HowTo: Optional Training Assignments

2nd June 2021 | HowTo, Platform HowTo:  Optional Training Assignments

Overview

CyberHoot provides the ability to optionally assign policies, videos, and programs to your users.  Optional assignments provide the convenience of providing training to your users without the repeated reminders and compliance requirements.  

Optional assignments are tracked under their own reporting category and not mixed with compliance reporting.  This way you can assign policies, videos, and programs to your users without your compliance metrics being skewed!!! 

Here’s how ya do it…

Optional Policy Assignment

When creating or cloning a policy, simply check the ‘Policy is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Video Assignment

When creating or cloning a policy, simply check the ‘Video Training is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Program Assignment

Once a program is cloned locally, you can assign the training program to a group of users as an optional training program by checking the ‘Training Program is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Hoots Report

You can view the Optional Hoots reports by click on the Reports link in the navigation bar and clicking the Optional Hoots card:

This will take you to the Optional Hoots Report page:

For more instructional ‘HowTo’ videos, head over to our HowTo Library for more guidance. If you’re unsure where to start, review the following recommended videos and articles around common Administrator (or SuperAdministrator) pain points: 

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more
The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The rapid rise of generative AI has unlocked enormous promise, but it’s also accelerating the arms race in...

Read more