ISO 42001 Training & Awareness

Teach your key people the ISO 42001 requirements and deliver company-wide AI governance training so employees understand how to manage and use AI systems securely, reliably, and in compliance with your organization’s policies.

ISO 42001 Training & Awareness - Advisera

The quickest route to company-wide training

More than 50 videos explain all aspects of ISO 42001, Artificial Intelligence Management Systems (AIMS), and AI governance — configure your company-wide training program in minutes and enable employees to learn on their own devices.

On the left-hand side, you can see one of the videos from the ISO 42001 Training & Awareness program available in Advisera’s Company Training Academy.

ISO 42001 lessons library

  • What is ISO 42001? (1:21)
    Overview of the ISO 42001 standard for AI governance
    Whole ISO 42001
  • The structure of ISO 42001 (2:42)
    Understand ISO 42001 clauses and annexes for building an effective AIMS
    Whole ISO 42001
  • ISO 42001: General objectives for AI (2:14)
    Learn ISO 42001 Annex C.2 objectives for accountable and fair AI governance
    ISO 42001 Annex C.2
  • ISO 42001: Introduction to the Artificial Intelligence Management System (AIMS) (2:18)
    Explore the structure and purpose of AIMS for systematic AI governance
    Whole ISO 42001
  • Implementation of ISO 42001 according to PDCA cycle (1:18)
    Apply the PDCA cycle to implement and improve an ISO 42001 AIMS
    Whole ISO 42001
  • Implementing ISO 42001 as a project (2:06)
    Manage ISO 42001 implementation as a structured compliance project
    Whole ISO 42001
  • ISO 42001: Documenting the AIMS (3:59)
    Learn ISO 42001 documentation requirements for AI governance and controls
    Whole ISO 42001
  • Benefits of ISO 42001 (1:48)
    Discover organizational, compliance, and ethical benefits of ISO 42001 adoption
    Whole ISO 42001
  • ISO 42001: Related standards and regulations (2:28)
    See how ISO 42001 aligns with ISO 22989, 23894, 42005 and the EU AI Act
    Whole ISO 42001
  • ISO 42001: Explanation of basic AI terminology (3:25)
    Understand ISO 22989 AI concepts and terminology that are important for AI governance
    Whole ISO 42001
  • ISO 42001: Understanding machine learning and its main types (3:19)
    Explore ISO 22989 machine learning types relevant to AI governance
    Whole ISO 42001
  • ISO 42001: Understanding neural networks and their types (3:04)
    Learn how ISO 22989 defines neural network types essential for AI system design
    Whole ISO 42001
  • ISO 42001: Main components of an AI system (1:38)
    Learn what are the functional components of AI systems per ISO 22989
    Whole ISO 42001
  • ISO 42001: AI system life cycle (3:56)
    Understand AI system life cycle stages aligned with ISO 42001 requirements
    Whole ISO 42001
  • ISO 42001: Understanding the organization and its context (2:34)
    Define AI roles, internal and external issues to set the context for your AIMS
    ISO 42001 Clause 4.1
  • ISO 42001: Understanding the needs and expectations of interested parties (1:33)
    Identify stakeholders and their AI governance expectations under ISO 42001
    ISO 42001 Clause 4.2
  • ISO 42001: Determining the scope of the AIMS (1:24)
    Establish and document the boundaries of your AIMS per ISO 42001
    ISO 42001 Clause 4.3
  • ISO 42001: AI management system (1:47)
    Learn to structure and operate an AIMS aligned with ISO 42001 clauses
    ISO 42001 Clause 4.4
  • ISO 42001: Leadership and commitment (1:28)
    Ensure senior management commitment for effective AIMS implementation
    ISO 42001 Clause 5.1
  • ISO 42001: AI policy (2:44)
    Develop and maintain a documented AI policy with elements required by ISO 42001
    ISO 42001 Clause 5.2
  • ISO 42001: Organizational roles, responsibilities, and authorities (2:46)
    Define and communicate AI governance roles and responsibilities
    ISO 42001 Clause 5.3
  • ISO 42001: Resources (1:44)
    Identify and document resources required to operate the AIMS
    ISO 42001 Clause 7.1
  • ISO 42001: Competence (1:40)
    Establish competence requirements and training for AI governance roles
    ISO 42001 Clause 7.2
  • ISO 42001: Awareness (1:26)
    Promote awareness of AI governance and AI responsibilities across the organization
    ISO 42001 Clause 7.3
  • ISO 42001: Communication (1:29)
    Define AI-related internal and external communication requirements
    ISO 42001 Clause 7.4
  • ISO 42001: Documented information (3:33)
    Control AIMS documents and records per ISO 42001 requirements
    ISO 42001 Clause 7.5
  • ISO 42001: Addressing risks and opportunities (1:39)
