Cybersecurity Awareness & Best Practices Foundational security awareness training (English) [CYB-AWARE-001-EN]
Objectives:
- Understand why cybersecurity is a shared responsibility for all staff
- Recognize major cyber threat categories in simple terms
- Understand how attackers use email SMS and voice to manipulate users
- Identify warning signs before clicking or responding
- Recognize AI driven impersonation and verification needs
- Create strong passphrases and avoid password reuse
- Understand MFA purpose and benefits
- Use approved tools to store passwords securely
- Recognize malware types and early warning signs
- Avoid malicious files and links
- Respond correctly to possible infection
- Identify unsafe websites and fake warnings
- Use work email safely and responsibly
- Reduce information leakage from social platforms
- Protect physical access to offices
- Prevent visual data exposure
- Secure devices outside the office
- Identify incidents that must be reported
- Report incidents quickly and correctly
- Encourage open and fast incident reporting
Success Criteria:
- Learner explains why individual actions impact security
- Learner identifies phishing malware ransomware correctly
- Learner explains phishing smishing vishing
- Learner pauses and identifies message red flags
- Learner verifies identity before acting
- Learner creates a strong passphrase
- Learner explains MFA value
- Learner selects safe password storage
- Learner identifies infection symptoms
- Learner avoids unsafe downloads
- Learner disconnects and reports
- Learner avoids unsafe sites
- Learner handles emails securely
- Learner limits oversharing
- Learner challenges access politely
- Learner locks screen consistently
- Learner protects devices on the move
- Learner recognizes reportable events
- Learner follows reporting steps
- Learner reports without fear
Course Content
Module 1 - Understanding Cyber Threats
Lesson 1.1 — Why Cybersecurity Matters to Everyone
You don't currently have access to this content
Lesson 1.2 — Common Cyber Threats Explained
You don't currently have access to this content
Module 2 - Phishing & Social Engineering
Lesson 2.1 — How Phishing Works
You don't currently have access to this content
Lesson 2.2 — Spotting Red Flags in Messages
You don't currently have access to this content
Lesson 2.3 — Deepfakes & Impersonation Scams
You don't currently have access to this content
Module 3 - Passwords & Authentication
Lesson 3.1 — Strong Passwords vs Smart Passwords
You don't currently have access to this content
Lesson 3.2 — Multi‑Factor Authentication Explained
You don't currently have access to this content
Lesson 3.3 — Using Password Managers Safely
You don't currently have access to this content
Module 4 - Malware & Ransomware
Lesson 4.1 — What Malware and Ransomware Do
You don't currently have access to this content
Lesson 4.2 — Safe Downloads and Attachments
You don't currently have access to this content
Lesson 4.3 — What To Do If You Suspect Malware
You don't currently have access to this content
Module 5 - Safe Internet & Email Use
Lesson 5.1 — Safe Browsing Basics
You don't currently have access to this content
Lesson 5.2 — Email Safety at Work
You don't currently have access to this content
Lesson 5.3 — Social Media and Oversharing Risks
You don't currently have access to this content
Module 6 - Physical & Device Security
Lesson 6.1 — Office Security and Tailgating
You don't currently have access to this content
Lesson 6.2 — Clean Desk and Screen Lock Practices
You don't currently have access to this content
Lesson 6.3 — Remote and Mobile Device Security
You don't currently have access to this content
Module 6 - Incident Reporting & Response
Lesson 7.1 — What Is a Security Incident
You don't currently have access to this content
Lesson 7.2 — How and When to Report
You don't currently have access to this content
Lesson 7.3 — No‑Blame Security Culture
You don't currently have access to this content
Ratings and Reviews
0.0
Avg. Rating
0 Ratings
5
0
4
0
3
0
2
0
1
0
What's your experience? We'd love to know!
Login to Review
What's your experience? We'd love to know!
Login to Review
