Feature availability: General Security Awareness training is included with all Vanta plans. Additional training categories are unlocked based on the frameworks enabled in your account. Training videos are not available as standalone add-ons.
Regular training helps organizations maintain compliance while reinforcing a strong culture of security and privacy. Vanta's security and privacy training library includes on-demand videos developed by our in-house security, privacy, and compliance experts. These trainings support key frameworks, helping ensure employees understand essential security and regulatory principles. The training categories available to you depend on the frameworks enabled in your Vanta account.
Training per framework
To explore additional frameworks, visit the Frameworks page in your Vanta account and open the Available tab to browse options or to schedule a call with a Vanta team member.
Training | Frameworks |
General Security Awareness |
|
AI Risk |
|
CCPA |
|
GDPR |
|
HIPAA |
|
Insider Threat |
|
PCI DSS |
|
Secure Code |
|
Social Engineering |
|
Training topics
Vanta’s training videos are developed by our in-house security, privacy, and compliance experts to help employees understand essential security and regulatory principles. The content is designed to be clear and practical, supporting a strong culture of security and privacy across your organization.
General Security Awareness
General Security Awareness
Reporting suspicious activity
Protecting your accounts
Passwords and passphrases
Password managers
Multi-factor authentication (MFA)
Common attacks
SIM swapping
Credential stuffing
Malware
Ransomware
Social engineering
Phishing
Patterns and tactics
Social media best practices
Reporting suspicious messages
Protecting your devices
Screen locking
Biometrics and passcodes
Device updates
Protecting sensitive information
Principle of least privilege
Secure data handling
Office security and remote work
Whiteboard hygiene
Clean desk best practices
Secure document handling and disposal
Remote work best practices
AI Risk
AI Risk
AI overview
Emerging laws and regulations
Key definitions
Machine learning
Neural networks
Deep learning
Workplace applications
AI risk and context
Context and data
Potential for harmful impacts
Unintended harms
Intentional abuses
Examples of risks
Data poisoning
Tampering or exploitation
Principles to follow
Industry frameworks and resources
NIST AI RMF
ISO 42001
OWASP AI Privacy and Security Guide
CCPA
CCPA
CCPA and CPRA Overview
CPRA applicability
Personally Identifiable Information PII)
Sensitive Personal Information (SPI)
Consumers
Consumer privacy rights
Right to know
Right to delete personal information
Right to opt out of sale or sharing of personal information
Right to non-discrimination
Privacy policy requirements
Consent preferences
Opt out of sale of consumer data
Global opt-out mechanism
Do not sell my personal information
Do not share my personal information
Opt-out for minors between 13-16 years old
Consent from parent or guardian for children
Receiving and reviewing CPRA requests
Requirements
Response time
Verification procedures
Fraudulent requests
Requirements and reasonable security
Maintaining CPRA compliance records
GDPR
GDPR
GDPR overview
Key GDPR definitions
Data controllers
Processors
Data subjects
Personal data
Special categories of personal information
Data Protection Impact Assessments
Privacy by Design
Key principles of GDPR
Lawfulness, fairness, and transparency
Purpose limitation
Data minimization
Accuracy
Storage limitation
Integrity and confidentiality
Accountability
Records of Processing Activity (ROPA)
Criteria for processing personal information
Consent
Protect vital interests
Legitimate interest
GDPR data rights for individuals
Right to be informed
Right of access
Right to rectification
Right to erasure
Right to restrict processing
Right to data portability
Right to object
Right to object to automated processing
Data Subject Access Request
Regulated response time
Verification of requests
Data Protection Officer (DPO)
GDPR reporting requirements and fines
HIPAA
HIPAA
HIPAA Overview
Key HIPAA definitions
Covered entities and business associates
Business Associate Agreement
Personally Identifiable Information (PII)
Protected Health Information (PHI)
HIPAA Patient Rights
HIPAA Privacy Rule
Threats to patient data
Securing patient data and sensitive information
How to protect PII and PHI
Verification and confirming authorization
Security best practices
Removable media
Data handling policies
Reporting potential incidents
HIPAA violations and consequences
Insider Threat
Insider Threat
Insider threat overview
Key definitions
Intentional and malicious threats
Fraud
Workplace harassment and violence
Leaks of sensitive information
Intentional sabotage
Theft
Security incidents
Data manipulation
Malware
Behavioral changes and situations
Complacency and negligence
Ignoring security and IT updates
Misplacing sensitive information
Ignoring secure processes and systems
Accidental disclosure and impact
Reporting suspicious incidents
Protecting sensitive information
Principle of least privilege
Sharing and level of access
Best practices for sharing sensitive information
PCI DSS
PCI DSS
PCI DSS overview
Key PCI definitions
Cardholder data
Data breaches and financial motivation
Principles for safeguarding cardholder data
Protecting your online accounts
Passwords and passphrases
Password managers
Entering credit card numbers
Secure disposal
Safeguarding payment devices
Tamper checks
Protecting payment information
Confidentiality
Office security best practices
PCI DSS compliance requirements and violations
Reporting potential incidents
Secure Code
Secure Code
Secure code training overview
Guidelines and examples for secure coding
Principles for secure software design
Secure Software Development Lifecycle (SSDLC)
Threat modeling
Organizational policies
OWASP Top 10
Additional resources
Social Engineering
Social Engineering
Social engineering overview
Social media best practices
Phishing
Reporting suspicious incidents
Recognizing patterns and tactics used
Urgency
Fear
Greed
Curiosity
Helpfulness
Time pressure
Previewing a training
When you use Vanta’s built-in training videos, they're housed directly within the Vanta platform, where employees can view and complete them from their onboarding page. Once assigned, employees must watch the video in full before the task is automatically marked complete. Vanta’s training videos follow a standardized format and they aren't customizable.
These videos are automatically mapped to your Vanta account's appropriate compliance and security controls based on the frameworks you have enabled.
To preview a training video available in your account:
In the Personnel section of your account, open the People page.
Click the Groups tab and open any group.
In the Tasks tab, click Trainings.
In the Manage trainings modal, turn on a training category and select Vanta as the training source.
Click the ••• menu and select ✎ Edit to preview the video.
Click Cancel to close the modals without making changes.
When you assign trainings to personnel, you can choose your training source—including Vanta’s built-in videos, a supported integration, or custom training content.

