Cyber Safety Academy/Cyber Safety by Spectrum Stream

  • $400 or 4 monthly payments of $100

Cyber Safety by Spectrum Stream

  • Course
  • 79 Lessons

Contents

Welcome to Cyber Safety by Spectrum Stream

What to Expect

Welcome to Cyber Safety by Spectrum Stream.

This course is designed to help you build practical, everyday habits that protect your data and your organisation from common cyber threats.

You don’t need a technical background to follow along. Each module is broken down into:

  • A short, to-the-point video

  • Written lessons for each individual lesson

  • Reference cheat sheets

  • Short quizzes to reinforce what you’ve learned

You’ll learn how to:

  • Spot phishing attempts

  • Create stronger passwords

  • Use multi-factor authentication effectively

  • Avoid common mistakes that lead to breaches

By the end of this course, you’ll feel more confident recognising risks, knowing how to respond, and helping keep your team safe.

Welcome video

Module 1 - Awareness

Module 1 - Awareness is your crash course in recognising the most common cyber threats that you’re likely to face at work or at home. From phishing emails to ransomware, fake login pages to oversharing on social media, each lesson is designed to show you exactly how these scams work and how to avoid falling for them.

You’ll get a mix of real-world examples, practical advice, and clear checklists to build up your confidence. Even if you’re not a “tech person,” this module gives you the tools to spot a scam before it hits you or your company.

Includes: 5 lessons with written content, cheat sheets, quizzes, and downloadable PDFs, plus a dedicated module video.

Module 1 Overview

Lesson 1.1 - What is Phishing?

1.1 - Cheatsheet: Phishing
1.1 - Quiz: Phishing

Lesson 1.2 - What is Ransomware?

1.2 - What is Ransomware?
1.2 - Cheatsheet: Ransomware
1.2 - Quiz: Ransomware

Lesson 1.3 - Signs of a Compromised Account

1.3 - Signs of a Compromised Account
1.3 - Cheatsheet: Signs of a Compromised account
1.3 - Quiz: Signs of a Compromised account

Lesson 1.4 - How is Data Harvested on Social Media?

1.4 - How is Data Harvested on Social Media
1.4 - Cheatsheet: Social Media Data Harvesting
1.4 - Quiz: How is Data Harvested on Social Media

Lesson 1.5 - How do Hackers Impersonate Legitimate Services?

1.5 - How do hackers impersonate legitimate services?
1.5 - Cheatsheet: How do hackers Impersonate Legitimate Services
1.5 - Quiz: How do Hackers Impersonate Legitimate Services

Module 2 - Best Practices

Now that you know what some common threats look like, Module 2 - Best practices focuses on building strong habits to stop them. This module covers normal everyday actions that will make a big difference, like creating better passwords, spotting dodgy links, using Multi Factor Authentication, and keeping on top of locking your screen when you walk away.

It’s not about being paranoid. It’s about being prepared and consistent. If everyone followed the basics in this module, most attacks wouldn’t end up getting anywhere.

Includes: 6 lessons covering essential practices, each with supporting resources and a module overview video to tie it all together.

Module 2 Overview

Lesson 2.1 - Password Hygiene & Password Managers

2.1 - Password Hygiene
2.1 - Cheatsheet: Password Hygiene
2.1 - Quiz: Password Hygiene

Lesson 2.2 - Multi-Factor Authentication (MFA)

2.2 - Multi-Factor Authentication
2.2 - Cheatsheet: Multi-Factor Authentication
2.2 - Quiz: Multi-Factor Authentication (MFA)

Lesson 2.3 - Safe Browsing Practices

2.3 - Safe Browsing Practices
2.3 - Cheatsheet: Safe Browsing Practices
2.3 - Quiz: Safe Browsing Practices

Lesson 2.4 - Secure Use of Public Wi-Fi

2.4 - Secure use of Public Wi-fi
2.4 - Cheatsheet: Secure Use of Public Wi-Fi
2.4 - Quiz: Secure Use of Public Wi-Fi

Lesson 2.5 - Email Etiquette and Forwarding Rules

2.5 - Email Etiquette and Forwarding Rules
2.5 - Cheatsheet: Email Safety
2.5 - Quiz: Email Etiquette and Forwarding Rules

Lesson 2.6 - Device Locking & Shoulder Surfing Prevention

2.6 - Device Locking and Shoulder Surfing Prevention
2.6 - Cheatsheet: Device Locking and Shoulder Surfing Prevention
2.6 - Quiz: Device Locking & Shoulder Surfing Prevention

Module 3 - Social Engineering

Module 3: Social Engineering digs into how attackers can manipulate people instead of systems. It’s where psychology meets with cybersecurity. You’ll learn how scams can evolve beyond email with voice calls, fake tech support, LinkedIn impersonators, and even people showing up at your office pretending to be delivery staff.

