor records of each staff member, ensuring policies are fully up to date and signed
  • Track progress for completion of any outstanding policy
  • Enforce participation for any staff member that exceeds the given time period for completing the training
  • Pass/Fail information on all Assessments
  • Implement as part of a New Starter Induction process


Board/Partner Cyber Security Training

Our strategy for implementing cyber awareness with our training course certified by GCHQ, is 'tone from the top, message from the middle'. This means to set the scene within the upper ranks of management, allowing them to use their depar...

More info

Cyber Security Awareness Training

Awareness training will help you to gain some valuable insight for how to recognise cyber threats and how to proactively protect your business with a series of housekeeping tips to use in the workplace. 

More info

Data Protection Training

To familiarise all members of the workforce with the legal implications with handling, sharing and storing data. The course will demonstrate the regulations that businesses must follow to ensure they are working in line with, and are not at risk of...

More info

Home & Mobile Workers Training

Working away from the office can present further business risks due to the insecurity of the external environment. Our training will provide insight into how to remain protected whilst accessing important data remotely.

More info

Social Engineering Training

Social engineering is defined by the phrase ‘manipulation for information’ and relates to the art of gaining physical access to, or information about the business for personal gain. Businesses face the threat of social engineering daily t...

More info