Cyber Security
Awareness Training

circle arrow down

Manage Cyber Risk by increasing cyber security awareness and skills.

Cyber criminals are targeting organizations of all sizes for fraud, malware, and other nefarious activities. Whilst allocating vast amounts of time, effort and financial resources to secure your critical I.T infrastructure through strong and dependable endpoint, network, application and cloud security is critical, it is also important to consider that technology alone is not enough to secure your infrastructure.

Because the security posture of your organisation is only as strong as your end users, cyber security awareness training plays a critical part in ensuring that your organisation’s infrastructure is safe from compromise. A cybersecurity awareness training program is an excellent way to teach employees to recognize, avoid and report threats, thus reducing cyber risk for your organization.

Structure Of Our Cyber Security Awareness Training

Depending on the preferences of your organisation, we provide cyber security awareness training that is either in-person, through our online cyber security awareness platform or both.

This cyber security awareness training is specifically designed for the end users, but all employees can benefit from it. It’s a good starting point for more advanced audiences like the I.T teams and the executive management, as their training builds on the fundamentals covered in this structure. This course can be customized to tailor the needs of an organization and is offered in multiple formats, ie through our LMS platform or in-person at customers’ premises or at a neutral venue.

  • Lesson 1: Understanding Cybersecurity
    This lesson explains the general concepts of cybersecurity for the delegates to develop a better understanding of the dangers of cyberattacks and how they may be personally impacted.
  • Lesson 2: Cyber Attacks
    This lesson introduces the different types of cyber attacks and their characteristics. Several examples of cyber-attacks are covered, along with useful tips on how to avoid being a victim of these common attacks.
  • Lesson 3: Protecting Business Assets
    This lesson is focused on raising  awareness on adopting a security awareness culture to actively protect your organisation.  Physical security, protection of corporate data, and application security are also covered.
  • Lesson 4: Browsing the Internet Securely
    This lesson teaches your employees how to browse the Internet safely and securely to protect their privacy and defend against cyberattacks. They will also learn to identify unsafe or suspicious sites so they can be avoided.
  • Lesson 5: Email Security
    This lesson addresses cybersecurity risks associated with the use of email and provides numerous tips on how to avoid phishing and other dangerous attacks.
  • Lesson 6: Password Management
    Password management is one of the biggest challenges in people’s digital life. This lesson covers good password practices and how to create complex passwords. It also shares techniques to further enhance security with the use of multi-factor authentication.

This course is specifically designed for the IT staff that is charged with the responsibility of maintaining an organisation’s technology infrastructure. It’s an advanced level course that builds on the fundamentals learnt in the cyber security awareness training for individuals. This course can be customized to tailor the needs of an organization and is offered in multiple formats, ie through our LMS platform or in-person at customers’ premises or at a neutral venue.

  • Lesson 1: Understanding Privacy & Cybersecurity
    This lesson covers the general concepts of cybersecurity and privacy for the audience to develop a better understanding of privacy and the dangers of cyberattacks and how they may be personally impacted. It also addresses identity theft and other privacy issues.
  • Lesson 2: Protecting Business Assets
    This lesson is focused on raising awareness on adopting a cyber security aware culture that actively protects business assets, such as equipment, computer devices, and people. Physical security, protection of corporate data, and application security are also discussed in this lesson.
  • Lesson 3: How Cyber Attacks Are Done
    This lesson covers the general concepts of how cyber attacks are carried out by cyber criminals. It covers basic malware attacks and more targeted attacks that are best explained using penetration testing frameworks like the SANS Pentest Methodology, the MITRE ATT&CK framework, and NIST SP800-115.
  • Lesson 4: Detecting and Combating Cyber Attacks
    This lesson covers  how to detect, prevent and  respond to cyber-attacks. It also covers the tools and processes on how to properly configure, monitor and analyse computer networks for suspicious activities.
  • Lesson 5: Handling and Responding to Computer Misuse And Cyber Attacks
    This lesson covers the misuse of computers and post-breach incident response phase, focusing on how to properly collect, store and document digital evidence in a manner that will be admissible in a court of law.
  • Lesson 6: Email And Website Security
    This lesson addresses cybersecurity risks associated with emails and websites and provides numerous tips on how to secure them from cyber-attacks.
  • Lesson 7: Password Management
    Password management is one of the biggest challenges in people’s digital life. This lesson explains how password managers can be used to easily create complex, secure passwords and eliminate the need to memorizing them. It also shares techniques to further enhance mobile security with the use of authenticator apps and multi-factor authentication.

This course is specifically designed for the executive management charged with the responsibility of planning, leading, organising and controlling the strategic direction that a business should operate within to achieve business objectives. It provides a high level strategic approach to the lessons learnt in the cyber security awareness training for end users and IT staff.

  • Lesson 1: Understanding Computers & Cybersecurity
    This lesson explains the general concepts of cybersecurity and privacy so the students have a better understanding of privacy and the dangers of cyberattacks and how they may be personally impacted. It also addresses identity theft and other privacy issues.
  • Lesson 2: Understanding Cyber Attacks
    This lesson is focused on identifying several examples of cyber-attacks, along with useful tips on how to avoid being a victim of these common attacks.
  • Lesson 3: Protecting Business Assets
    This lesson is focused on raising students’ awareness so they can be part of a security culture that actively protects business assets, such as equipment, computer devices, and people. Physical security, protection of corporate data, and application security are also discussed in this lesson.
  • Lesson 4: Browsing the Internet Securely
    In this lesson, the students will learn how to browse the Internet securely to protect their privacy and defend against cyberattacks. They will also learn to identify unsafe or suspicious sites so they can be avoided.
  • Lesson 5: Email Security
    This lesson addresses cybersecurity risks associated with the use of email and provides numerous tips on how to avoid phishing and other dangerous attacks.
  • Lesson 6: Password Management
    Password management is one of the biggest challenges in people’s digital life. This lesson covers good password practices and how to create complex passwords. It also shares techniques to further enhance security with the use of multi-factor authentication.
  • Lesson 7: Cyber Risk Management
    This lesson provides a high level approach to the concept of risk management in the context of cyber security.
  • Lesson 8: Compliance Management – Data Protection Act
    This lesson provides a high level approach to the compliance management function in the context of Zimbabwe cyber security laws and industry best cyber security standards.
  • Lesson 9: Cyber Security Financing
    This lesson covers the financing and budgeting need for cyber security. It covers issues such as:

    • Understanding Cyber Security Program Funding
    • Analyzing, Forecasting, and Developing a Security Budget
    • Managing the information Security Budget
    • Understanding Cyber Security Program Procurement Process
    • Procurement Risk Management