Contents | Previous | 6.6 Instructional Sequences | Next
In order to address the two different sets of performance objectives, we introduce two instructional sequences below, targeted at two different audiences. The first sequence is dedicated to select IT specialists (10—100), while the second one concerns a very large group (50,000–100,000) including all employees and volunteers part of the organization.
The first sequence is planned for a typical learning period of 5 weeks, while the second sequence is expected to span several years.
None of these two learning sequences may require the specific development of e-learning modules. Depending on the number of IT specialists to train, the first sequence may be taught from peer to peer, with the support of reference cards and job aids. The second sequence may be supported by a tool distributing the test phishing and associated learning contents, provided by a third-party vendor, probably completed with customized printable materials.
1–2 hours per week over 5 weeks.
- what is not PII
- how PII identifies individuals
- the gray areas: what becomes PII when cross-referenced
- the role of payment processors
- PCI compliance
- How not to store payment details
- Legal obligations with regards to financial records
1 hour of workshop with a guest, e.g. a data analyst from the military or an IT specialist from another NGO, sharing tips and experience against digital threats.
45 minutes of interview followed with 15 minutes of questions from the audience.
- granting and revoking access to files
- granting and revoking access to databases
- creating partial views of tables
- how aggregating data can make sensitive data anonymous
- and when it doesn't
- how to replace sensitive information with fake equivalents
Each learner will receive 1 email every 5 to 10 days, at random intervals. The roll-out will be progressive starting with a few hundred learners, including all the learning champions in the first month, and adding several thousand employees and volunteers each month. The progress of each learner will be tracked individually to adjust the level of the challenges accordingly, across the 3 levels of difficulty.
- phishing for credentials through visibly fake URL
- phishing through attached executable program
- obvious scam scheme requesting an urgent payment from the learner
- phishing for credentials through masked URL
- phishing through attached spreadsheet with macros
- scam scheme requesting an urgent payment to a unknown organization, from a known contact but sent from a free email provider
- phishing for credentials through a page which loads a login page only once hidden
- phishing through an email pretending to contain instructions from Horizon IT to download a zip archive and install a new program on the computer
- scam scheme requesting a list of donor emails for fundraising purpose, sent from the email address of an existing employee