    Identify AI risks and opportunities to enhance AIMS effectiveness
    ISO 42001 Clause 6.1.1
  • ISO 42001: AI risk management process (3:24)
    Establish a structured AI risk assessment and treatment process
    ISO 42001 Clause 6.1
  • ISO 42001: Defining an AI risk management methodology (3:25)
    Create a documented method for consistent AI risk management
    ISO 42001 Clause 6.1
  • ISO 42001: AI risk identification (04:02)
    How to identify AI risks and document them
    ISO 42001 Clause 6.1.2, ISO 42001 Annex A.4 and C.3
  • ISO 42001: AI risk analysis and evaluation (2:30)
    Using scales for impact and likelihood and calculating the level of risk
    ISO 42001 Clause 6.1.2
  • ISO 42001: AI risk treatment and Statement of applicability (3:18)
    Mandatory elements of Risk treatment plan and Statement of applicability
    ISO 42001 Clause 6.1.3
  • ISO 42001: AI system impact assessment (4:07)
    Assess AI system impacts on individuals and society per ISO 42001
    ISO 42001 Clause 6.1.4, ISO 42001 Annex A.5
  • ISO 42001: Setting AI objectives (2:42)
    Define measurable AI objectives aligned with AI policy
    ISO 42001 Clause 6.2
  • ISO 42001: Planning of changes (1:30)
    Plan AI system changes to ensure controlled AIMS improvement
    ISO 42001 Clause 6.3
  • ISO 42001: Operating the AIMS (1:51)
    Integrating AIMS activities into everyday operations
    ISO 42001 Clause 8
  • ISO 42001: Operational planning and control (3:25)
    Implement processes and controls for effective AIMS operation
    ISO 42001 Clause 8.1
  • ISO 42001: Implementing the AI risk assessment and treatment (2:37)
    Apply and maintain AI risk assessment and risk treatment plans
    ISO 42001 Clause 8.2 and 8.3
  • ISO 42001: Implementing the AI system impact assessment (1:42)
    Conduct and review AI impact assessments regularly per ISO 42001
    ISO 42001 Clause 8.4
  • Integration of ISO 42001 with ISO 27001, ISO 27701, and ISO 9001 (3:45)
    Integrate AIMS with other ISO management systems for synergy
    ISO 42001 Annex D.2
  • ISO 42001: The basics of monitoring, measurement, analysis, and evaluation (1:01)
    Learn the difference and the purpose of performance management
    ISO 42001 Clause 9.1
  • ISO 42001: Implementing monitoring, measurement, analysis, and evaluation (2:51)
    Techniques to implement effective AIMS performance measurement and reporting
    ISO 42001 Clause 9.1
  • ISO 42001: Internal audit (3:00)
    Plan and conduct AIMS internal audits to ensure ISO 42001 compliance
    ISO 42001 Clause 9.2
  • ISO 42001: Management review (2:30)
    How the senior management needs to participate in AIMS decision-making
    ISO 42001 Clause 9.3
  • ISO 42001: Continual improvement (2:14)
    Maintain continuous improvement of the AIMS per ISO 42001 principles
    ISO 42001 Clause 10.1
  • ISO 42001: Nonconformities and corrective actions (3:41)
    A systematic process of eliminating root causes of nonconformities
    ISO 42001 Clause 10.2
  • ISO 42001: Purpose and structure of annexes A and B (4:48)
    Understand the differences between Annexes A and B in AI control implementation
    ISO 42001 annexes A and B
  • ISO 42001: Policies related to AI (2:02)
    Establish AI policies for responsible AI governance and review
    ISO 42001 Annex A.2 and B.2
  • ISO 42001: Internal organization (1:30)
    Define AI governance structure and responsible reporting processes
    ISO 42001 Annex A.3 and B.3
  • ISO 42001: Resources for AI systems (2:52)
    Identify and manage AI resources to support compliant AIMS operations
    ISO 42001 Annex A.4 and B.4
  • ISO 42001: Assessing impacts of AI Systems (2:59)
    Evaluate AI system impacts on individuals and society throughout lifecycle
    ISO 42001 Annex A.5 and B.5
  • ISO 42001: Management guidance for AI system development (1:44)
    Define responsible AI development objectives and processes
    ISO 42001 Annex A.6.1 and B.6.1
  • ISO 42001: AI system life cycle (4:20)
    Apply ISO 42001 controls across the AI system lifecycle stages
    ISO 42001 Annex A.6.2 and B.6.2
  • ISO 42001: Data for AI systems (3:01)
    Establish data management and quality controls for AI systems
    ISO 42001 Annex A.7 and B.7
  • ISO 42001: Information for interested parties of AI systems (2:07)
    Communicate AI system information and incident responses to stakeholders
    ISO 42001 Annex A.8 and B.8
  • ISO 42001: Use of AI systems (2:37)
    Ensure responsible and intended use of AI systems under AIMS
    ISO 42001 Annex A.9 and B.9
  • ISO 42001: Third-party and customer relationships (1:51)
    Manage third-party AI relationships to ensure accountability and compliance
    ISO 42001 Annex A.10 and B.10

