Training Overview

Training signup and provisioning details

Signing your team members up for security training is simple. Enter all the names and email addresses of all users you wish to enroll, or use the bulk enroll option, where you can put this info into a spreadsheet and send it along to Zeguro’s customer support team. 

Once you’ve done these two steps, you’re all finished! Your users will receive a preparation email first, then begin receiving their training assignments via email as well. The Zeguro training dashboard will be updated weekly to show their progress.

Course Details & Training Frequency

The Zeguro security training starts with a skills assessment designed to identify your users’ strengths and weaknesses when it comes to cybersecurity. Identifying weaknesses allows us to prioritize training that your users need most and deliver a tailored training plan for each user. Please note that all users will eventually receive the same training, just in a different order based on their knowledge. 

Users will receive a monthly email with a new course assignment, as well as weekly reminder emails for overdue courses. The monthly email will show all their outstanding courses, so users can easily complete all their work.

A high level overview of Zeguro’s training course contents is below:

  1. Skills Assessment: An initial quiz to identify your users’ current cybersecurity knowledge and any gaps.
  2. 7 Steps to Being Secure at Home: This course identifies crucial actions for working securely at home, which is important for mobile and remote workers
  3. Cloud Security: A crash course in the business benefits and security drawbacks of cloud computing services and platforms
  4. Internet & Email Use: We use email and internet technologies daily to conduct business, so it’s essential to keep security in mind when doing so
  5. Mobile Device Security: This course covers specific concerns for the mobile devices which are increasingly a part of our work lives
  6. Phishing: Since it’s now easier to trick somebody into giving you access than hacking your way in, it’s essential to train your users to spot & avoid such attempts
  7. Physical Security: This course details how physical security measures are required to protect data and information systems
  8. Public Wi-Fi: It’s convenient but not a secure option: how to use and ensure you stay secure on public Wi-Fi
  9. Removable Media: When data goes portable it needs additional protections: how to keep data on removable devices confidential
  10. Secure Passwords & Authentication: Secure credentials are a requirement, and this course highlights best practices for password security and measures like 2- or multi-factor authentication (2FA and MFA)
  11. Social Engineering: Similar to phishing, social engineering exploits human weaknesses, and this course helps your users spot and avoid such attacks
  12. Using Social Media Safely: Details posted on social media can often lead to social engineering attacks or, at worst, data breaches; this course highlights best practices for using social media in a company setting
  13. Working Remotely: Tips and best practices for workers who don’t work in a company-controlled space, including additional elements of mobile device security, public Wi-Fi, and physical security
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.

Contact Us