If you are an end-user (any role)
Start with phishing — it is the attack you are most likely to encounter:
If you are in finance, AP, treasury or executive support
BEC is the single highest-financial-impact attack. Start there, then add the broader phishing context:
If you are an IT admin or security lead
Read the modules above for end-user context, then use them as a controls checklist for your environment. Watch for the upcoming clusters on passwords/auth and cloud/SaaS.
More modules and a role-based reading path are coming.