General Cybersecurity lessons library

  • Remote Work (4:37)
    Risks when working outside of office premises
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.5.10, A.6.7, A.7.8, A.7.9
  • The Mind of a Hacker (5:42)
    3 types of hackers and how to protect yourself
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.6.3
  • Security in Acquisition, Development, and Maintenance (12:15)
    Cybersecurity in the IT system lifecycle
    NIS 2 article 21 paragraph 2 point (e), ISO 27001 controls A.8.25, A.8.26, A.8.27, A.8.28, A.8.29, A.8.30, A.8.31, A.8.33
  • Secure Communications (13:32)
    Securing voice, video, and text communication channels
    NIS 2 article 21 paragraph 2 point (j), ISO 27001 controls A.8.20, A.8.21
  • Privacy (4:36)
    8 privacy principles everyone should know
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.5.33, A.5.34
  • Passwords (5:30)
    Creating and keeping passwords secure
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.5.17
  • Social Media (5:24)
    Main cyber risks when using Facebook, X, LinkedIn, and others
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.5.10, A.5.14
  • Protecting Paperwork (6:35)
    Vulnerabilities of paper media, and methods of protecting it
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.5.10, A.5.33, A.7.5, A.7.7
  • Basic Cyber Hygiene Practices (4:47)
    Essential cybersecurity measures for every user
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.5.10, A.8.1
  • Handling Cybersecurity Incidents (6:16)
    How to spot and react promptly to cybersecurity concerns
    NIS 2 article 21 paragraph 2 point (b), ISO 27001 controls A.5.24, A.5.25, A.5.26
  • Backup Basics (4:36)
    Recovery from data loss
    NIS 2 article 21 paragraph 2 point (c), ISO 27001 control A.8.13
  • Business Continuity (9:40)
    Resilience and recovery arrangements
    NIS 2 article 21 paragraph 2 point (c), ISO 27001 controls A.5.29, A.5.30, A.8.13, A.8.14
  • Basics of Authentication (6:05)
    Preventing unauthorized access to digital assets
    NIS 2 article 21 paragraph 2 point (j), ISO 27001 control A.8.5
  • Disaster Recovery (8:38)
    How to recover information systems and data
    NIS 2 article 21 paragraph 2 point (c), ISO 27001 control A.5.30, A.8.14
  • Cryptography (10:39)
    Cryptographic concepts and their application
    NIS 2 article 21 paragraph 2 point (h), ISO 27001 control A.8.24
  • Access Control (6:07)
    Permitting appropriate access and preventing inappropriate access
    NIS 2 article 21 paragraph 2 point (i), ISO 27001 controls A.5.15, A.5.16, A.5.17, A.5.18, A.8.2, A.8.3, A.8.4, A.8.5
  • Basics of Network Security (6:43)
    Securing digital networks and data communications
    NIS 2 article 21 paragraph 2, ISO 27001 control A.8.20
  • Cyber Asset Management (7:22)
    Identifying, classifying, securing, and exploiting digital assets
    NIS 2 article 21 paragraph 2 point (i), ISO 27001 controls A.5.9
  • Emergency Communications (6:30)
    Setting up alternative communication methods
    NIS 2 article 21 paragraph 2 point (j), ISO 27001 clause 7.4 and controls A.5.14, A.8.14
  • Cybersecurity Training and Awareness (11:33)
    Creating a program for continuous training and awareness
    NIS 2 article 20 paragraph 2, article 21 paragraph 2 point (i), ISO 27001 clauses 7.2, 7.3; control A.6.3
  • Information Risk Management (8:29)
    Risk assessment and treatment as a foundation of cybersecurity
    NIS 2 article 20 paragraph 1, article 21 paragraph 1, paragraph 2 point (a), ISO 27001 clauses 6.1, 8.2, 8.3
  • Assessing Supplier Security (12:46)
    Supplier vulnerabilities, quality, and secure development
