Welcome to FPS University! 

FPS University’s award-winning eLearning solutions engage learners and optimizes retention. Our best-in-class online compliance courses are created by a team of instructional designers that have more than 60 years of combined eLearning experience. Our experts use the ADDIE model and cinematic creation styles to create courses that appeal to adult learning processes and are optimized for engagement and retention to create immersive, relatable learning experiences.

You can sort by topic, audience or industry on the left, or select specific courses from the thumbnails below. All courses are translated into multiple languages. Click here for the complete list of languages.  Want to know when we launch new online training courses? Click here to subscribe to FPS Workplace Insights.

FPS University

  • Abusive Conduct

    Abusive Conduct

    A great way to help promote a respectful work environment is to promptly address any occurrence of inappropriate behavior before it rises to a level of abusive conduct. Therefore, we designed this module to teach you how to recognize and manage instances...

  • Active Shooter

    Active Shooter

    This course provides important, clear instructions on what you should do in the unlikely event you find yourself in an active shooter situation. Knowing the proper procedures to follow during an emergency could mean the difference between life and death...

  • An Introduction to Insider Threats

    An Introduction to Insider Threats

    Across the globe, organizations spend countless hours working to keep sensitive data out of the hands of cybercriminals. This task has become even more difficult to manage due to an increasing number of data compromises that stem from insider threats...

  • Before You Post

    Before You Post

    Meet Bob. He’s ready to take some much-needed vacation time. Before he starts his week-long adventure, he leaves a quick post on Facebook. Unfortunately, when Bob returns home, he finds that things are not quite the same. Watch this video to find...

  • Being Proactive

    Being Proactive

    Employees are more likely to bring their concerns about inappropriate conduct to your attention if they trust there will be an immediate follow-up to stop the behavior. This module was designed to show leaders just like you how being proactive can help...

  • California Consumer Privacy Act (CCPA) Essentials

    California Consumer Privacy Act (CCPA) Essentials

    The California Consumer Privacy Act, or CCPA, has created many new individual consumer rights as well as responsibilities with which businesses must now comply. When it takes effect in January 2020, every business that gathers and sells California...

  • Cloud Security

    Cloud Security

    Cloud-based services offer incredible convenience and can help people be more productive, especially while on the go. But they also create new security challenges, because the security of any information stored on the cloud is only as good as the...

  • Combating Sexual Harassment

    Combating Sexual Harassment

    All employees play an important role in combating sexual harassment in the workplace. By following the laws and policies intended to prevent sexual harassment, consistently demonstrating the highest standards of conduct, and applying what you learn from...

  • Conducting a Lawful Interview (for All Employees)

    Conducting a Lawful Interview (for All Employees)

    The purpose of conducting an interview is to gather information about a candidate’s work experience and qualifications in an effort to determine if the candidate is the best fit for a position within an organization. The questions that can be asked...

  • Deepfakes


    What do you get when you mix publicly available media with technology such as machine learning? Well, cybercriminals are using this recipe to defraud victims, assist in their social engineering efforts, generate fake news, and spread false information...

  • Defending Against Ransomware 

    Defending Against Ransomware 

    Ransomware is malicious software that prevents or restricts users from accessing computer systems or files until a ransom is paid. Computers typically become infected by ransomware when the user clicks on a malicious link or opens an infected attachment...