top of page

Cybersecurity Fundamentals: A Two-Day Workshop [Online]

Protecting our loved ones

Cybersecurity Fundamentals: A Two-Day Workshop [Online]

Day 1: Introduction and Fundamentals



9:00 AM - 9:30 AM: Registration and Welcome

• Welcome participants and provide an overview of the program.

• Set expectations for the two-day training.



9:30 AM - 10:30 AM: Session 1 - Introduction to Cybersecurity

• Topics Covered:

• What is cybersecurity? Why is it important?

• Key concepts: Confidentiality, Integrity, Availability (CIA Triad)

• Overview of the digital landscape and common security terms

• Activity: Icebreaker quiz on basic digital literacy



10:30 AM - 11:00 AM: Tea/Coffee Break



11:00 AM - 12:30 PM: Session 2 - Understanding Cyber Threats

• Topics Covered:

• Types of threats: Malware, phishing, ransomware, spyware, social engineering

• Real-world examples of cyberattacks

• How cybercriminals operate (motivations, techniques)

• Interactive Activity: Group discussion on personal experiences with cyber threats (if any)



12:30 PM - 1:30 PM: Lunch Break



1:30 PM - 3:00 PM: Session 3 - Cyber Crimes and Their Impact

• Topics Covered:

• Common cybercrimes: Identity theft, online scams, hacking, data breaches

• Case studies of notable cybercrimes

• Consequences for individuals and organizations

• Activity: Small group exercise to analyze a case study of a major cyber incident



3:00 PM - 3:15 PM: Tea/Coffee Break



3:15 PM - 4:30 PM: Session 4 - Introduction to Cybersecurity Laws and Regulations

• Topics Covered:

• Overview of national and international cybersecurity laws

• General Data Protection Regulation (GDPR), Cybersecurity Act, Data Protection Bill

• Importance of compliance and legal implications

• Activity: Interactive Q&A session to clarify participants’ understanding



4:30 PM - 5:00 PM: Recap and Q&A

• Review key points from Day 1

• Open floor for questions and discussion



Day 2: Best Practices and Practical Safeguarding



9:00 AM - 9:30 AM: Welcome Back and Recap of Day 1

• Quick summary of the previous day’s learnings

• Introduction to the agenda for Day 2



9:30 AM - 11:00 AM: Session 1 - Best Practices for Personal Cybersecurity

• Topics Covered:

• Safe internet browsing practices

• Password management and two-factor authentication

• Recognizing and avoiding phishing attempts

• Activity: Hands-on session creating strong passwords using password managers



11:00 AM - 11:15 AM: Tea/Coffee Break



11:15 AM - 12:30 PM: Session 2 - Protecting Devices and Networks

• Topics Covered:

• Securing mobile devices, computers, and home networks

• Importance of software updates and antivirus software

• Safe use of public Wi-Fi and VPNs

• Activity: Interactive demonstration of setting up security features on smartphones and computers



12:30 PM - 1:30 PM: Lunch Break



1:30 PM - 2:30 PM: Session 3 - Protecting Personal and Professional Information

• Topics Covered:

• Identifying and protecting sensitive information

• Social media privacy settings

• Data backup and encryption techniques

• Activity: Participants review and adjust privacy settings on their devices (hands-on exercise)



2:30 PM - 3:30 PM: Session 4 - Cybersecurity Awareness for the Workplace

• Topics Covered:

• Identifying potential threats in a workplace setting

• Establishing a cybersecurity policy at the workplace

• Reporting incidents and responding to cyber threats

• Activity: Role-playing exercise simulating a phishing attack response



3:30 PM - 3:45 PM: Tea/Coffee Break



3:45 PM - 4:30 PM: Group Activity - Building a Cybersecurity Plan

• Participants will be divided into groups to create a simple cybersecurity plan for a fictional organization or individual.

• Each group presents their plan, highlighting key strategies and tools.



4:30 PM - 5:00 PM: Closing Remarks and Feedback

• Summary of key learnings from the program

• Feedback session with participants

• Certificate distribution and closing of the program



Materials Required:



• Projector and screen

• Whiteboard and markers

• Handouts on cybersecurity tips and best practices

• Internet access for demonstrations

• Laptops or mobile devices for participants (optional but recommended)



Expected Outcomes:



By the end of this program, participants should:

• Understand the basic concepts and importance of cybersecurity.

• Be aware of common cyber threats and crimes.

• Gain knowledge about existing cybersecurity laws and regulations.

• Learn practical steps to protect themselves and their digital assets.

• Develop a proactive approach to maintaining cybersecurity awareness.

©Jaeger Consultants International

  • Facebook
  • Twitter
  • LinkedIn
bottom of page