Welcome to the CyberHoot Power Platform: A Guided Tour for New Administrators
Starting with a new platform can feel like a big lift, but we are here to make it easy. This page features a collection of short overview videos designed to help you get comfortable using CyberHoot’s Power platform quickly and effectively.
We cover the key areas every new customer should understand, including:
These videos will help you hit the ground running and deliver meaningful cybersecurity improvements to your organization from day one. Let’s get started.
In this video we provide an overview of CyberHoot’s automated training mode and Dashboard overview. Learn some of the most common practices in rolling CyberHoot out to teach Cyber Literacy to your company’s employees.
This video describes the customer branding and configuration options available inside CyberHoot. Learn how to add your own company logo and set color palette branding to personalize emails and the website assignments. This video goes through the most common settings you’ll want to configure during initial setup.
This next video provides an overview of our governance Policy Module inside CyberHoot. With our governance policy templates you can quickly download, edit, and then upload to the CyberHoot portal to secure employee signatures on cybersecurity policies (Password, AUP, etc) or Human Resource policies. Any PDF you want can be uploaded and assigned to a unique group of users for legally binding signature capture. Compliance made easy.
This video outlines the video module settings and configuration overview.
This video outlines the common administrative settings of CyberHoot’s positive-reinforcement Phishing Simulations module.
Microsoft Entra ID lets you auto-manage CyberHoot users by group. Add users to enroll them, remove users to archive them.
Google Workspace lets you auto-manage CyberHoot users by group. Add users to enroll them, remove users to archive them.
Please email Support@CyberHoot.com for help.
Cybrary: Cybersecurity Terms Library: 1000+ cybersecurity terms defined in layperson terms.
Monthly Newsletters: subscribe to stay up on the latest emerging threats we face.
Cybersecurity Blog: a weekly article summarizing the latest emerging threat.