Course Content
Orientation
This course teaches employees how to create and manage strong, unique passwords to protect business accounts and data from unauthorized access. Participants learn best practices for building complex passwords, using password managers safely, and avoiding common mistakes like reuse or weak patterns. Understanding the importance of strong passwords helps reduce the risk of cyberattacks and data breaches caused by compromised credentials.
0/2
Passwords and Authentication
A strong password is one that is difficult for others — and even automated tools — to guess or crack. It should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and special symbols (like !, @, or #). Avoid using personal information such as names, birthdays, or common words, as these can be easily discovered through social media or brute-force attacks. Instead, create passwords using random combinations of unrelated words or phrases — for example, “Coffee!Tree4Ocean.” Password managers can also help by securely generating and storing complex passwords for each account. The key to password security is uniqueness: never reuse the same password across multiple systems.
0/6
Phishing and Email Threats
Phishing is a type of social-engineering attack where criminals pretend to be a trusted person or organisation to trick you into revealing sensitive information. This is a very common type of cyber-attack in today's world. As we go through this module we will learn how to identify and mitigate phishing attacks.
0/1
Social Engineering
Malware, Viruses & Ransomware
Safe Internet & Device Usage
Data Protection and Privacy
Physical Security
Protected: Security Awareness Training

Information is one of the most valuable assets an organisation owns.
Think about what your business stores and handles every day:

  • Client records

  • Financial data

  • Employee details

  • Intellectual property

  • Passwords and access credentials

If any of that information is lost, stolen, or manipulated, it can lead to major consequences: financial loss, legal issues (under POPIA), reputational damage, and operational downtime.

Cybersecurity is therefore about protecting information — keeping it confidential, accurate, and available only to those who should have it.