Business Security training

Professional Security Awareness and Phish Training

We are Passing the Savings on to you!

Prilock uses the latest technology to enroll, deliver, track, and report your security briefings and phishing tests. We reduce our program costs substantially while still offering you and your employees one of the best security awareness trainings available today.

Employees learn the psychology used by hackers in phish attacks, ransomware, and social engineering so they see the attacks before they click.

Prilock's Security Awareness Training meets federal, state, and vendor standards for a comprehensive security awareness training. Our phishing simulator contains hundreds of phish that are used daily to trick and hack companies and employees just like yours. You can even build your own phishing to make them specifically targeted to your industry or company.

You will also get emailed reports and access to your dashboard with real time analytics on all your activities and campaigns.

Prilock Security
In addition to unlimited phishing tests and 1-Click Setup for a full year of security
training you're trained by a hacker on these topics and how they are blended into attacks


Phishing using email, instant messaging, or text messaging is the primary way companies and people are compromised.

Smartphones & Flash Drives

As more people purchase smartphones for both personal and business use, new threats continue to emerge.

Email and Attachments

Demonstrates multiple attacks via email attachments, showing best practices when handling email and attachments.

How Cyber-Thieves are Caught

Shows employees how log files and software are used to track unauthorized access or the copying of files.

Business Travel

Closing deals and meetings are the top priorities of most business travelers, but safety should be a priority, too.

Social Network Sites

Demonstrates several attacks used on social sites including examples of past attacks and schemes.

Wi-Fi & Laptops

We adress the dangers of using public Wi-Fi, how to turn off your SSID notification, and what to watch out for with your smartphones and tablets.

Passwords & Phrases

Various attacks are used to steal login information and passwords. We demonstrate how to build strong, yet easy to remember, passwords that are difficult for hackers to crack.

Latest Scams & Schemes

Seeing the latest email, social engineering, and in-person scams prepares users in the event that they actually become a target of one.

Malware – Key Stroke Loggers, Backdoors, & Bots

A non-technical lesson showing basics of how these tools are used to steal credentials and identification, different distribution tactics, and how to remove them.

Social Engineering

Using your personal information like your shopping habits and recent social media activity against you, this tactic utilizes impersonating people or agencies that you trust in phone call and email scams.

Why You are Targeted

Until people and employees understand they have value to hackers, they won't change bad habits. What you have, who you are, and who you know, all make you a target.

Topics Feature

Phish Testing - Social Engineering - Blended Attacks

  • Laptop Safety
  • Business Travel Protocol
  • Secure Passwords
  • Why You Are Targeted
  • Over a Thousand Phish in Library
  • Tests for Links, Attachments, Data Entry, & Macros
  • Hacker Tells Reveal Tricks Behind Phish
  • Real-Time Analytics Track User Progress
  • Ransomware & Backups
  • Malware Prevention
  • WiFi Safety
  • Identity Protection

Professional Security

Phishing Education &

Full Reporting and

Security & Phish
Awareness Training Features List

1 Year Licenses

1-Click Security Awareness & Phish
Prevention Training

10 25 50 100 200 300 500 1,000
Compliant Mandated Training Yes Yes Yes Yes Yes Yes Yes Yes
Custom Admin Console Yes Yes Yes Yes Yes Yes Yes Yes
Phone, Email, & Chat Support Yes Yes Yes Yes Yes Yes Yes Yes
Progressive User Page with Tools & Reports Yes Yes Yes Yes Yes Yes Yes Yes
Send-A-Friend-A-Phish Feature Yes Yes Yes Yes Yes Yes Yes Yes
Email Breach Checker Tool Yes Yes Yes Yes Yes Yes Yes Yes
Best Practice Resources Yes Yes Yes Yes Yes Yes Yes Yes
Active Tutorial Videos Yes Yes Yes Yes Yes Yes Yes Yes
Real-Time Analytics Yes Yes Yes Yes Yes Yes Yes Yes
Light or Dark Mode for Dashboard Yes Yes Yes Yes Yes Yes Yes Yes
Comprehensive Campaign Reports Yes Yes Yes Yes Yes Yes Yes Yes
Complete User History Analytics Yes Yes Yes Yes Yes Yes Yes Yes
International Location Mapping for Employees Yes Yes Yes Yes Yes Yes Yes Yes
Gamification Training Lessons Yes Yes Yes Yes Yes Yes Yes Yes
Assessment Requiring 80% to Earn Certification Yes Yes Yes Yes Yes Yes Yes Yes

