"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...
Read moreThis HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...
Read moreThis HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...
Read moreThis document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing...
Read moreThis guide explains how the Customer HootScore works. It describes what it measures, how it is calculated, and how...
Read moreThese instructions provide a step-by-step guide for deleting a customer in CyberHoot’s multi-tenant platforms...
Read moreThis guide explains how the user scoring system works so you can configure and monitor it effectively for your...
Read moreThese instructions provide a step-by-step walkthrough on how to upload a new video to CyberHoot and assign it to a...
Read moreThese instructions provide a step-by-step guide for adding a Super Admin to CyberHoot’s multi-tenant platforms...
Read moreThis article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms. To add users via...
Read moreThese instructions will provide you with the steps to assign local user to a local manager on the Power...
Read moreThis article explains how to add a new local manager into CyberHoot's Platforms. If you prefer CyberHoot to...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.