    NIS 2 article 21 paragraph 2 point (d), paragraph 3, ISO 27001 controls A.5.19, A.5.20, A.5.21, A.5.22
  • Human Resources Security (12:57)
    Activities before, during, and after employment
    NIS 2 article 21 paragraph 2 point (i), ISO 27001 clauses 7.2, 7.3; controls A.6.1, A.6.2, A.6.3, A.6.4, A.6.5
  • Measuring Cybersecurity (7:59)
    Assessing the effectiveness of risk management
    NIS 2 Article 20 paragraph 1, Article 21 paragraph 2 point (f), ISO 27001 clause 9.1
  • Corrective Actions (8:02)
    How to eliminate the cause of nonconformities
    NIS 2 article 21 paragraph 4, ISO 27001 clause 10.2
  • Management’s Role in Cybersecurity (7:34)
    Tasks for senior and mid-level management
    NIS 2 article 20 paragraph 1, ISO 27001 clause 5.1
  • Insider Threats (6:30)
    Managing insiders with access to sensitive information
    NIS 2 article 21 paragraph 2 point (i), ISO 27001 controls A.5.15, A.5.33, A.5.35, A.6.1, A.8.2, A.8.16
  • Cloud Security Basics (5:38)
    Securing data when using cloud services
    NIS 2 article 21 paragraph 2 point (d), ISO 27001 controls A.5.23
  • Computer Malware (4:58)
    Phishing, ransomware, and spyware
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.8.7
  • Email Security (4:08)
    Risks related to the usage of email
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.5.14
  • Human Error (4:33)
    Reducing mistakes with sensitive information
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.6.3
  • Identity Theft (4:58)
    How do cybercriminals steal your identity?
    NIS 2 article 21 paragraph 2 points (i) and (j), ISO 27001 controls A.5.16, A.5.17, A.8.5
  • Device Physical Security (5:52)
    Physically securing information and devices
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 controls A.7.5, A.7.8, A.7.9, A.7.10, A.8.1
  • Intellectual Property (5:36)
    Technical, legal, and organizational methods of protecting IPR
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.5.32
  • Security of Mobile Devices (5:30)
    Protecting laptops, tablets, smartphones, and other devices
    NIS 2 article 21 paragraph 2 points (g) and (j), ISO 27001 controls A.5.10, A.5.17, A.6.7, A.7.8, A.7.9, A.7.10, A.8.1, A.8.5, A.8.7
  • Social Engineering (6:02)
    The most common methods criminals are using to access your account
    NIS 2 article 21 paragraph 2 point (g), ISO 27001 control A.5.10
  • Managing Supplier Security (6:32)
    Risks related to vendors and contractors, and how to handle them
    NIS 2 article 21 paragraph 2 point (d), ISO 27001 controls A.5.19, A.5.20, A.5.21, A.5.22, A.5.23

Training adjustable for different audiences

Different teams require different knowledge. Configure the platform so that senior management, IT, and operational staff each get tailored training on AI governance and ISO 42001.

Advisera’s Company Training Academy suggests the most appropriate lessons for each audience — but you’re always in control.

ISO 42001 Training & Awareness - Advisera
ISO 42001 Training & Awareness - Advisera

Automate training delivery and tracking

You don’t have to torture yourself with organizing a live training that lasts longer than anyone wants to attend. Instead, use Advisera’s Company Training Academy to define how often employees need to watch videos, automatically send email invitations to watch them, track who watched each video, send reminders, and create attendance reports for audit purposes.

Made for easy learning

AI governance can sound complex — but our experts make it simple. Videos last less than 5 minutes, and the instructors explain ISO 42001 and AIMS requirements using clear, practical language anyone can understand.

