LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Certificate Page
  • Table Layout
  • How to Create a Certificate
  • How to make a default Certificate
  • Why should I make the Certificate Default
  • Video Tutorial
  • F&Q
  • Q: Can I customize the certificate template?
  • Q: How many certificates can I create?
  • Q: In which condition are my employees awarded a certificate?
  • Q: Certificates do not arrive to users
  • Q: How are users awarded the certificate?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Awareness Educator

Certificates

Recognition of cooperation and effort can provide valuable incentives and motivation. Certificates that reward employees for performing training exercises can be a valuable part of a company’s plans to ensure security awareness.

This document provides details of options available on the Awareness Educator > Certificates page to create and customize a unique certificate that will be delivered to employees who have completed a training assignment, create default certificates, and view certificates that have already been distributed to your users.

Certificate Page

Table Layout

The components of the Certificates page are explained below.

Certificate Name

Name of the certificate.

Owner

Owner of the certificate.

Distributed

Resellers can view examples of previously distributed certificates.

Date Added

The date that the certificate was created.

Actions > Make Default

When this option is activated, the selected certificate will be sent automatically to users who complete an assigned training exercise.

Actions > Edit

Customize the certificate.

Actions > Preview

Review the details of the certificate.

Actions > Duplicate

Duplicate the certificate and create a copy of it with the same settings.

How to Create a Certificate

Please follow the steps to create training.

  • Click the +NEW button on the Certificates page.

  • You will be prompted to provide the Training Certificate Information details below:

    • Certificate Name: Enter the name of the certificate.

    • Description: Enter a brief description of the certificate.

    • Make Available For: This feature is available only to admins who have a reseller role and wish to make this certificate available to other companies for them to use as well.

    • Certificate Template: Click the Edit button to update the company logo, add text, or modify the template's appearance.

Click Save to save your new certificate. Once created, the certificate will populate under the Certificates page.

How to make a default Certificate

To make an existing certificate the default certificate, click on the “︙” under Actions and select Make Default. A star icon will appear next to the certificate name to signify that the certificate has been made a default.

Why should I make the Certificate Default

A default certificate setting provides for the automatic delivery of a simple yet valuable moment of recognition to employees who complete the training assignment. The certificate can be customized as desired. If no default setting has been made, the admin will be alerted.

Video Tutorial

This tutorial provides details of options available on the Awareness Educator > Certificates.

F&Q

Q: Can I customize the certificate template?

A: Yes. You can customize the certificate using options available on the Awareness Educator > Certificate menu.

Q: How many certificates can I create?

A: You can create as many as you wish.

Q: In which condition are my employees awarded a certificate?

A: Users will receive a certificate upon completion of the training item. This may include a test component or simply viewing a video.

Q: Certificates do not arrive to users

A: The following steps can be checked for troubleshooting.

  • Please make sure if certificate option has been enabled before you send the training from the training report.

  • Please make sure the users completed the training in order to receive the certificate.

  • If the certificate is enabled, users completed and delivered to the major of users but haven't been delivered to a few users, please check your email server logs for troubleshooting.

  • If the certificate emails haven't been delivered to all users although the users complete the training, please contact the support team for further troubleshooting.

Q: How are users awarded the certificate?

A: Users can receive a certificate under the following conditions:

  • No Exam Required: If the training does not include an exam, users will receive the certificate upon completing the training.

  • Exam Required:

    • First Attempt Success: Users will receive the certificate if they complete the training and pass the exam on their first time attempt.

    • First Attempt Failure: Users will not receive the certificate if they fail the exam on their first time attempt. Subsequent attempts, even if passed, do not qualify for certification.

PreviousEnrollmentsNextTraining Reports

Last updated 10 months ago

Was this helpful?

💫