Cyber Security is not simply an investment you make. It is an entity in itself and to be truly effective requires a top-down, big picture perspective with every employee in an organization involved in a team effort. This training prepares its trainees with fundamental cyber security principles and how they relate to organizational structure, procedures and systems.
When individuals can understand how cyber security works as a well-oiled machine instead of observing pieces in isolation or silos, they are empowered to make good decisions and can use this information to apply to their own business ventures and/or future employers substantially raising their value as an asset to themselves and any organization.
About Our Instructor
Frank Fazio is the founder of CySAT Security Inc. and has had the privilege of training public sector employees, executives, law enforcement and security professionals. He has a degree in Computer Science, is certified in Incident Response & Advanced Forensics and has been published in Municipal World magazine and IT World Canada. He has spoken at hacker conferences in New York & Michigan, presented to the Ottawa Police in Ottawa and trained front line employees all over Canada. While presenting in PEI, he was interviewed by CBC News. Over the last 30 years, Frank has held positions in computer programming, database administration, cybersecurity and competes regularly in global hacker competitions.
Past Conference Presentations
- KEYNOTE – OMRON Police Conference – Windsor
- MISA Ontario InfoSec Conference – Toronto
- Ontario SPCA Conference – Niagara Falls
- OMAA Fall Workshop – Muskoka
- BSidesROC Hacker Conference – New York
- CAMFM Annual Conference – Windsor
- Crisis Communication Conference – Ottawa
- AMCTO Conference – Muskoka
- LAS/FCC Risk Management Symposium – Orillia
- RPWCO Conference – Windsor
- MISA Ontario InfoSec Conference – Orillia
- Federation of PEI Municipalities Semi-Annual – PEI
- AMO-MISA-Ontario Municipal Cyber Security 101 Forum – Virtual
- Windsor Essex County Dental Association General Meeting – Virtual
- Municipal Cyber Security 101: What You Need to Know (Panel) – Virtual
- Legal, Cyber & Risk Management Resiliency in a Pandemic – Intact Public Entities – Virtual
- City of Windsor Mayor’s Youth Group – Windsor
- KEYNOTE – MISA INFOSEC 2021 – Virtual
- MISA Cyber Security Awareness Training (Panel) – Virtual
Our Security Courses
Cybersecurity Fundamentals
Day 1 : Morning – Instructor led (9am-12pm) (1-Day)
Module 1: Phishing:
One employee clicking on a malicious email link can bring down your entire company network. Trainees will learn how phishing emails are made, how they work, and why we mistakenly click on them.
Module 2: Ransomware:
Ransomware is a family of malicious programs that block access to your company devices until you pay a ransom fee to its creator. It is often very difficult and expensive to remove. Trainees will be shown some real-life examples of ransomware and how it can disrupt your business.
Module 3: Data breaches:
A data breach can be a disaster for your company. Unfortunately, one of the biggest sources of a data breach isn’t some unknown security bug, it’s human error. Trainees will learn how they can help protect your company network with basic data security knowledge.
Module 4: Social Engineering Attacks:
Trainees will understand how OSINT (Open Source Intelligence) techniques are used to gather information on them. An employee who puts too much personal information on the Internet may become an easy target and be tricked in giving out company information.
Module 5: Working Remotely:
COVID has pushed your employees out of their secure workplaces into “working from home” offices filled with increased sources of vulnerability. Trainees will be reminded that they must be on alert to attacks whether it be through email or phone.
Next Steps in Cybersecurity – Where To Go From Here:
Trainees will get a sneak peak into the next courses available after completing this pre-requisite course. Discussions of where to go from here and tips and tricks to stay in the loop and staying current with cybersecurity.
Activities and Exercises (1:00 pm – 3:00 pm)
Phish case study:
Trainees will see a number of phishing attacks that had disastrous effects on companies big and small. Discussion will follow and trainee questions will be answered.
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.
Fee per Participant: 1 Day Course – $650.00
Certification Awarded: Cybersecurity Fundamentals Certificate of Completion
Cybersecurity Fundamentals & Targeted Phishing (2-Day)
Day 1 : Morning – Instructor led (9am-12pm)
Module 1: Phishing:
One employee clicking on a malicious email link can bring down your entire company network. Trainees will learn how phishing emails are made, how they work, and why we mistakenly click on them.
Module 2: Ransomware:
Ransomware is a family of malicious programs that block access to your company devices until you pay a ransom fee to its creator. It is often very difficult and expensive to remove. Trainees will be shown some real-life examples of ransomware and how it can disrupt your business.
Module 3: Data breaches:
A data breach can be a disaster for your company. Unfortunately, one of the biggest sources of a data breach isn’t some unknown security bug, it’s human error. Trainees will learn how they can help protect your company network with basic data security knowledge.
Module 4: Social Engineering Attacks:
Trainees will understand how OSINT (Open Source Intelligence) techniques are used to gather information on them. An employee who puts too much personal information on the Internet may become an easy target and be tricked in giving out company information.
Module 5: Working Remotely:
COVID has pushed your employees out of their secure workplaces into “working from home” offices filled with increased sources of vulnerability. Trainees will be reminded that they must be on alert to attacks whether it be through email or phone.
Next Steps in Cybersecurity – Where To Go From Here:
Trainees will get a sneak peak into the next courses available after completing this pre-requisite course. Discussions of where to go from here and tips and tricks to stay in the loop and staying current with cybersecurity.
Activities and Exercises (1:00 pm – 3:00 pm)
Phish case study:
Trainees will see a number of phishing attacks that had disastrous effects on companies big and small. Discussion will follow and trainee questions will be answered.
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.
