Training Catalogue

Explore our complete catalogue of cybersecurity training modules and programs. Click any module to learn more or contact us to schedule a session.

Our Training Catalogue

A curated list of modular training courses that can be delivered virtually or in-person.

Phishing Awareness Training

Comprehensive phishing identification and response training with real-world simulation exercises.

  • • Email phishing identification
  • • Social engineering tactics
  • • Spear phishing scenarios
  • • Reporting procedures
  • • Interactive simulations

Password Security Training

Best practices for password creation, management, and multi-factor authentication adoption.

  • • Strong password creation
  • • Password manager usage
  • • Multi-factor authentication
  • • Credential protection
  • • Account security hygiene

Secure Remote Work

Secure remote working practices, VPN usage, home network hygiene and data protection for distributed teams.

  • • Secure VPN and access controls
  • • Home network security
  • • Secure collaboration tools
  • • Data handling while remote
  • • Remote incident reporting

Cloud Security Basics

Fundamentals of cloud security for users and administrators, covering identity, data protection and secure configurations.

  • • Cloud identity & access
  • • Data encryption best practices
  • • Secure configuration basics
  • • Shared responsibility model
  • • Cloud incident awareness

Incident Reporting & Response

Procedures for detecting, reporting, and responding to security incidents for non-technical staff and managers.

  • • Incident identification
  • • Reporting channels and escalation
  • • Basic containment steps
  • • Coordination with IT/Security teams
  • • Post-incident follow-up

Identity & Access Management

Principles of identity management, least privilege, role-based access and secure onboarding/offboarding.

  • • Least privilege principles
  • • Role-based access control
  • • Onboarding & offboarding security
  • • MFA adoption guidance
  • • Credential lifecycle management

Supply Chain Security

Awareness and risk mitigation for third-party suppliers, vendor security and software supply chain threats.

  • • Vendor risk assessment basics
  • • Secure procurement practices
  • • Software supply chain awareness
  • • Third-party monitoring
  • • Contractual security requirements