Phish Simulation Testing

10 25 50 100 200 300 500 1,000
Custom Phish Campaigns Yes Yes Yes Yes Yes Yes Yes Yes
Over 1,000 Phish Bait Yes Yes Yes Yes Yes Yes Yes Yes
Real-Time Analytics on User Progress Yes Yes Yes Yes Yes Yes Yes Yes
Hacker Tells Show Red Flags in Phish Emails Yes Yes Yes Yes Yes Yes Yes Yes
Corrective Training Assigned to Clickers Yes Yes Yes Yes Yes Yes Yes Yes
Specific Industry Custom Phish Emails Yes Yes Yes Yes Yes Yes Yes Yes
Testing for Links, Attachments, Marcos, Credential Entry Yes Yes Yes Yes Yes Yes Yes Yes
Start Your First Campaign in 5 Minutes


10 25 50 100 200 300 500 1,000
Comparable Training Services - - $1175 $2,050 $3,200 $4,800 $7,250 $14,500
Comparable Training Price Per User - - $23.50 $20.50 $16.00 $16.00 $14.50 $14.50
Prilock Regular Price $279 $565 $850 $1,348 $2,393 $3,554 $5,628 $10,929
Get 2 Years Now
SAVE 20% More Pay Only
$282 $570 $857 $1,359 $2,412 $3,582 $5,673 $11,016
Per User Per Year $14.06 $11.39 $8.57 $6.79 $6.03 $5.97 $5.67 $5.51
  Buy Now Buy Now Buy Now Buy Now Buy Now Buy Now Buy Now Buy Now

What Happens After I Buy?

What Happens After I Buy?

Don't Let the Pricing Fool You
This Is the Real Deal

Prilock's Security Briefing consists of 7 chapters with subtopics that will take approximately an hour to complete. It can be taken all at once, but we recommend users take it in a few sections. The system will keep track of user progress. So they can continue from where they left off.

Along with the ability to automatically enroll, deliver, track, and report your security briefings and phishing tests, the system will also monitor and identify the users that are tricked by the phish. Once they have been tricked by 2 phish they are automatically enrolled in an injection training that reinforces what they missed and why it’s important they look for the Hacker Tells in EVERY email or text they receive.

When they complete the lessons, the students will take a 10-question assessment on the material they covered which requires they get 80% of the questions correct to pass. Then they can then print their Certificate of Completion.

Granular Detail

Granular Detail

Phish Attacks

Phish Attacks

Office Security

Office Security

Social Engineering

Social Engineering



Custom User Page

Custom User Page

Full Reporting and Analytics

Prilock's Security Education Platform offers complete analytics on each employee's interaction with the system by tracking their progress, total time, missed topics, and assessment scores. The administrator has all the information they need to assess the compliance of each employee with training objectives. A complete status report is provided, demonstrating your company's compliance with training regulations and requirements of insurance companies, regulators, and vendors.

Prilock Security

Verify Your Company and Employees Have Completed
Their Annual Security Awareness Training
with Full Reporting and Certification

Prilock Security

These days vendors, insurance companies, major clients, state and federal agencies want to know your company and employees have been trained to safely handle their information. Prilock provides complete compliance reports demonstrating your employees have been trained and passed assessment exams that confirm they understand best practices to secure data. Employees can print their certificates for their personnel files and the company can provide completion reports to any authorities that need to see them. If there ever is an incident at your company it is important that you have taken steps to train your people to reduce penalties and fines that can be assessed.

Gamification for Better Learning & Retention

Prilock uses a quick and fun game called The Hacker Challenge to reinforce each set of lessons. Studies show learning and retention are improved when the subject matter is presented in different ways and in applicable situations. After each lesson you are presented with 2 scenarios of actual hacker attacks. Each time the hacker wins he takes $10,000 of your money; if you do the right thing, he gets nothing. By the end of the lessons the student has answered 14 questions without even realizing they are learning the best practices to avoid attacks. Gamification creates a focused, interactive, competitive, and immersive method to measure your new skills and progress accordingly. It's fun to beat the hacker at his own game!

Gamification for Better Learning & Retention

For the people you worry about. Show parents, grandparents, and family how to be safe online

A Full Year of Security Training & 24 Phish Tests

Safely Test With Real Phish in the Wild

  • Access Lessons for 1 Full Year
  • Receive Latest Scam Alerts and Breaking Threats with Avoidance Instructions
  • Monthly Phish Testing with Real Phish
  • Full Access to Learning Portal Resources
  • Print Certificate of Completion Upon Passing Final Assessment
Personal Security Gift Card
1 Year Full System Access
$69.00 $39.99

Full Year of Phish Tests Complete Security Briefing Scam and Con Alerts Certificate of Completion

Buy Now

Our system is so easy to manage you have to see it. Upload your users, run a 3 day baseline phish test plus another random test and review the Security Awareness Training.

Set it up in 5 minutes.

Try A Free 30-Day Phishing Trial For up to 100 Employees

Subscribe to Our Newsletter for the latest news & alerts on scams and free security software.

Copyright © Prilock Security 2019 All Rights Reserved
Privacy Statement and Terms of Use