Home » CyberSAFE


Delivery Method:  Onsite

Inquire for Pricing



Even with millions spent on security infrastructure, all it takes is one employee clicking on one wrong link to compromise critical data and information systems. End-user security awareness is a major issue in the business world today. The threat landscape is complicated, and the typical end-users are unaware of the ways in which they could adversely affect their organization.

With organizations being put under a microscope when it comes to their cybersecurity practices, the costs are too high to overlook the importance of effectively equipping end-users with the skills they need to combat the growing threat of cybercrime.

The CyberSAFE™ class enables employees of any organization to identify many of the common risks associated with using conventional end-user technology, as well as how to safely protect themselves and their organizations from security risks. Delivered in a half-day or less, CyberSAFE™ also prepares learners to earn their Certified CyberSAFE™ credential.

Delivered in a half-day or less, students are immersed in a course that takes them though the essentials of identifying the need for security, effectively securing their devices, and understanding how to navigate through the Internet and email securely.

CyberSAFE™ gives students access to a unique learning platform that incorporates a multitude of ways to learn with video learning, peer-to-peer learning through social communities, checklists for on-the-job support, assessments that check for understanding, and so much more. All of these ensure end-users leave class with the skills necessary to immediately strengthen their organizations’ cybersecurity defenses.

To train is one thing, but to validate knowledge is equally as important. After class, all CyberSAFE™ students can complete the 10-question online assessment to receive the CyberSAFE™ credential. Aimed at validating the knowledge and skills developed during the class, the CyberSAFE™ credential ensures that end-users are equipped with the knowledge necessary to be good stewards of their organizations’ data.

  • Lesson 1: Identifying the Need for Security
    • Topic A: Identify Security Compliance Requirements
    • Topic B: Recognize Social Engineering
  • Lesson 2: Securing Devices
    • Topic A: Maintain Physical Security of Devices
    • Topic B: Use Passwords for Security
    • Topic C: Protect Your Data
    • Topic D: Identify and Mitigate Malware
    • Topic E: Use Wireless Devices Securely
  • Lesson 3: Using the Internet Securely
    • Topic A: Browse the Web Safely
    • Topic B: Use Email Securely
    • Topic C: Use Social Networking Securely
    • Topic D: Use Cloud Services Securely

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

To ensure success in this course, students should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email.

Explore More IT Security Management Courses