ISO 42001 Training & Awareness - Advisera

Several languages available

We’re translating the videos into all major languages so that any employee in your company can easily understand them.

Besides English, we have videos in German, French, Italian, Dutch, Spanish, Portuguese, Croatian, and we’re adding more.

Custom-made videos

Do you have specific policies or procedures that you’d like to present in a video? No problem! As part of selected plans, we can create custom videos exclusively for your company — personalization has never been easier.

You can also upload the videos you created to complement Advisera’s training videos.

ISO 42001 Training & Awareness - Advisera
ISO 42001 Training & Awareness - Advisera

Upload Your Own Training Materials

You can upload your own materials and turn them into engaging lessons. Combine your company’s internal documents, videos, or policies with Advisera’s learning system to build a personalized training experience for your employees.

For all use cases

Do you want to organize initial cybersecurity training for your project team? Or do you want regular, continuous training for your whole workforce? Or perhaps onboarding for new employees?

With the Company Training Academy, you can cover all of these cases by setting up separate training programs.

ISO 42001 Training & Awareness - Advisera
ISO 42001 Training & Awareness - Advisera

SCORM compatibility for your LMS

Use our training videos in your own learning management system (LMS) — all lessons are available as SCORM packages, including videos, quizzes, and progress tracking. Stay in control while delivering content through your existing platform.

White-label platform for consultants

Grow your business by offering branded cybersecurity and compliance training to your clients. With Advisera’s platform, you can set up and manage training programs for multiple clients — all from one dashboard.

ISO 42001 Training & Awareness - Advisera
Select the number of users for which you want to set up training
Monthly plan

10 users included

$15 / month

Unlimited access to all videos

Access to any training and awareness video about cybersecurity, ISO 27001, NIS2, DORA, GDPR, or ISO 42001 in any language, for any of your employees

Access to translated videos

Currently, all NIS2 and cybersecurity videos are translated and available in German, French, Italian, Dutch, Spanish, Portuguese, and Croatian.

Country-specific videos

When a particular EU country publishes its own laws and regulations based on, e.g., NIS 2, we will create videos that address those additional requirements.

Adapt training for audiences

Create separate training programs for senior management, mid-level management, IT employees, all other employees, etc. so that each group watches only the videos relevant to them.

Set training schedule

Choose daily, weekly, monthly, or other frequencies of watching training videos.

Automatic notifications

Configure automatic email notifications sent to employees about upcoming and overdue training videos.

Track employees’ progress

See exactly who has attended which training video, who is late, and testing results; download reports in PDF.

Quizzes and tests

Decide for each training program how you want to test the attendees.

Upload your own materials

Upload your own videos and documents, and add them to existing training programs.

Custom-made videos

Based on your script, we will produce training videos (up to 10 minutes per video) that you can use within the Company Training Academy.
(available in yearly plans with 100 or more users)

In-house live online training

Customized interactive webinar delivered by our expert for your company – up to 1 hour, up to 500 attendees.
(available in yearly plans with 500 or more users)

SCORM packages

Get SCORM versions of our training programs to run them in your own LMS. All content — videos, quizzes, and progress tracking — included and ready for integration.
(available only in custom plan)
Yearly plan

10 users included

$162 / year

Unlimited access to all videos

Access to any training and awareness video about cybersecurity, ISO 27001, NIS2, DORA, GDPR, or ISO 42001 in any language, for any of your employees

Access to translated videos

Currently, all NIS2 and cybersecurity videos are translated and available in German, French, Italian, Dutch, Spanish, Portuguese, and Croatian.

Country-specific videos

When a particular EU country publishes its own laws and regulations based on, e.g., NIS 2, we will create videos that address those additional requirements.

Adapt training for audiences

Create separate training programs for senior management, mid-level management, IT employees, all other employees, etc. so that each group watches only the videos relevant to them.

Set training schedule

Choose daily, weekly, monthly, or other frequencies of watching training videos.

Automatic notifications

Configure automatic email notifications sent to employees about upcoming and overdue training videos.

Track employees’ progress

See exactly who has attended which training video, who is late, and the testing results; download reports in PDF.

Quizzes and tests

Decide for each training program how you want to test the attendees.

Upload your own materials

Upload your own videos and documents, and add them to existing training programs.