Day 2 : Morning – Instructor led (9am-12pm)
Module 6: Spear Phishing / Whaling / Angling / Vishing / Smishing:
Cyber criminals constantly change their phishing methods to become more successful. Trainees will learn the different kinds of phishing techniques and how they’re used.
Module 7: Business Email Compromise:
Trainees will meet the new kid on the block. BEC (business email compromise) is becoming a major problem for companies as employees are now receiving emails from hackers posing as other employees.
Module 8: Barcodes and QR Codes:
Barcodes and QR codes are everywhere… those tiny funny looking squares we scan with our phones that will direct us to a website. Trainees will learn how a QR code can be manipulated to send their phones to malicious websites to download malware.
Module 9: Spot A Fake Social Media Account:
There are millions of fake social media accounts on the Internet. Trainees will be shown a few ways to help spot fake accounts.
Module 10: Reverse Image Google Lookup:
There are many ways a cyber criminal can see where you hang out on the Internet. Trainees will learn how to use reverse image lookup that can show them what is out on the Internet based on a picture.
Next Steps in Cybersecurity – Where To Go From Here:
Trainees will get a sneak peak into the next courses available after completing this pre-requisite course. Discussions of where to go from here and tips and tricks to stay in the loop and staying current with cybersecurity.
Activities and Exercises (1:00 pm – 3:00 pm)
Business Email Compromise Case Study:
Trainees will see a number of Business Email Compromise attacks that had employees send out large amounts of money to cyber criminals. Discussion will follow and trainee questions will be answered.
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.
Fee per Participant: 2 Day Course – $2,650.00
Certification Awarded: Cybersecurity Fundamentals & Targeted Phishing Certification of Completion
Cybersecurity Fundamentals, Targeted Phishing, Password Attacks & Juice Jacking a Cellphone (3-Day)
Day 1 : Morning – Instructor led (9am-12pm)
Module 1: Phishing:
One employee clicking on a malicious email link can bring down your entire company network. Trainees will learn how phishing emails are made, how they work, and why we mistakenly click on them.
Module 2: Ransomware:
Ransomware is a family of malicious programs that block access to your company devices until you pay a ransom fee to its creator. It is often very difficult and expensive to remove. Trainees will be shown some real-life examples of ransomware and how it can disrupt your business.
Module 3: Data breaches:
A data breach can be a disaster for your company. Unfortunately, one of the biggest sources of a data breach isn’t some unknown security bug, it’s human error. Trainees will learn how they can help protect your company network with basic data security knowledge.
Module 4: Social Engineering Attacks:
Trainees will understand how OSINT (Open Source Intelligence) techniques are used to gather information on them. An employee who puts too much personal information on the Internet may become an easy target and be tricked in giving out company information.
Module 5: Working Remotely:
COVID has pushed your employees out of their secure workplaces into “working from home” offices filled with increased sources of vulnerability. Trainees will be reminded that they must be on alert to attacks whether it be through email or phone.
Activities and Exercises (2 hours)
Phish case study:
Trainees will see a number of phishing attacks that had disastrous effects on companies big and small. Discussion will follow and trainee questions will be answered.
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.
Day 2 : Morning – Instructor led (9am-12pm)
Module 6: Spear Phishing / Whaling / Angling / Vishing / Smishing:
Cyber criminals constantly change their phishing methods to become more successful. Trainees will learn the different kinds of phishing techniques and how they’re used.
Module 7: Business Email Compromise:
Trainees will meet the new kid on the block. BEC (business email compromise) is becoming a major problem for companies as employees are now receiving emails from hackers posing as other employees.
Module 8: Barcodes and QR Codes:
Barcodes and QR codes are everywhere… those tiny funny looking squares we scan with our phones that will direct us to a website. Trainees will learn how a QR code can be manipulated to send their phones to malicious websites to download malware.
Module 9: Spot A Fake Social Media Account:
There are millions of fake social media accounts on the Internet. Trainees will be shown a few ways to help spot fake accounts.
Module 10: Reverse Image Google Lookup:
There are many ways a cyber criminal can see where you hang out on the Internet. Trainees will learn how to use reverse image lookup that can show them what is out on the Internet based on a picture.
Activities and Exercises (1:00 pm – 3:00 pm)
Business Email Compromise Case Study:
Trainees will see a number of Business Email Compromise attacks that had employees send out large amounts of money to cyber criminals. Discussion will follow and trainee questions will be answered.
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.
Day 3 : Morning – Instructor led (9am-12pm)
Module 11: Creating A Strong Password:
Employees are reusing their company password on other unsecured websites. Once those other websites get hacked, your employee’s network password is now out there ready to be used by a cyber criminal to get into your company infrastructure. Trainees will be shown how to make a strong password for their company account.
Module 12: Password Managers:
Some of your employees could realistically have over 100 personal passwords. To make life easier, they reuse the same password which causes headaches if that reused password gets out in the wild. Trainees will learn what a password manager is and how they can use it to keep track of all their passwords.
Module 3: Multi Factor Authentication:
One of the ways employees can help secure their online accounts is by using multi factor authentication. Trainees are shown how to turn on this authentication within their social media accounts.
Module 4: Mobile Devices:
A number of companies are letting employees connect to the company network with their personal devices to receive work emails and files. Trainees will be shown the proper ways to keep their personal devices up to date.
Module 5: Juice Jacking A Cell Phone:
Trainees will be alerted to a possible cell phone exploit as they may use unfamiliar charging cables in airports, hotels etc.
Next Steps in Cybersecurity – Where To Go From Here:
Trainees will get a sneak peak into the next courses available after completing this pre-requisite course. Discussions of where to go from here and tips and tricks to stay in the loop and staying current with cybersecurity.
Activities and Exercises
Knowledge Challenge:
A combination of videos and slides followed by a series of questions based off of what was taught during the day to ensure retention of material.