Training plan
Module 1: What is computer security?
- The need to secure data
- The threats
- Vulnerabilities
- The attacks
- Exploits
- Countermeasures
Module 2: Social engineering
- Techniques in social engineering
- Phishing
- By call, by text message, by physical presence
- Detection tools
- Example of a phishing website
- Example of phishing emails
- How to detect phishing?
- Demonstration: Detecting Phishing
Module 3: Web browsing safety
- Difficulty erasing your data on the web
- Targeted browsing advertisements
- The security of cookies
- Filtering of inappropriate content
- Disclosure of data on social networks
- The use of private browsing
- Best practices and user behavior
- Application of company policies
- Demo: Start Private Browsing
Module 4: Password Security
- Password policies in corporate environments
- Password too weak
- Password too strong
- The use of a password to access several distinct services
- Multi-factor authentication (MFA)
- Examples of complex passwords
- Demonstration: Is my password secure?
- Demonstration: Changing a password
Module 5: Email Security
- Access to your mailbox
- Transmission of emails in clear text
- Eavesdropping/network interception
- Secure tunnels
Module 6: Malicious software
- The vulnerabilities of failing systems
- User behavior
- Types of malicious software
- Example of ransomware
- Example of fake security software
Module 7: The security of your operating system
- Security with anti-virus
- Software updates
- Good practices
- Demonstration: How do I update my system?
Module 8: Mobile and wireless network security
- Mobility is everywhere
- The growing popularity of mobile devices
- Mobile device security issues
- Wireless network security
- Home, work and public networks
- VPNs for secure remote access
- Demonstration: Explore available wireless networks
Module 9: Identity Theft
- Your information is everywhere
- Where is it stored?
- How secure is it?
- Can your information be stolen?
Recommended prerequisite knowledge
- Basic Computer Literacy: Participants should have a basic understanding of how to use a computer, including tasks such as browsing the internet, using email, and handling basic software applications.
- Familiarity with Organizational Policies: It’s helpful if participants are aware of their organization’s basic policies on IT and data security, though this is not strictly necessary.
- Willingness to Learn: An open mindset and a willingness to learn about cybersecurity best practices are essential, as the training aims to enhance awareness and encourage safer online behavior.
- No Prior Technical Knowledge Required: The training is designed for users of all levels, so no prior technical knowledge or experience in cybersecurity is required.
These prerequisites ensure that participants can engage with the content effectively and apply the lessons learned in their everyday online activities.
Eccentrix Corner article/publication
Cybersecurity Awareness Training
This Cybersecurity Awareness training is designed to provide employees with essential knowledge to recognize, prevent, and respond to common digital threats. In an era where cyberattacks are increasing, this training helps participants understand the basics of cybersecurity and adopt secure practices in their daily activities.
Suitable for all skill levels, this interactive training focuses on risky behaviors, common threats, and best practices for protecting sensitive information in the workplace.
Why Choose This Cybersecurity Awareness Training?
The majority of cyberattacks exploit human errors. Proper awareness is therefore crucial to strengthening an organization’s security. This training provides the tools and skills needed to mitigate risks associated with user behavior.
By educating your teams on best cybersecurity practices, you help protect your organization against data breaches, phishing, and other digital threats.
Main Objectives of the Training
Identify common threats
Learn to recognize phishing attacks, malware, and other digital risks.Adopt secure practices
Master secure behaviors, such as password management and recognizing suspicious links.Protect sensitive information
Understand the importance of data confidentiality and how to avoid accidental exposure.Prevent data breaches
Develop an awareness of risks and learn to mitigate them through proactive practices.Respond to incidents
Gain knowledge of the steps to take in the event of a security incident.
Interactive and Engaging Training
This training is delivered by cybersecurity experts who use real-world scenarios and case studies to engage participants. Interactive modules, quizzes, and discussions foster practical and memorable learning.
Who Should Attend?
- Employees at all levels who want to strengthen their cybersecurity skills
- Operational teams with a key role in data protection
- Managers and leaders who want to raise awareness among their teams about digital threats
- Anyone seeking to understand the basics of cybersecurity in a professional context
Protect Your Business with Enhanced Cybersecurity Awareness
The Cybersecurity Awareness for Users (CS8525) training strengthens the first line of defense for your organization: its employees. Enroll today to create a culture of proactive security and reduce the risks of cyberattacks.
Frequently asked questions - Cybersecurity awareness training (FAQ)
What topics are covered in the training?
The training includes cybersecurity basics, phishing attacks, password management, and incident response.
Is this training suitable for non-technical users?
Yes, it is designed to be accessible to everyone, regardless of their technical experience.
How does this training help prevent cyberattacks?
By learning to identify and avoid common threats, participants reduce the risk of security breaches.
What tools or resources are provided during the training?
Participants receive educational materials, practical tips, and concrete examples.



