- 5 Sections
- 72 Lessons
- 30 Days
Expand all sectionsCollapse all sections
- Phase 1 — Baseline Concepts (Foundations)9
- 1.1Lesson 1: Zero Trust — “Never trust, always verify.”
- 1.2Lesson 2: Social Engineering — “Attacks that trick people, not computers.”
- 1.3Lesson 3: Human Risk Scoring — Understanding how risky behaviors affect security
- 1.4Lesson 4: Phishing & Business Email Compromise (BEC) — “Email attacks that pretend to be trustworthy.”
- 1.5Lesson 5: PCI DSS v4.0 — Protecting payment card information
- 1.6Lesson 6: NIST Cybersecurity Framework (CSF) — A roadmap for managing cyber risk
- 1.7Lesson 7: COBIT — Aligning security practices with business goals
- 1.8Lesson 8: Awareness Culture Building — Creating a security-first mindset
- 1.9Lesson 9: Behavioral Metrics — Measuring what people actually do
- Phase 2 — Scenario-Based Examples46
- 2.1How to Identify Phishing Emails – Tips & Tricks
- 2.2PHISHING — Scenario 1: “Payroll Update Request” (Credential Harvesting)
- 2.3PHISHING — Scenario 2: “Invoice from a Vendor You Don’t Know” (Attachment Malware)
- 2.4PHISHING — Scenario 3: “CEO Asking for Gift Cards” (BEC Social Engineering)
- 2.5PHISHING — Scenario 4: Payroll Suspension Notice (Credential Harvesting)
- 2.6PHISHING — Scenario 5: Fake Microsoft 365 Security Alert (Account Takeover Attempt)
- 2.7PHISHING — Scenario 6: Spoofed CEO “Quick Approval Needed” Email (BEC Impersonation)
- 2.8PHISHING — Scenario 7: File-Sharing Notification (Drive/Dropbox) Asking for Login
- 2.9PHISHING — Scenario 8: Shipping Notification from “FedEx/UPS” with Tracking Link
- 2.10PHISHING — Scenario 9: “Your Password Expires Today” (IT Impersonation)
- 2.11PHISHING — Scenario 10: HR Survey Request (Sensitive Data Harvest)
- 2.12PHISHING — Scenario 11: Fake “Security Awareness Test” Email (Training Spoof)
- 2.13PHISHING — Scenario 12: “Shared Augmented-Reality Workspace Invite” (Cutting-Edge Collaboration Tool Phish)
- 2.14How to identify Vishing Calls – Tips & Tricks
- 2.15VISHING — Scenario 1: “IT Support Asking for MFA Code”
- 2.16VISHING — Scenario 2: “Fake Bank Security Call”
- 2.17VISHING — Scenario 3: “CEO Calling From a Personal Phone” Executive Impersonation
- 2.18VISHING — Scenario 4: “Utility Shutoff Scam” Operational Disruption Threat
- 2.19VISHING — Scenario 5: “External Auditor Verification” Data Exfiltration Attempt
- 2.20VISHING — Scenario 6: “Package Delivery Verification Call” Multi-Stage Identity Attack
- 2.21VISHING — Scenario 7: “IT Asset Recovery Call” Equipment & Identity Fraud
- 2.22VISHING — Scenario 8: “Health Benefits Update Finalization Call” HR Impersonation for PII Theft
- 2.23INSIDER-THREAT — Scenario 1: “Employee Downloading Files Before Leaving Job”
- 2.24INSIDER-THREAT — Scenario 2: “Privileged Administrator Accessing HR Files Without a Ticket”
- 2.25INSIDER-THREAT — Scenario 3: “Employee Sharing Internal Documents with Personal Email”
- 2.26INSIDER-THREAT — Scenario 4: “Contractor Accessing Systems After Their Engagement Ends”
- 2.27INSIDER-THREAT — Scenario 5: “Employee Bypassing Security Controls Using Shadow IT”
- 2.28INSIDER-THREAT — Scenario 6: “Insider Manipulating Logs to Hide Unauthorized Activity”
