Welcome to FPS University! 

FPS University’s award-winning eLearning solutions engage learners and optimizes retention. Our best-in-class online compliance courses are created by a team of instructional designers that have more than 60 years of combined eLearning experience. Our experts use the ADDIE model and cinematic creation styles to create courses that appeal to adult learning processes and are optimized for engagement and retention to create immersive, relatable learning experiences.

You can sort by topic, audience or industry on the left, or select specific courses from the thumbnails below. All courses are translated into multiple languages. Click here for the complete list of languages.  Want to know when we launch new online training courses? Click here to subscribe to FPS Workplace Insights.

FPS University

  • Invoice Fraud (BECs and VECs)

    Invoice Fraud (BECs and VECs)

    Using a fake domain that resembles a trusted supplier, a cybercriminal sends a bogus email or an invoice to a target organization. They aim to trick employees into disclosing confidential information and redirecting funds to bank accounts the fraudster...

  • IoT/Home Security

    IoT/Home Security

    Almost anything can be made into a “smart” device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the “Internet of...

  • Lawful Hiring (for Supervisors)

    Lawful Hiring (for Supervisors)

    Hiring the right employee for the job is crucial for any successful organization. The purpose of lawful hiring is to ensure the recruiting process is conducted in a lawful, consistent way. This course provides an overview of the hiring process, including...

  • Living Mobile Secure

    Living Mobile Secure

    Attacks on mobile devices, mobile apps, and mobile carriers are rising fast. How can you ensure your device is secure? What happens if your phone or tablet is breached? Watch this video to learn more about what you can do to help protect yourself from...

  • Managing the Gray Areas

    Managing the Gray Areas

    As a person in a leadership role, you play an important part in addressing inappropriate workplace conduct. By following the laws and policies intended to prevent harassment and discrimination, consistently demonstrating the highest standards of conduct,...

  • OWASP Top 10 Web Application Vulnerabilities

    OWASP Top 10 Web Application Vulnerabilities

    The Open Web Application Security Project, or OWASP, is a nonprofit foundation that produces a host of resources, including a regularly updated Top Ten, an industry-standard that details current threats that target web applications. This module will...

  • Password Management

    Password Management

    Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This HTML5-based, iPad-compatible password management course uses...

  • Password Strong

    Password Strong

    Passwords are the keys to our digital lives and allow us access to our many personal and work accounts. But how easy would it be for a hacker to crack your password? This video covers tips for creating strong passwords, and how you can protect yourself...

  • PCI Essentials for Account Data Handlers - DSS 4.0

    PCI Essentials for Account Data Handlers - DSS 4.0

    The Payment Card Industry (PCI) Data Security Standard is a set of security standards created by payment card companies (American Express, Discover Financial Services, JCB, MasterCard Worldwide, and Visa International) to help protect against identity...

  • PCI Overview for IT Professionals - DSS 4.0

    PCI Overview for IT Professionals - DSS 4.0

    The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards created by payment card companies (American Express, Discover Financial Services, JCB, MasterCard Worldwide, and Visa International) to help protect against...

  • Phishing    

    Phishing   

    Whether at work or at home, people around the world are inundated with millions of phishing threats every day. And we’ve seen how much damage these can cause, from exposure of people’s private information, to millions of dollars spent to...

  • Phishing Defense Best Practices

    Phishing Defense Best Practices

    Hackers are increasingly targeting individuals by sending emails that appear to come from a trusted source such as a bank, social network, or popular website. These emails include links and attachments that, if clicked, install malicious programs that...