Module 1: Introduction to Cybersecurity
- Why cybersecurity is important for everyone.
- Examples of common threats (phishing, scams).
Module 2: Understanding Cyber Threats
- What are cyber threats?
- Malware, phishing, social engineering.
- Real-world examples of breaches caused by negligence.
Module 3: Best Practices for Cyber Hygiene
- Creating and managing strong passwords.
- Recognizing phishing emails and scams.
- Safe internet browsing habits.
- The importance of keeping software updated.
Module 4: Protecting Organizational Data
- What constitutes sensitive data and why it matters.
- Handling confidential information responsibly.
Module 5: Using Work Devices Safely
- Do’s and don’ts for laptops, mobile devices, and email.
- Risks of public Wi-Fi and how to mitigate them.
Module 6: Reporting Incidents
- Steps to take if a breach or suspicious activity is detected.
- The importance of prompt reporting to IT/security teams.
Module 7: Phishing Email Identification Exercise
Purpose: Help participants identify suspicious or potentially phishing emails/messages.
Steps:
- Provide examples of emails (legitimate vs. suspicious).
- Participants identify phishing red flags, such as:
- Informal language or spelling errors.
- Unrelated or suspicious links.
- Requests for personal/financial information.
Activity:
- Participants evaluate sample emails to determine which are phishing attempts.
- Group discussion on actions to take (e.g., avoid clicking links, report to authorities).
Module 8: Strong Password Creation Exercise
Purpose: Educate participants on creating and managing secure passwords.
Steps:
- Explain strong password criteria (length, mix of uppercase, lowercase, numbers, symbols).
- Show examples of weak ("123456") vs. strong ("R#8tM19t#uXw") passwords.
Activity:
- Participants create strong passwords and store them securely.
- Introduce password managers for managing multiple passwords.
Module 9: Identifying Unsafe Websites Exercise
Purpose: Teach participants how to recognize unsafe websites (e.g., malware or fake sites).
Steps:
- Signs of unsafe websites:
- Missing padlock/HTTPS in the URL.
- Unprofessional design (e.g., excessive pop-ups, irrelevant links).
Activity:
- Participants evaluate a list of URLs to determine safety based on taught indicators.
Module 10: Two-Factor Authentication (2FA) Exercise
Purpose: Explain 2FA and its role in securing online accounts.
Steps:
- How 2FA works (e.g., password + code sent to phone/email).
Activity:
- Demo: Enable 2FA on accounts (e.g., Google, Facebook).
- Participants enable 2FA on their accounts (with guidance if needed).
Module 11: Avoiding Malicious Software Exercise
Purpose: Teach participants to avoid downloading harmful/unauthorized software.
Steps:
- Explain malware risks (e.g., via downloads/suspicious links).
Activity:
- Participants distinguish between legitimate and untrustworthy apps / software.
- Teach how to verify reviews / official sources before downloading.
Module 12: Privacy Settings on Social Media Exercise
Purpose: Highlight the importance of privacy on social media.
Steps:
- Risks of oversharing (e.g., address, phone number, personal photos).
- Review privacy settings (e.g., limiting post visibility to friends).
Activity:
- Participants update privacy settings on their social media accounts.
- Discussion on real-world risks of exposed personal data.
Module 13: Reporting Suspicious Activity Exercise
Purpose: Teach participants to report suspicious activity (e.g., hacked accounts, phishing).
Steps:
- How to report phishing emails/suspicious activity on platforms (e.g., Google, banking apps).
Activity:
- Locate and use the "Report" feature on websites/apps.
Module 14: Ransomware Attack Simulation (Theoretical Exercise)
Purpose: Explain ransomware and prevention strategies.
Steps:
- What ransomware is, how it spreads (e.g., emails / downloads), and its impact.
- Prevention: Avoid suspicious emails, back up data, update security software.
Activity:
- Theoretical scenario: Participants outline steps to mitigate/respond to a ransomware attack.