IT Security Awareness Preparatory Workshop I
In today’s digital world, IT security awareness is mission-critical. This workshop will prepare you for the “XAware Certification”, which empowers professionals to anticipate and neutralize modern cyber threats by engaging with real-world scenarios, leveraging cutting-edge tools, and cultivating a proactive, security-first mindset.
Overview
Become Exam-Ready. Become Threat-Ready.
Preparing for the IT Security Awareness & Human Risk Mastery Certification?
This workshop gives you the clarity, confidence, and practical skills you need to pass with ease and stand out as a true defender in your organization.
Why This Workshop?
The certification is built on real-world scenarios, human-risk decision making, and modern cybersecurity principles. This workshop accelerates your learning and ensures you’re fully prepared for every type of question you’ll face. Whether you’re starting your security journey or leveling up your professional skills, this workshop arms you with the knowledge and applied awareness required to excel.
What You’ll Experience
A hands-on, immersive learning environment designed to mirror the exam and real-world security challenges.
Deep-Dive Threat Breakdown
Understand the attack patterns, human-risk behaviors, and emerging threats that shape today’s cybersecurity landscape.
Scenario-Based Practice
Work through guided challenges that mirror the structure, complexity, and reasoning style of the certification exam.
Who Should Join?
Perfect for:
- Aspiring cybersecurity professionals
- Security awareness leaders
- Human risk practitioners
- Analysts and IT staff
- Anyone preparing for the certification
No technical background required, just the desire to learn, improve, and protect your organization.
Results You Can Expect
By the end of this workshop, you will:
- Understand the behavioral, technical, and governance concepts behind the certification
- Confidently analyze real-world security scenarios
- Recognize subtle human risk patterns
- Strengthen decision-making under pressure
- Increase your readiness—and your score
You won’t just prepare for an exam. You’ll prepare to think, act, and communicate like a security professional.
Ready to Become Exam-Ready?
Join the IT Security Awareness Preparatory Workshop and step into your certification with complete confidence.
Master the material.
Think like a defender.
Pass with certainty.
Curriculum
- 5 Sections
- 72 Lessons
- 30 Days
- Phase 1 — Baseline Concepts (Foundations)9
- 1.1Lesson 1: Zero Trust — “Never trust, always verify.”
- 1.2Lesson 2: Social Engineering — “Attacks that trick people, not computers.”
- 1.3Lesson 3: Human Risk Scoring — Understanding how risky behaviors affect security
- 1.4Lesson 4: Phishing & Business Email Compromise (BEC) — “Email attacks that pretend to be trustworthy.”
- 1.5Lesson 5: PCI DSS v4.0 — Protecting payment card information
- 1.6Lesson 6: NIST Cybersecurity Framework (CSF) — A roadmap for managing cyber risk
- 1.7Lesson 7: COBIT — Aligning security practices with business goals
- 1.8Lesson 8: Awareness Culture Building — Creating a security-first mindset
- 1.9Lesson 9: Behavioral Metrics — Measuring what people actually do
- Phase 2 — Scenario-Based Examples46
- 2.1How to Identify Phishing Emails – Tips & Tricks
- 2.2PHISHING — Scenario 1: “Payroll Update Request” (Credential Harvesting)
- 2.3PHISHING — Scenario 2: “Invoice from a Vendor You Don’t Know” (Attachment Malware)
- 2.4PHISHING — Scenario 3: “CEO Asking for Gift Cards” (BEC Social Engineering)
- 2.5PHISHING — Scenario 4: Payroll Suspension Notice (Credential Harvesting)
- 2.6PHISHING — Scenario 5: Fake Microsoft 365 Security Alert (Account Takeover Attempt)
- 2.7PHISHING — Scenario 6: Spoofed CEO “Quick Approval Needed” Email (BEC Impersonation)
- 2.8PHISHING — Scenario 7: File-Sharing Notification (Drive/Dropbox) Asking for Login
- 2.9PHISHING — Scenario 8: Shipping Notification from “FedEx/UPS” with Tracking Link
- 2.10PHISHING — Scenario 9: “Your Password Expires Today” (IT Impersonation)
- 2.11PHISHING — Scenario 10: HR Survey Request (Sensitive Data Harvest)
- 2.12PHISHING — Scenario 11: Fake “Security Awareness Test” Email (Training Spoof)
- 2.13PHISHING — Scenario 12: “Shared Augmented-Reality Workspace Invite” (Cutting-Edge Collaboration Tool Phish)
- 2.14How to identify Vishing Calls – Tips & Tricks
