Cyber Safety: Empowering Employees in Digital Defence

Cyber Safety: Empowering Employees in Digital Defence

Be Informed.
Be Protected.

Keep your organisation protected with essential cybersecurity awareness knowledge.

This cybersecurity awareness training is designed to equip employees with the knowledge and skills necessary to identify, respond to, and report cybersecurity threats, with a special focus on phishing attacks. Participants will learn through interactive activities, discussions, and real-world examples, fostering a culture of cybersecurity mindfulness in the workplace.


Learning Outcomes: 

Organisation-specific Content

  • Explanation and showcase of current cybersecurity initiatives by technical team
  • Tailored to address specific cybersecurity risks and policies relevant to the organisation
  • Meet internal audit requirements quickly & effectively

Interactive & Practical Learning

  • Hands-on cybersecurity awareness activities
  • Real-world scenarios to demonstrate risks
  • Interactive discussion to contextualise and reinforce learning within teams

Facilitation

  • Facilitator-led to ensure knowledge retention
  • Emphasis of behavioural risks compromise organisational cybersecurity
  • Learn up-to-date information from cybersecurity personnel

Comprehensive Course Materials

  • Provision of cybersecurity quick reference guides for post-course reference
  • Checklists for phishing email identification
  • Tips for maintaining digital hygiene

Real-world Phishing Exercises

  • Context-specific phishing demonstrations
  • Post-training phishing exercise

Follow-Up Support

  • Access to online tools and reading resources for continuous learning and reinforcement of cybersecurity best practices
Question text goes here
  • Become familiar with different attack scenarios

Course Syllabus:

Chapter 01
Understanding Cyber Threats
Question text goes here

Core Business Operations and Cybersecurity:

  • Identify Core Business Activities Tied to Cybersecurity
  • Assessment of Organisation’s Cybersecurity Knowledge
  • Overview of Cybersecurity Threats
  • Real-life Case Studies

IT Asset Management:

  • Identify and list essential business assets.
  • Best practices for asset management.
  • Regularly updating the company's asset list.

Industry-Specific Cybersecurity and Privacy Regulations:

  • Define your industry concerning cybersecurity.
  • Recognize and comply with industry-specific regulations.
  • Understand and protect sensitive business information.

IT Assets, Business Operations, and Regulations Synthesis:

  • Identify key software and hardware.
  • Assess IT asset downtime impact.
  • Understand Service Level Agreements (SLAs) and potential breach impacts.

Business Resilience Planning:

  • Develop a Maintenance Plan.
  • Recognize incidental security features.
  • Understand regulatory impacts and potential cybersecurity failures.

Financial Aspects of Cybersecurity:

  • Business Continuity Planning (BCP) basics and importance.
  • Disaster Recovery Plan (DRP) importance and formulation.
  • Evaluate cybersecurity costs, risks, and risk assessment.

Corporate Cyber Hygiene:

  • Introduction to cyber hygiene.
  • Best practices for enhancing cybersecurity.
  • Address human risk factors and fostering a cyber-safe culture.

Open-source Intelligence (OSINT)

  • Phishing Awareness with live demonstration
  • Types of Online Information
  • OSINT Tools Overview
  • Hands-on Exercise with Shodan

Linux Fundamentals

  • Role in Modern IT Systems
  • Overview of Linux Distributions
  • Hands-on: Basic Command Practice

Password Security

  • Importance of Password Hygiene
  • Brute Force Attacks: Introduction, Demonstration, and Defence
  • Password Best Practices
  • Creating & Managing Passwords
  • Using Password Managers
  • Secure Password Sharing

MITRE ATT&CK Framework

  • Real-World Use Cases
  • Practical Application

CIA Triad Framework

  • Introduction
  • Real-World Case Studies
  • Application in Business Cybersecurity

Cyber Response Playbook

  • The Need for a Playbook
  • Responding to Business Email Compromise (BEC)
  • Creation of BEC Standard Operating Procedures (SOPs)
  • Cultivating Cyber Vigilance

Email Cybersecurity

  • Procedures for Inspecting Suspicious Emails
  • Importance of Email System Hygiene
  • Introduction to Secure Email Gateway (SEG)
  • Protocols for Incident Reporting

Simulated Cybersecurity Threat Scenario

  • Defence Strategy Against Simulated Cyberattacks
  • Identifying and Addressing Breaches
  • Investigation and Reporting Protocols

Chapter 02
Cyber Threats & Defence Techniques
Question text goes here
  • Become familiar with different attack scenarios
Chapter 03
Question text goes here
  • Become familiar with different attack scenarios
Chapter 04
Question text goes here
  • Become familiar with different attack scenarios
Chapter 05
Question text goes here
  • Become familiar with different attack scenarios

Training Schedule:

Tailored To Client
Question text goes here

Training Methodology:

Interactive Training

  • Demonstration of real cybersecurity scenarios
  • Continuous engagement and hands-on training
  • Real-time simulation of cyber risks

Threat & Adversary Alignment

  • Based on real-world cyber threats
  • Understanding of latest risk vectors
  • Practical and effective defence solutions
Question text goes here
  • Become familiar with different attack scenarios

FAQs:

What is the minimum pax for this programme?

  • A minimum of 20 pax is required for this programme

Who is this programme for?

  • This programme is for organisations that would like to enhance their cybersecurity protection amongst non-technical staff members. It is suitable for both managerial and non-managerial positions.

Can this programme be conducted online?

  • Yes, we can deliver the programme online if preferred by you.
Question text goes here
  • Become familiar with different attack scenarios
Quick Info
Programme Fee
Custom Pricing
Duration
Tailored To Client
Schedule
Tailored To Client
Teacher-to-Student Ratio
1:50
Delivery Mode
Online or On-site
Entry Requirement
Register Now

Secure Your Future

Find out more about how we can help you secure your future in cybersecurity

Talk to us on
WhatsApp!