Security Training Overview

Managing your security training program

Enrolling your team in training

Enrolling your team members for security training is simple. Enter the names and email addresses of all trainees you wish to enroll, or use the bulk enroll option, where you can put this info into a spreadsheet and send it along to Zeguro’s customer support team. 

Accessing the training program (by your team members)

Once enrolled, your trainees will receive a welcome email letting them know what to expect.  Then, within a week, they will start receiving training assignments with unique links to their online training course.

Your team will be accessing their training through the links sent to them in their emails. Each link is unique to the specific individuals and clicking on the link will take them directly into their individual training course. No login is required. 

Keep track of your team's progress

As your team progress through the training program, the Zeguro training dashboard will be updated weekly to show your team's progress.

The trainee list view shows the average grade for each of your team member along with an average grade for your entire team.

You can click on each team member to see the individual grade for each of their course topic. Inside, you may see 3 types of status for each box:

  1. A letter grade (A, B, C, F) - indicates the trainee has completed that topic and that is the grade that they have received
  2. Not Completed - indicates that a course topic has been assigned but the trainee has not yet completed it.
  3. Blank - indicates that the course topic has not yet been assigned. 

 

Course Details & Training Frequency

The Zeguro security training starts with a skills assessment designed to identify your team's strengths and weaknesses when it comes to cybersecurity. Identifying weaknesses allows us to prioritize training that your users need most and deliver a tailored training plan for each user.

(Please note that all users will eventually receive the same training, just in a different order based on their knowledge.)

Trainees will receive a monthly email with a new course assignment, as well as weekly reminder emails for overdue courses. Courses are due within 7 days of assignment, and users will only receive the weekly reminder email if they are overdue on courses. 

Each of the twelve courses (details below) includes a knowledge comprehension quiz. The passing rate is 70%, and most users need between 30-45 minutes to complete each course and associated quiz. 

Training Course Topics

Here's a high level overview of the 12 training course topics:

  1. 7 Steps to Being Secure at Home: This course identifies crucial actions for working securely at home, which is important for mobile and remote workers
  2. Cloud Security: A crash course in the business benefits and security drawbacks of cloud computing services and platforms
  3. Internet & Email Use: We use email and internet technologies daily to conduct business, so it’s essential to keep security in mind when doing so
  4. Mobile Device Security: This course covers specific concerns for the mobile devices which are increasingly a part of our work lives
  5. Phishing: Since it’s now easier to trick somebody into giving you access than hacking your way in, it’s essential to train your users to spot & avoid such attempts
  6. Physical Security: This course details how physical security measures are required to protect data and information systems
  7. Public Wi-Fi: It’s convenient but not a secure option: how to use and ensure you stay secure on public Wi-Fi
  8. Removable Media: When data goes portable it needs additional protections: how to keep data on removable devices confidential
  9. Secure Passwords & Authentication: Secure credentials are a requirement, and this course highlights best practices for password security and measures like 2- or multi-factor authentication (2FA and MFA)
  10. Social Engineering: Similar to phishing, social engineering exploits human weaknesses, and this course helps your users spot and avoid such attacks
  11. Using Social Media Safely: Details posted on social media can often lead to social engineering attacks or, at worst, data breaches; this course highlights best practices for using social media in a company setting
  12. Working Remotely: Tips and best practices for workers who don’t work in a company-controlled space, including additional elements of mobile device security, public Wi-Fi, and physical security
Have more questions? Submit a request