Welcome to FPS University! 

FPS University’s award-winning eLearning solutions engage learners and optimizes retention. Our best-in-class online compliance courses are created by a team of instructional designers that have more than 60 years of combined eLearning experience. Our experts use the ADDIE model and cinematic creation styles to create courses that appeal to adult learning processes and are optimized for engagement and retention to create immersive, relatable learning experiences.

You can sort by topic, audience or industry on the left, or select specific courses from the thumbnails below. All courses are translated into multiple languages. Click here for the complete list of languages.  Want to know when we launch new online training courses? Click here to subscribe to FPS Workplace Insights.

FPS University

  • Gender and Sexual Orientation

    Gender and Sexual Orientation

    This course uses interactive video to provide learners with real-world examples of how to foster and maintain a respectful work environment, free of harassment, sexual harassment, and discrimination. To help achieve such a work environment, we have...

  • Global Anti-Bribery & Corruption

    Global Anti-Bribery & Corruption

    Doing business globally requires compliance with international laws and conventions such as the U.S. Foreign Corrupt Practices Act, the UK Bribery Act, the OECD Anti-Bribery Convention, and other laws and conventions. This course covers anti-corruption...

  • Global Anti-Harassment (All Employees)

    Global Anti-Harassment (All Employees)

    This global harassment course uses interactive video to provide learners with real-world examples of how to foster and maintain a respectful work environment. To help achieve such a work environment, we have designed this course to teach learners how to...

  • Global Anti-Harassment (Supervisors)

    Global Anti-Harassment (Supervisors)

    Supervisors play an important role in ensuring harassment, discrimination, and retaliation policies are enforced and that all employees are demonstrating high standards of conduct at all times. This course uses interactive video to provide real-world...

  • Handling Complaints for Supervisors

    Handling Complaints for Supervisors

    When a diverse group of individuals interact with one another in the workplace, conflicts are bound to occur, and employee complaints are virtually inevitable. In this course, supervisors will learn how to effectively recognize, respond to, and report...

  • HIPAA & HITECH Privacy for Business Associates

    HIPAA & HITECH Privacy for Business Associates

    Training employees to safeguard Protected Health Information (PHI) is a requirement of all “business associates” based on the Health Insurance Portability and Accountability Act (HIPAA), as amended by the HITECH Act. This privacy course is...

  • HIPAA & HITECH Privacy for Covered Entities

    HIPAA & HITECH Privacy for Covered Entities

    Training employees to safeguard Protected Health Information (PHI) is a requirement of all “covered entities” based on the Health Insurance Portability and Accountability Act of 1996, as amended by the HITECH Act. This privacy course is...

  • Home Cybersecurity

    Home Cybersecurity

    Securing your home Internet experience can be like steering a ship through stormy seas. Inspired eLearning can help you navigate the perils of securing your home network. The trick is to make sure that you Isolate, Update and Defend. Watch this video to...

  • Home Invasion: The Internet of Terrors?

    Home Invasion: The Internet of Terrors?

    It is projected that by 2025, there will be over 75 billion “things” connected to the Internet, otherwise known as the Internet of Things (IoT). Such massive connectivity will make life much more convenient for you, but potentially for...

  • How to Comply With the GDPR in the US

    How to Comply With the GDPR in the US

    The General Data Protection Regulation, or GDPR, contains principles for protecting the privacy of EU residents’ personal data. Every organization, worldwide, that gathers, stores, or processes this data in any way, must comply with the strong data...

  • How to Defeat Social Engineers

    How to Defeat Social Engineers

    Social engineers use deception to manipulate people into divulging confidential or personal information that may be used for fraudulent purposes. And you could be their next target. Protect yourself from a social engineering attack by applying the...

  • Incident Reporting    

    Incident Reporting   

    Reporting incidents of suspicious activity and the loss of assets or sensitive information is extremely important. In this module, employees will learn about common physical and information security incidents that should be reported and how to report...