Welcome to FPS University! 

FPS University’s award-winning eLearning solutions engage learners and optimize retention. Our best-in-class online compliance courses are created by a team of instructional designers who have more than 60 years of combined eLearning experience. Our experts use the ADDIE model and cinematic creation styles to create courses that appeal to adult learning processes and are optimized for engagement and retention to create immersive, relatable learning experiences. SHRM and HRCI credit available.  

SCORM and LMS options available. All courses are translated into multiple languages

Our robust offerings include:

  • Human Resources Compliance – A wide selection of modules designed to risk-proof employees and to provide decision-makers with invaluable peace of mind.
  • Ethics & Code of Conduct - Help your organization comply with Sarbanes-Oxley (SOX), the Federal Sentencing Guidelines (FSGs), Federal Acquisition Regulation (FAR) amendments, and the Dodd-Frank Act.
  • HIPAA and HITECH – For supervisors and employees of Covered Entities, Business Associates, and Direct Care providers addressing the importance of safeguarding Protected Health Information to reduce your risk of a HIPAA violation.
  • Harassment Prevention Training – Meeting the statutory requirements for California, New York, Illinois and Connecticut as well as all-employee programs for any location.
  • PCI Compliance - Ensure your employees understand what PCI compliance is and what their role is in preventing credit card fraud, which is critical to any business that manages credit card payments.
  • General Data Protection Regulation (GDPR) - The most comprehensive GDPR training available to ensure your employees will be able to recognize situations where the GDPR comes into play and what to do when they encounter data that falls under GDPR.
  • Security Awareness – 48 modules for all employees addressing the ever-evolving threat landscape. This comprehensive and dynamic program covers phishing and other forms of social engineering, malware, password security, mobile security, social media safety, privacy, working remotely, physical security, recognizing and preventing attacks such as tailgating, theft, fraud, vandalism, espionage, and data protection.
  • Data Protection - Addressing laws (including CCPA and FERPA) and how to apply key principles and concepts that help safeguard against common data threats and vulnerabilities.

For more information including pricing, please contact CustomerService@fpSolutions.com.

Want to know when we launch new online training courses? Subscribe to FPS Workplace Insights.

FPS University

  • Phishing Defense Essentials

    Phishing Defense Essentials

    Learn how to stay ahead of hackers and cyber criminals who aim to steal data and insert malicious payloads by learning and applying the best practices outlined in this module. Topics: Anti-Phishing Best Practices

  • Physical Security    

    Physical Security   

    Your personal safety at work is of paramount importance. This course is designed to teach employees how to protect an organization from criminals, espionage, workplace violence, natural disasters, and other threats. ...

  • Preventing Malware: Mobile Devices

    Preventing Malware: Mobile Devices

    This course acknowledges the commonplace usage of mobile devices at work and explains key vulnerabilities that users must be aware of. By mastering the information presented in this course you will be able to help defend your mobile devices from security...

  • Preventing Retaliation

    Preventing Retaliation

    Employees are protected by law from retaliation for filing an abusive conduct, harassment, or discrimination complaint. Yet, retaliation continues to be one of the most frequently filed charges with the Equal Employment Opportunity Commission (EEOC). In...

  • Privacy and Data Protection

    Privacy and Data Protection

    This course will help employees understand what information is private, why it is private, and what they can do to protect it throughout the data lifecycle, which is the life of a piece of information, whether in paper or digital format, from creation to...

  • Privileged User Security

    Privileged User Security

    Hackers and cybercriminals specifically target privileged users. After all, they have access to an organization’s most prized data. This course will teach privileged users the security best practices they’re expected to follow in order to...

  • Protecting Against Malicious Insiders

    Protecting Against Malicious Insiders

    The threat is real. It’s taking place somewhere, right now. A malicious insider has decided to mount a cyberattack against your organization from the inside out. This malicious insider will stop at nothing to get the data they need to commit theft,...

  • Protecting Against Spear Phishers

    Protecting Against Spear Phishers

    Spear phishing attacks target individuals with highly tailored emails that appears to be coming from a co-work or someone they know and trust, making it difficult to avoid opening attachments, clicking on infected links, or replying to attackers with...

  • Protecting Mobile Data and Devices

    Protecting Mobile Data and Devices

    Because today’s smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed...