
“exit” quiz to ensure adequate comprehension of the
labs prior to moving onto the next module.
3.2.1 E-Mail Security
The e-mail security module equips participants with
the knowledge and skills to identify and handle phish-
ing attempts through a combination of theoretical re-
sources and practical exercises (mic, b). Participants
will explore fundamental concepts of e-mail security,
learn best practices, and engage in hands-on activi-
ties within a virtual environment to apply their knowl-
edge.
In the Concepts & Theory folder for the e-mail
security module, participants will find valuable re-
sources to understand the fundamentals of e-mail se-
curity. The first resource is a link to a comprehen-
sive post on the Microsoft Security forum that covers
the basics of email security, including its importance,
benefits, best practices, and various types of email
threats (mic, c). Following this, another link directs
participants to a Microsoft page that offers guidance
on protecting against phishing attacks. This page fea-
tures a brief video overview of phishing and various
dropdown menus covering topics such as identifying
phishing messages and steps to take if they fall victim
to a phishing attack. The final resource in this sec-
tion is a document that explains how to report phish-
ing emails using the Phish Alert feature in Outlook,
tailored specifically for the university.
In the Practical Application folder, participants
will find a detailed guide for a hands-on lab exercise
and the practical assessment assignment. These ac-
tivities are designed to enhance interaction with the
training environment. Participants will follow step-
by-step instructions to complete a lab within the vir-
tual environment. They will use Outlook to exam-
ine a mailbox populated with emails created using an
email spoofing tool. Among the 12 emails in the in-
box, some are legitimate while others are designed as
phishing examples (Emkei, ). Participants will iden-
tify which emails they believe to be phishing attempts,
applying the concepts learned in the theory section.
By engaging with both the theoretical resources
and practical exercises, participants will gain a thor-
ough understanding of e-mail security and be better
equipped to recognize and respond to potential email
threats.
3.2.2 Password Best Practices
The Password Best Practices module teaches partici-
pants how to create, manage, and protect strong pass-
words through theoretical resources and practical ex-
ercises. Participants will learn company policies and
best practices, use a custom password manager to
generate and store passwords securely, and under-
stand encryption through hands-on activities.
In the Concepts & Theory folder for the Password
Best Practices module, participants will find essen-
tial resources to understand the importance of secure
password best practices. The first resource is a com-
pany document outlining the organization’s password
policy, which includes guidelines on creating robust
passwords, the recommended frequency of password
changes, and the importance of password uniqueness.
Additionally, participants will have access to a CISA
article titled ”Use Strong Passwords” (cis, ) that dis-
cusses various password best practices and common
pitfalls to avoid. This article covers topics such as
the importance of creating complex passwords, the
use of password managers, and avoiding password
reuse. Another important resource is an Okta article
that explains the significance of multi-factor authenti-
cation (MFA) and its role in enhancing security (okt,
). This article provides a comprehensive overview of
why MFA is crucial and how it works.
In the Practical Application folder, participants
will engage with hands-on exercises designed to rein-
force their understanding of password security. They
will use a custom-programmed password manager
within the virtual environment to create and store se-
cure passwords. This manager generates strong pass-
words and saves them in an encrypted file (pass-
words.json), emphasizing the importance of encryp-
tion in password storage. Participants will then use
a custom-programmed password decrypter to decrypt
the stored passwords using a key file, providing a
practical demonstration of encryption and decryption
processes. Additionally, participants will complete a
practical assessment where they evaluate the strength
of various passwords and improve weak ones based
on the best practices learned. By combining theoret-
ical knowledge with practical application, the Pass-
word Best Practices module ensures participants are
well-equipped to create, manage, and protect their
passwords effectively.
3.2.3 Secure Browsing Techniques
The Secure Browsing Techniques module educates
participants on safe web browsing practices through
a combination of theoretical resources and practical
exercises. Participants learn about key security con-
cepts, the importance of HTTPS, and the benefits of
AdBlockers, and engage in hands-on activities to rec-
ognize and respond to online threats effectively.
In the Concepts & Theory folder for the Se-
cure Browsing Techniques module, participants will
find four essential resources. The first resource is
CyberWise: Virtual Security Learning Platform
419