Our Training Catalogue
A curated list of modular training courses that can be delivered virtually or in-person.
Phishing Awareness Training
Comprehensive phishing identification and response training with real-world simulation exercises.
- • Email phishing identification
- • Social engineering tactics
- • Spear phishing scenarios
- • Reporting procedures
- • Interactive simulations
Password Security Training
Best practices for password creation, management, and multi-factor authentication adoption.
- • Strong password creation
- • Password manager usage
- • Multi-factor authentication
- • Credential protection
- • Account security hygiene
Secure Remote Work
Secure remote working practices, VPN usage, home network hygiene and data protection for distributed teams.
- • Secure VPN and access controls
- • Home network security
- • Secure collaboration tools
- • Data handling while remote
- • Remote incident reporting
Cloud Security Basics
Fundamentals of cloud security for users and administrators, covering identity, data protection and secure configurations.
- • Cloud identity & access
- • Data encryption best practices
- • Secure configuration basics
- • Shared responsibility model
- • Cloud incident awareness
Incident Reporting & Response
Procedures for detecting, reporting, and responding to security incidents for non-technical staff and managers.
- • Incident identification
- • Reporting channels and escalation
- • Basic containment steps
- • Coordination with IT/Security teams
- • Post-incident follow-up
Identity & Access Management
Principles of identity management, least privilege, role-based access and secure onboarding/offboarding.
- • Least privilege principles
- • Role-based access control
- • Onboarding & offboarding security
- • MFA adoption guidance
- • Credential lifecycle management
Supply Chain Security
Awareness and risk mitigation for third-party suppliers, vendor security and software supply chain threats.
- • Vendor risk assessment basics
- • Secure procurement practices
- • Software supply chain awareness
- • Third-party monitoring
- • Contractual security requirements