Education is a key factor in gaining better Cyber Awareness and preventing Cyber incidents.  We are in the process of developing online courses and will begin to launch them shortly. Courses that are already launched online will have a 'Sign Up Here' link. All courses are both online and in person courses. Although the online versions complement the in person programs taking the online component of itself will be a benefit.

Current topics.

  • Parental awareness
    • Is this a breach of our kids’ privacy?
    • Tricks that kids use to bypass your security
    • Overview of clear web, deep web and dark web
    • Respecting privacy.
    • Communication is key
    • Getting involved online
    • What to do if something happens.
  • Cyber for pre-teens
    • Communication is key
    • Dangers of online surfing, chatrooms
    • Online safety
    • What to do and not do
    • Webcam security
    • Location, location, location
    • What to do if you need help
  • Cyber for Teens (Sign Up Here)
    • What is Cyber?
    • The Internet of Things
    • What is a digital footprint?
    • Social media
    • The dangers and benefits of Cyber 
    • Cyber attacks
    • Securing your digital world
    • Prevention and intervention
  • Cyber for seniors.
    • Securing your data
    • What will never happen
    • Scams that target seniors
    • Social engineering
    • Online transactions
    • How to prevent being a victim.
  • Employee best practices
    • Common mistakes new and old employees make
    • Passwords security and creation
    • Multi-factor Authentication
    • Risk of removable media
    • Danger of social media on company networks
    • Posting work photos on personal social media accounts
    • Logging into public WIFI’s
    • Tele-working
    • Email risks and security
    • Overview of phishing attacks
  • How to avoid Phishing attacks
    • What/Who/When Phishing
      • What is it
      • Who does it?
      • When do they do it?
    • Spam – how do I stop it?
    • Examples of phishing emails.
    • Has your data been compromised?
    • How to protect yourself and your business from Phishing attacks.
  • Identifying corporate Cyber Scams
    • Who/What/When cyber crimes?
      • Examples of cyber crimes
      • Who does it?
      • How do they do it.
    • How to protect yourself and your business from cyber crimes
    • Cryptocurrency
    • Ransomware
    • Social engineering
    • DDOS attacks
    • Spear phishing
    • Removable media attacks
  • Ransomware and how to avoid it
    • Who/What/When Ransomware
      • Examples of Ransomware
      • How to identify ransomware emails/links etc.
      • How it works
    • Ways a company can prevent Ransomware attacks
    • How did it get in?
    • Backing up and restoring
    • What to do if something happens
    • Cryptocurrency
    • Tracing the bad actor
  • Combating Social Engineering
    • Who/What/when Social Engineering?
      • Examples of Social Engineering
      • Why they do it?
      • How does it affect your company?
    • How to protect yourself and your company from Social Engineering
    • Examples of social engineering
  • Securing your digital world
    • Why do I need to protect it?
    • OSINT
    • Have I been compromised?
    • How to protect your data.
      • VPN
      • Passwords
      • Pin codes
    • Making your data private.
    • How to protect your data.
  • Securing your home
    • Private VPN’s and Routers
    • Filtering of content
    • Data backups
    • Webcam security
    • Antivirus and data security
    • Securing your network
  • The Open web, Deep web, and Dark web
    • What is each one
    • How to identify which one is being used
    • How to find what you are looking for
    • Navigating the web safely
    • Benefits and risks of each one.
  • Cyber attacks - an overview
    • Exploring Cyber attacks
    • Scams, malware, ransomware
    • Tracing the scammers
    • Preventing the attacks
    • Data security
  • Best practices.
    • Passwords
    • Surfing the web
    • Offering personal information
    • Data security
    • Device configuration
    • How to prevent being a victim.
  • What if? - What to do if you or someone you know may have been a victim.
    • Who do I call?
    • Should I try to fix it myself?
    • What will the police do?
    • What information will the police want to know?
    • What next?