Course Content
Orientation
This course teaches employees how to create and manage strong, unique passwords to protect business accounts and data from unauthorized access. Participants learn best practices for building complex passwords, using password managers safely, and avoiding common mistakes like reuse or weak patterns. Understanding the importance of strong passwords helps reduce the risk of cyberattacks and data breaches caused by compromised credentials.
0/2
Passwords and Authentication
A strong password is one that is difficult for others — and even automated tools — to guess or crack. It should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and special symbols (like !, @, or #). Avoid using personal information such as names, birthdays, or common words, as these can be easily discovered through social media or brute-force attacks. Instead, create passwords using random combinations of unrelated words or phrases — for example, “Coffee!Tree4Ocean.” Password managers can also help by securely generating and storing complex passwords for each account. The key to password security is uniqueness: never reuse the same password across multiple systems.
0/6
Phishing and Email Threats
Phishing is a type of social-engineering attack where criminals pretend to be a trusted person or organisation to trick you into revealing sensitive information. This is a very common type of cyber-attack in today's world. As we go through this module we will learn how to identify and mitigate phishing attacks.
0/1
Social Engineering
Malware, Viruses & Ransomware
Safe Internet & Device Usage
Data Protection and Privacy
Physical Security
Protected: Security Awareness Training

Cybersecurity isn’t just an IT problem – it’s a people problem.

 

Every employee, from the reception through to senior management, all play a vital role in protecting the organization’s data, systems, and reputation.
This introduction sets the stage for what cybersecurity awareness is all about and why your everyday actions directly impact your company’s safety and success.

The module will cover the following:

  1. The reality of today’s digital world
  2. The value of information
  3. The human factor
  4. Everyone has a roll to play
  5. Quiz

 

At the end of this module:

  • Understand the growing threat landscape – describe how cyber threats have evolved and identify common attack types that affect South African organizations and individuals.

  • Recognize the value of information – explain why company and personal data are valuable assets that must be protected against unauthorized access or loss.

  • Identify common human errors that lead to breaches – list examples of risky behaviors such as weak passwords, phishing clicks, or sharing sensitive information.

  • Understand individual responsibility – explain how each employee’s daily actions contribute to the organization’s overall security posture.

  • Appreciate the role of awareness training – outline how this course will help build a proactive, security-conscious culture across the company.