Custom-made videos

Based on your script, we will produce training videos (up to 10 minutes per video) that you can use within the Company Training Academy.
(available in yearly plans with 100 or more users)

In-house live online training

Customized interactive webinar delivered by our expert for your company – up to 1 hour, up to 500 attendees.
(available in yearly plans with 500 or more users)

SCORM packages

Get SCORM versions of our training programs to run them in your own LMS. All content — videos, quizzes, and progress tracking — included and ready for integration.
(available only in custom plan)

For all company sizes, all industries

All videos were created to be relevant for small, medium, and large companies, and also for all industries — no matter if your company is a small AI app developer or a large AI provider, your employees will find these videos very appropriate.

In other words, any company implementing and maintaining their ISO 42001 AIMS will find these videos to be the right fit.

Frequently Asked Questions

What is the Company Training Academy?

The Company Training Academy is a company-wide cybersecurity training platform that enables you to configure various training and awareness programs for your entire workforce for, e.g., NIS2, DORA, ISO 27001, GDPR, ISO 42001, security awareness, etc.

How long does it take to set up company-wide training and awareness?

Opening a client account takes less than a minute. The wizard will then guide you through the process of setting up your first training and awareness program, which usually takes 5–10 minutes.

How does the free trial work?

During the 14-day free trial, you will get access to all training & awareness videos, but you will be limited to 10 users. Some more advanced features will be accessible when you upgrade your account. No credit card required.

What forms of payment do you accept?

We accept payment via any major credit or debit card; for a larger number of users, you can pay via wire transfer from your bank account.

How does the Company Training Academy compare to Advisera’s courses?

Advisera’s courses are intended for individuals who want to get in-depth knowledge about a particular framework, while the Company Training Academy is intended for companies that want to automate training and awareness for all of their employees, and track their progress.

Which standards and regulations are covered in the Company Training Academy videos?

Currently, the videos cover NIS2, DORA, ISO 27001, GDPR, ISO 42001, and cybersecurity awareness training.

We’re working on adding videos for other standards and regulations.

Are videos available in languages other than English?

Besides English, we currently have videos in German, French, Italian, Dutch, Spanish, Portuguese, and Croatian. We are working on adding more languages at the moment; please contact us to learn about available languages.

Can we use these videos in our own Learning Management System (LMS)?

Yes. Our training is available as SCORM packages, including videos, quizzes, and progress tracking, for easy integration into your Learning Management System (LMS) – contact us to request the SCORM packages.

Can I upload our own materials to the Company Training Academy?

Yes. You can upload your company’s own training materials and create lessons from them. Supported formats include documents (PDF, DOCX, PPTX, XLSX, etc.), videos (YouTube, Vimeo), and text-based lessons you can create directly in the editor.

Is there a time limit for attending the training?

No, your users can spend as much time as they like attending the lessons, as long as your subscription is active.

What will the users need to access the lessons?

Your users can access the lessons using PC, Mac, or mobile devices, using any major browser (e.g., Chrome, Mozilla, Edge, Safari); a broadband Internet link will also be needed.

What is the format of the training, and how long does it take?

The lessons are a combination of video lectures, quizzes, and test questions. The average time needed per lesson is between 5 and 10 minutes. You can configure your training program to include only a couple of lessons, or several dozen lessons.

What prior knowledge is needed to attend the training?

None. The lessons are created in such a way that a beginner can easily understand them. They are very easy to follow for any type of employees — senior or mid-level management, non-IT employees, tech people, etc.

How can I upgrade my account if I need more users?

Simply click the purchase button for the required number of users in the pricing table, and, after the payment is processed, your Company Training Academy will be upgraded automatically.

Please make sure you use the same email address that you use for your existing account, because it is the only way this process can be done automatically. If you decide to make the purchase with a different email address, make sure you contact our support at support@advisera.com so we can upgrade your account manually.

Is it necessary to purchase training and awareness certificates?

No — you can use a Company Training Academy without purchasing certificates.

There are so many videos — how will I find what is the most appropriate for us?

The Company Training Academy will suggest the most appropriate videos based on the framework you’re interested in (e.g., NIS2), and based on your audience (e.g., senior management).

Further, you can filter all the videos in the Library by country, language, relevant clauses and articles of the framework, and other criteria.

Schedule a Demo

Want our expert to walk you through the product? Schedule a short call. We respond quickly.