Program Overview
Cybersecurity today is a human-first risk — most breaches happen not because of advanced hacking, but because people unknowingly click, share, or trust the wrong things. This program builds a strong foundation in cybersecurity essentials, including major threats, social engineering, phishing, password safety, malware risks, public Wi-Fi safety, and cyber hygiene. Drawing on real-life attacks, practical demonstrations, and the complete awareness topics from your internal deck (hacking, ethical hacking, malware, phishing, insider threats, Wi-Fi risks, myths, cyber hygiene), this program helps employees build daily cybersecurity discipline and reduce organizational cyber risk.
Features
- Identify common cyber threats (phishing, malware, social engineering, Wi-Fi risks)
- Apply cyber hygiene best practices for daily work
- Recognize suspicious messages, calls, links, and social engineering patterns
- Protect devices, accounts, data and organizational systems from basic threats
Target audiences
- Non-technical employees
- Operations, HR, Finance, Admin, Plant teams
- Beginner / Awareness level
- Ideal as mandatory cybersecurity training
Curriculum
- 4 Sections
- 40 Lessons
- 1 Day
Expand all sectionsCollapse all sections
- Introduction to Cybersecurity8
- 1.1What is hacking?
- 1.2Types of hackers: Black Hat, White Hat, Grey Hat
- 1.3What is cybersecurity?
- 1.4Why cybersecurity matters today — business risks, financial loss, identity theft
- 1.5Examples of common attacks: malware, phishing, ransomware, DoS, SQL injection
- 1.6Confidentiality, Integrity, Availability (CIA Triad)
- 1.7Security vs. convenience — the paradox
- 1.8Why humans are the #1 attack surface
- Social Engineering & Human Manipulation8
- 2.1Social Engineering & Human Manipulation
- 2.2What is social engineering? Psychological manipulation explained
- 2.3Attack types: Phishing; Spear phishing; Vishing (voice attacks); Smishing (SMS); Tailgating Baiting
- 2.4How attackers exploit trust, urgency, fear, curiosity
- 2.5Human vs computer-based social engineering
- 2.6Common workplace targets
- 2.7Sample phishing email breakdown
- 2.8Scenario based learning: Fake bank calls; Fake HR/payroll messages; Fake IT support incidents; CEO Fraud / Business Email Compromise
- Malware, Password Risks, Wi-Fi Threats13
- 3.1What is malware?
- 3.2Viruses, worms, trojans, ransomware, spyware
- 3.3How malware spreads
- 3.4Warning signs of malware infection
- 3.5Brute force attacks
- 3.6Credential stuffing
- 3.7High-risk password behaviours
- 3.8Demo: how weak passwords get cracked
- 3.9Man-in-the-middle attacks
- 3.10Evil Twin Wi-Fi traps
- 3.11Snooping / packet sniffing
- 3.12Why VPN & HTTPS matter
- 3.13What not to do on public Wi-Fi
- Cyber Hygiene & Everyday Protection11
- 4.1Strong & unique passwords
- 4.2Avoid oversharing, unsafe downloads, unattended devices
- 4.3Regular software updates
- 4.4Backups & versioning
- 4.5MFA in daily life
- 4.6Spotting fake apps / fake websites
- 4.7Myths & Misconceptions: “I’m too small to be hacked”; “Antivirus is enough”; “Mac/iPhone can’t get hacked”; “VPN makes public Wi-Fi completely safe”
- 4.8Hands-On Simulation: A phishing identification challenge (spot the red flags)
- 4.9A password strength meter exercise
- 4.10Workplace cyber hygiene checklist
- 4.11Reporting suspicious activity template



