Dune studio

Show, Don’t Tell

Dune’s content library is built for teams who are done with ineffective training.
Showing real phishing assets, live attack simulations, and contextual analysis of the real
threats your users face. Multi-lingual content for global teams.

From executive deepfakes to insider threats to vishing, each training pairs real-world
evidence with up-to-date best practices for reducing risk at scale.

Custom Content

Dune Studio produces custom content specifically tailored to your organization and end users,
as well as industry-leading deepfakes for red teaming purposes.

Handle

Security Awareness Training

Showing real examples of how phishing, smishing, and social engineering threats arrive in front of your users,
and providing actionable solutions to navigate risk.

Preview
Intro to Artificial Intelligence

Understand how AI learns from data, where it shows up in everyday workplace tools, and how to use approved systems safely by protecting sensitive information and verifying outputs.

Preview
Phishing

Explore how attackers exploit urgency and familiar tools to increase phishing success rates, and how verification and reporting keep incidents from escalating.

Preview
Synthetic Identities

Recognize how convincing fake personas gain trusted access inside organizations, and how treating identity as something to continuously verify reduces fraud risk.

Preview
SaaS Security

Discover how attackers exploit trusted SaaS platforms with fake renewal notices and update prompts, and how careful navigation and approved updates protect your accounts.

Preview
Identity Provider & SSO Phishing

See how attackers target primary login systems, and how direct navigation, MFA protection, and rapid reporting prevent compromise.

Preview
Collaboration Tools

Learn how phishing campaigns target Google Drive, OneDrive, Dropbox, and cloud infrastructure tools, and how verifying access requests protects enterprise data.

Compliance Training

Make policies and regulatory standards stick with visuals
and videos that simplify complex requirements.

Preview
Introduction to NIS2

Explore how NIS2 reinforces supply chain oversight, incident reporting, and leadership accountability, and how individual actions contribute to enterprise-wide resilience.

Preview
Overview of NIST Standards

Understand how NIST standards guide organizations in protecting sensitive information and reducing cyber risk across federal and commercial environments.

Preview
Comprehensive Guide to CCPA Access Rights

Learn how secure data storage, identity verification, and automated workflows support CCPA access and deletion compliance while preventing unauthorized disclosures.

Preview
Compliance with PII Regulations

Understand the legal and ethical responsibilities of safeguarding PII, and how strong data handling practices help prevent costly violations.

Role-Based Training

Training built for Finance, HR, DevOps, Legal, and other roles—aligned
to functional risk and real-world behavior.

Preview
Finance Teams: Wire Transfer Verification Protocols

Recognize how attackers use urgency and impersonation to trigger fraudulent wire transfers, and how out-of-band verification, dual approval, and careful review of payment details can stop wire fraud before funds disappear.

Preview
HR Teams: Offboarding Risk Controls

Learn how employee offboarding creates high risk for data theft, and how timely access reviews, BYOD checks, and escalation of unusual downloads protect sensitive systems and IP.

Preview
Executives: CEO Fraud & BEC Prevention

Uncover how executive impersonation schemes pressure teams into urgent financial actions, and how careful validation and escalation prevent irreversible losses.

Preview
Help Desk Teams: Callback Verification & Caller ID Spoofing

Understand how vishing attackers spoof corporate and bank numbers to pressure users into MFA changes or password resets, and how to verify callers before taking action.

Learn how attackers operate,
and how you can adapt daily practices to combat new and emerging risks.
Watch Now