- 2.15VISHING — Scenario 1: “IT Support Asking for MFA Code”
- 2.16VISHING — Scenario 2: “Fake Bank Security Call”
- 2.17VISHING — Scenario 3: “CEO Calling From a Personal Phone” Executive Impersonation
- 2.18VISHING — Scenario 4: “Utility Shutoff Scam” Operational Disruption Threat
- 2.19VISHING — Scenario 5: “External Auditor Verification” Data Exfiltration Attempt
- 2.20VISHING — Scenario 6: “Package Delivery Verification Call” Multi-Stage Identity Attack
- 2.21VISHING — Scenario 7: “IT Asset Recovery Call” Equipment & Identity Fraud
- 2.22VISHING — Scenario 8: “Health Benefits Update Finalization Call” HR Impersonation for PII Theft
- 2.23INSIDER-THREAT — Scenario 1: “Employee Downloading Files Before Leaving Job”
- 2.24INSIDER-THREAT — Scenario 2: “Privileged Administrator Accessing HR Files Without a Ticket”
- 2.25INSIDER-THREAT — Scenario 3: “Employee Sharing Internal Documents with Personal Email”
- 2.26INSIDER-THREAT — Scenario 4: “Contractor Accessing Systems After Their Engagement Ends”
- 2.27INSIDER-THREAT — Scenario 5: “Employee Bypassing Security Controls Using Shadow IT”
- 2.28INSIDER-THREAT — Scenario 6: “Insider Manipulating Logs to Hide Unauthorized Activity”
- 2.29INSIDER-THREAT — Scenario 7: “Employee Printing Confidential Reports and Leaving Them Unattended”
- 2.30INSIDER-THREAT — Scenario 8: “Employee Falling for Spear-Phishing and Entering Credentials”
- 2.31How to Identify Text Message Phishing (Smishing) – Tips & Tricks
- 2.32SMISHING — Scenario 1: “Bank Fraud Alert – Confirm or Your Account Will Be Frozen”
- 2.33SMISHING — Scenario 2: “Your Friend Sent You Photos – Click to View”
- 2.34SMISHING — Scenario 3: “Workplace Survey – Mandatory for All Staff”
- 2.35SMISHING — Scenario 4: “Your Organization Requires Security Verification – Log In Here”
- 2.36SMISHING — Scenario 5: “Your Tax Refund Is Available – Click to Claim”
- 2.37SMISHING — Scenario 6: “Your Apple/Google ID Will Be Locked – Verify Now”
- 2.38SMISHING — Scenario 7: “Package Delivery Attempt Failed – Pay $1.99 to Reschedule”
- 2.39SMISHING — Scenario 8: “You Have Received $5,000 — Log in to Claim Deposit”
- 2.40GOVERNANCE / RISK — Scenario 1: “Incorrectly Stored Credit Card Data” (Compliance Failure)
- 2.41GOVERNANCE / RISK — Scenario 2: “Unapproved Vendor Handling Sensitive Data”
- 2.42GOVERNANCE / RISK — Scenario 3: “Project Launch Without a Risk Assessment”
- 2.43GOVERNANCE / RISK — Scenario 4: “Weak Access Controls for High-Privilege Accounts”
- 2.44GOVERNANCE / RISK — Scenario 5: “No Monitoring or Metrics for Security Awareness Program”
- 2.45GOVERNANCE / RISK — Scenario 6: “Failure to Document an Incident Response Process”
- 2.46Be The Firewall — Spotting Threats in Seconds
- Phase 3 — Learning By Assessments13
- 3.1VISHING — Assessment 1 “Boss” on WhatsApp
- 3.2VISHING — Assessment 2 “IT Support” Urgent Call
- 3.3VISHING — Assessment 3 ACME “$399 Refund” Scam
- 3.4PHISHING — Assessment 1 “ACTION REQUIRED: Account Verification Failure”
- 3.5PHISHING — Assessment 2 “IMPORTANT: Updated Work-from-Home Policy”
- 3.6SMISHING — Assessment 1 “YourBank Alert”
- 3.7SMISHING — Assessment 2 “$5,000 Customer Appreciation Reward”
- 3.8INSIDER-THREAT — Assessment 1 “Disgruntled Employee”
- 3.9INSIDER-THREAT — Assessment 2 “Data Misuse”
- 3.10ZERO-TRUST in Action — Analyzing Access Decisions Through Real-World Scenario
- 3.11PCI DSS v4.x — Understanding Through Human Behavior, Technical Controls, and Business Impact
- 3.12NIST + PCI + COBIT — Governance Risk Case Study
- 3.13Be the Firewall — Advanced IT Security Awareness Scenarios
- Phase 4 — Final Assessment4
- 4.1IT Security Awareness Foundational to Intermediate Scenario Timed Quiz — Set 16 Minutes10 Questions
- 4.2IT Security Awareness Foundational to Intermediate Scenario Timed Quiz — Set 26 Minutes10 Questions
- 4.3IT Security Awareness Advanced & High-Risk Scenario Timed Quiz — Set 16 Minutes10 Questions
- 4.4IT Security Awareness Advanced & High-Risk Scenario Timed Quiz — Set 26 Minutes10 Questions
- Answer Explanations4
- 5.1IT Security Awareness Quiz (Foundational to Intermediate) — Answers Set 1
- 5.2IT Security Awareness Quiz (Foundational to Intermediate) — Answers Set 2
- 5.3IT Security Awareness Advanced & High-Risk Scenario Quiz — Answers Set 1
- 5.4IT Security Awareness Advanced & High-Risk Scenario Quiz — Answers Set 2