- 2.29INSIDER-THREAT — Scenario 7: “Employee Printing Confidential Reports and Leaving Them Unattended”
- 2.30INSIDER-THREAT — Scenario 8: “Employee Falling for Spear-Phishing and Entering Credentials”
- 2.31How to Identify Text Message Phishing (Smishing) – Tips & Tricks
- 2.32SMISHING — Scenario 1: “Bank Fraud Alert – Confirm or Your Account Will Be Frozen”
- 2.33SMISHING — Scenario 2: “Your Friend Sent You Photos – Click to View”
- 2.34SMISHING — Scenario 3: “Workplace Survey – Mandatory for All Staff”
- 2.35SMISHING — Scenario 4: “Your Organization Requires Security Verification – Log In Here”
- 2.36SMISHING — Scenario 5: “Your Tax Refund Is Available – Click to Claim”
- 2.37SMISHING — Scenario 6: “Your Apple/Google ID Will Be Locked – Verify Now”
- 2.38SMISHING — Scenario 7: “Package Delivery Attempt Failed – Pay $1.99 to Reschedule”
- 2.39SMISHING — Scenario 8: “You Have Received $5,000 — Log in to Claim Deposit”
- 2.40GOVERNANCE / RISK — Scenario 1: “Incorrectly Stored Credit Card Data” (Compliance Failure)
- 2.41GOVERNANCE / RISK — Scenario 2: “Unapproved Vendor Handling Sensitive Data”
- 2.42GOVERNANCE / RISK — Scenario 3: “Project Launch Without a Risk Assessment”
- 2.43GOVERNANCE / RISK — Scenario 4: “Weak Access Controls for High-Privilege Accounts”
- 2.44GOVERNANCE / RISK — Scenario 5: “No Monitoring or Metrics for Security Awareness Program”
- 2.45GOVERNANCE / RISK — Scenario 6: “Failure to Document an Incident Response Process”
- 2.46Be The Firewall — Spotting Threats in Seconds
- Phase 3 — Learning By Assessments13
- 3.1VISHING — Assessment 1 “Boss” on WhatsApp
- 3.2VISHING — Assessment 2 “IT Support” Urgent Call
- 3.3VISHING — Assessment 3 ACME “$399 Refund” Scam
- 3.4PHISHING — Assessment 1 “ACTION REQUIRED: Account Verification Failure”
- 3.5PHISHING — Assessment 2 “IMPORTANT: Updated Work-from-Home Policy”
- 3.6SMISHING — Assessment 1 “YourBank Alert”
- 3.7SMISHING — Assessment 2 “$5,000 Customer Appreciation Reward”
- 3.8INSIDER-THREAT — Assessment 1 “Disgruntled Employee”
- 3.9INSIDER-THREAT — Assessment 2 “Data Misuse”
- 3.10ZERO-TRUST in Action — Analyzing Access Decisions Through Real-World Scenario
- 3.11PCI DSS v4.x — Understanding Through Human Behavior, Technical Controls, and Business Impact
- 3.12NIST + PCI + COBIT — Governance Risk Case Study
- 3.13Be the Firewall — Advanced IT Security Awareness Scenarios
- Phase 4 — Final Assessment4
- 4.1IT Security Awareness Foundational to Intermediate Scenario Timed Quiz — Set 16 Minutes10 Questions
- 4.2IT Security Awareness Foundational to Intermediate Scenario Timed Quiz — Set 26 Minutes10 Questions
- 4.3IT Security Awareness Advanced & High-Risk Scenario Timed Quiz — Set 16 Minutes10 Questions
- 4.4IT Security Awareness Advanced & High-Risk Scenario Timed Quiz — Set 26 Minutes10 Questions
- Answer Explanations4
- 5.1IT Security Awareness Quiz (Foundational to Intermediate) — Answers Set 1
- 5.2IT Security Awareness Quiz (Foundational to Intermediate) — Answers Set 2
- 5.3IT Security Awareness Advanced & High-Risk Scenario Quiz — Answers Set 1
- 5.4IT Security Awareness Advanced & High-Risk Scenario Quiz — Answers Set 2
IT Security Awareness Advanced & High-Risk Scenario Quiz — Answers Set 1
Prev
