The Varhugi curriculum
The full list of every module. Short, practical, and grounded in Icelandic examples that match a real workplace.
17
85
across the whole curriculum
One per month
- Module 15 min
Passwords and password managers
Learn how to create strong passwords and why a password manager is the single most important security tool you can use.
- Passwords
- Fundamentals
- Module 25 min
Phishing, recognising the trap
Learn to spot Icelandic phishing emails and SMS, what to do when you're targeted, and how to report it.
- Phishing
- Fundamentals
- Module 35 min
Two-factor authentication
Learn why two-factor authentication is the most important security step after a password manager, and how to set it up the right way.
- 2FA
- Fundamentals
- Module 45 min
AI-powered phishing
AI now writes flawless Icelandic phishing emails that the old advice, looking for typos, no longer catches. Learn how to react.
- Phishing
- AI
- Modern threats
- Module 55 min
SMS scams, smishing
The most common phishing attack in Iceland today doesn't arrive by email, it arrives by SMS. Learn how to spot it and what to do.
- Phishing
- Mobile
- Fundamentals
- Module 65 min
MFA fatigue, repeated approval prompts
Attackers no longer try to bypass 2FA, they spam you with prompts until you approve one by accident. Learn to recognise and stop the attack.
- 2FA
- Modern threats
- Module 75 min
Impersonated colleagues
Attackers impersonate your manager on WhatsApp, Slack, or Teams asking for a "quick favour". Learn how to recognise and stop the scam.
- Social engineering
- Modern threats
- Module 85 min
Invoice fraud, fake payment requests
Attackers impersonate vendors or executives and request transfers from finance. Learn how companies lose millions to a single email.
- Finance
- Social engineering
- Modern threats
- Module 95 min
The CEO's voice on the phone, voice deepfakes
Three seconds of audio is enough to create a convincing deepfake. Learn what the attack looks like and the simple defence that stops it.
- AI
- Deepfake
- Modern threats
- Module 105 min
AI tools and data leaks
You paste a work document into ChatGPT to save time. Where does it end up? Who sees it? Learn how to use AI without leaking your company's secrets.
- AI
- Data protection
- Modern threats
- Module 115 min
Public Wi-Fi, rogue access points
Wi-Fi at a café, airport, or hotel might be run by an attacker. Learn when it's dangerous and when it's not.
- Network
- Mobile
- Fundamentals
- Module 125 min
Overly open share links
You share a Google Doc or OneDrive file with "anyone with the link". Who can see it? Learn to share documents without leaking them to the internet.
- Data protection
- Cloud
- Fundamentals
- Module 135 min
First steps after a security mistake
You clicked a phishing link, typed your password, or pasted confidential data into AI. The next hour matters most. Learn what to do.
- Incident response
- Behaviour
- Fundamentals
- Module 145 min
AI commands in the terminal
AI hands you a command to run in the terminal. Stop before you press Enter. Learn why and how.
- AI
- Modern threats
- Module 155 min
When AI lies with confidence
AI answers with the same confidence whether it's right or wrong. Learn to spot the difference and protect yourself.
- AI
- Modern threats
- Module 165 min
Hidden instructions in text — prompt injection
You ask Copilot to summarise an email. The email contains hidden instructions telling Copilot to send data to an attacker. Learn how the attack works.
- AI
- Modern threats
- Module 175 min
AI at home — family and personal life
AI is now part of our personal lives. Children use it, older relatives are targeted by deepfakes, and family photos end up in training datasets. Learn what to discuss at home.
- AI
- Personal
- Modern threats
Ready to try it?
Create your company account in two minutes. No sales calls, no implementation.

varhugi