Security Awareness Training Outline
A comprehensive training outline covering six modules across 180minutes. Use this outline to build or evaluate your organization's security awareness training program.
Module 1: Phishing and Email Security
45 minutesTeach employees to identify, avoid, and report phishing attempts across email, SMS, and voice channels.
Types of Phishing Attacks
Spear phishing: Targeted attacks using personalized information gathered from social media, company websites, and public records.
Business Email Compromise (BEC): Impersonation of executives, vendors, or partners to request wire transfers, gift cards, or sensitive data.
Smishing and vishing: Phishing via SMS text messages and voice calls that create urgency to bypass critical thinking.
Credential harvesting: Fake login pages designed to capture usernames and passwords.
QR code phishing (quishing): Malicious QR codes embedded in emails, documents, or physical media.
Red Flags to Watch For
Urgent or threatening language designed to bypass critical thinking.
Sender address discrepancies (similar but not identical domain names).
Unexpected attachments or links, especially from unknown senders.
Requests for sensitive information, credentials, or financial transactions.
Grammar and formatting inconsistencies (though AI-generated phishing is increasingly polished).
Hands-On Exercise
Review 10 sample emails and identify which are legitimate and which are phishing attempts.
Practice reporting a suspicious email using the organization's phishing report button or forwarding procedure.
Module 2: Social Engineering
30 minutesBuild awareness of manipulation techniques attackers use beyond email to trick employees into revealing information or granting access.
Common Techniques
Pretexting: Creating a fabricated scenario (e.g., posing as IT support) to extract information or gain access.
Tailgating and piggybacking: Following authorized personnel through secured doors or access points.
Baiting: Leaving infected USB drives or devices in common areas for employees to find and plug in.
Watering hole attacks: Compromising websites frequently visited by target employees.
Impersonation: Posing as vendors, delivery personnel, or new employees to gain physical or logical access.
Defense Strategies
Always verify the identity of callers and visitors through independent channels before providing access or information.
Never share credentials, access badges, or security codes with anyone, including colleagues and IT staff.
Challenge unfamiliar individuals in secure areas and report suspicious behavior.
Follow the principle of least information: share only what is necessary and relevant.
Module 3: Password and Authentication Security
30 minutesEstablish strong password practices and understanding of multi-factor authentication.
Password Best Practices
Use unique passwords for every account. Never reuse passwords across personal and work accounts.
Use passphrases of 16 or more characters combining unrelated words (e.g., "correct horse battery staple").
Use an approved password manager to generate and store complex, unique passwords securely.
Never write passwords on sticky notes, whiteboards, or in unencrypted documents.
Never share passwords via email, chat, or phone, even with IT support.
Multi-Factor Authentication (MFA)
Understand why MFA is required: passwords alone are insufficient to protect against credential theft.
Learn to use the organization's approved MFA method (e.g., Microsoft Authenticator, FIDO2 key).
Recognize MFA fatigue attacks: never approve an MFA prompt you did not initiate.
Report repeated unexpected MFA prompts to IT Security immediately.
Module 4: Device and Endpoint Security
30 minutesEnsure employees understand how to secure their workstations, laptops, and mobile devices.
Workstation Security
Lock your workstation when stepping away (Windows: Win+L, Mac: Ctrl+Cmd+Q).
Enable automatic screen lock after 5 minutes of inactivity.
Do not disable or interfere with endpoint protection software (antivirus, EDR).
Install software only from approved sources and through the organization's software catalog.
Connect to the corporate VPN when working from public or untrusted networks.
Mobile Device Security
Enable device encryption and biometric or PIN lock on all mobile devices used for work.
Keep device operating systems and apps updated to the latest versions.
Do not jailbreak or root devices that access organizational data.
Use the organization's Mobile Device Management (MDM) solution and do not remove management profiles.
Report lost or stolen devices to IT Security immediately for remote wipe.
Physical Security
Do not leave laptops unattended in vehicles, conferences, or public spaces.
Use privacy screens when working with sensitive data in public areas.
Secure portable storage devices (USB drives, external hard drives) when not in use.
Follow clean desk policies: lock sensitive documents in drawers at the end of the day.
Module 5: Data Handling and Classification
30 minutesTrain employees on how to identify, handle, and protect different types of organizational data.
Data Classification Levels
Public: Information intended for public release with no restrictions on distribution.
Internal: Information for internal use only that should not be shared externally without authorization.
Confidential: Sensitive business information requiring protection (financial data, strategic plans, HR records).
Regulated: Data subject to regulatory requirements (CUI, PII, PHI, PCI data) with specific handling obligations.
Handling Requirements
Apply sensitivity labels to documents and emails according to the data classification policy.
Encrypt sensitive data before sharing via email or file transfer.
Use approved file sharing platforms (SharePoint, OneDrive) instead of personal email or consumer cloud storage.
Do not store sensitive data on local desktops, personal devices, or unapproved cloud services.
Follow data retention and disposal policies. Shred physical documents and securely delete digital files.
AI and Data Handling
Do not enter CUI, PII, PHI, or proprietary data into unapproved AI tools.
Review AI-generated content for accuracy before using it in business operations.
Follow the organization's AI Acceptable Use Policy when using any AI tools for work.
Module 6: Incident Reporting
15 minutesEnsure every employee knows how to recognize and report security incidents quickly and effectively.
What to Report
Suspicious emails, phone calls, or messages (even if you did not click or respond).
Unexpected MFA prompts, password reset requests, or account lockouts.
Lost or stolen devices, badges, or keys.
Unusual system behavior: pop-ups, slow performance, unexpected software installations.
Suspected data exposure: accidentally sending sensitive data to the wrong recipient.
Physical security concerns: tailgating, unknown individuals in secure areas, propped-open doors.
How to Report
Use the phishing report button in Outlook or your email client for suspicious emails.
Contact IT Security via [phone number / email / ticketing system] for other security incidents.
Do not attempt to investigate or remediate incidents on your own.
Preserve evidence: do not delete suspicious emails, do not shut down or restart compromised systems.
Time is critical: report immediately rather than waiting to gather more information.
After Reporting
The IT Security team will acknowledge your report and provide next steps.
You may be asked to provide additional details or preserve specific evidence.
There is no penalty for reporting false positives. Reporting is always encouraged.
Your report helps protect the entire organization. Every report matters.
Need a Custom Training Program?
Our team can develop and deliver a customized security awareness training program tailored to your industry, compliance requirements, and organizational culture.