The examples in this module are pulled straight from real incidents, some are surprising, others are subtle enough to fool anyone. By the end, you’ll have a sharper eye for the manipulation tactics attackers use, and the confidence you need to pause, question, and act when something feels off.

Includes: 7 lessons with examples and red flags to watch for, alongside quizzes, cheat sheets, and a dedicated module video.

Module 3 Overview

Lesson 3.1 - What is Social Engineering?

This lesson is an overview of psychological tactics attackers use to manipulate staff into giving up access or data.

3.1 - What is Social Engineering?
3.1 - Cheatsheet: What is Social Engineering?
3.1 - Quiz: What is Social Engineering?

Lesson 3.2 - Recognising Insider Threats

You'll learn how to spot unusual behaviour and learn how to report suspicious internal activity without fear.

3.2 - Recognising Insider Threats
3.2 - Cheatsheet: Recognising Insider Threats
3.2 - Quiz: Recognising Insider Threats

Lesson 3.3 - Tailgating and Pretexting

This lesson will teach you how attackers gain physical access by following employees or pretending to belong.

3.3 - Tailgating and Pretexting
3.3 - Cheatsheet: Tailgating and Pretexting
3.3 - Quiz: Tailgating and Pretexting

Lesson 3.4 - Quid Pro Quo and Baiting Attacks

After this lesson you'll understand how attackers offer fake support or gifts in exchange for access.

3.4 - Quid Pro Quo and Baiting Attacks
3.4 - Cheatsheet: Quid Pro Quo and Baiting Attacks
3.4 - Quiz: Quid Pro Quo and Baiting Attacks

Lesson 3.5 - Watering Hole Attacks and Fake Sites

Learn how attackers target websites your team regularly visits to compromise you silently.

3.5 - Watering hole attacks and Fake Websites
3.5 - Cheatsheet: Watering Hole Attacks and Fake Sites
3.5 - Quiz: Watering Hole Attacks and Fake Sites

Lesson 3.6 - Social Media Profiling and Oversharing

3.6 - Social Media Profiling and Oversharing
3.6 - Cheatsheet: Social Media Profiling and Oversharing
3.6 - Quiz: Social Media Profiling and Oversharing

Lesson 3.7 - AI Impersonation Scams

3.7 - AI Impersonation Scams
3.7 - Cheatsheet: AI Impersonation Scams
3.7 - Quiz: AI impersonation Scams

Module 4 - Company Habits

Module 4 - Company Habits explores the day-to-day behaviours that form the backbone of a secure workplace. From maintaining a clean desk to only using approved tools while working remotely, these habits may seem routine, but they play a critical role in reducing your risk. You’ll learn how to spot the common gaps in physical and digital security, adopt practices that safeguard your company's sensitive information, and create a culture where security is a major part of the way you work, not just an afterthought.

module 4.mov

Lesson 4.1 - Clean Desk Policy

Keep sensitive materials off desks, screens, and sticky notes to prevent accidental exposure

4.1 - Clean Desk Policy
4.1 - Cheatsheet: Clean Desk Policy
4.1 - Quiz: Clean Desk Policy

Lesson 4.2 - Reporting Protocols

What should staff report? How? And when is something worth flagging, even if you're unsure?

4.2 - Reporting Protocols
4.2 - Cheatsheet: Reporting Protocols
4.2 - Quiz: Reporting Protocols

Lesson 4.3 - Remote Work Cyber Hygiene

These are the best practices for keeping company data safe while working from home or while travelling.

4.3 - Remote Work Cyber Hygiene
4.3 - Cheatsheet: Remote Work Cyber Hygiene
4.3 - Quiz: Remote Work Cyber Hygiene

Lesson 4.4 - Bring Your Own Device (BYOD) Tips

Learn how to use personal devices safely for work, including patching and antivirus basics.

4.4 - Bring Your Own Device (BYOD) Tips
4.4 - Cheatsheet: BYOD Tips
4.4 - Quiz: Bring Your Own Device (BYOD) Tips

Lesson 4.5 - Understanding Supply Chain Risks

Learn how third-party vendors and tools can create vulnerabilities if not carefully managed.

4.5 - Understanding Supply Chain Risks
4.5 - Cheatsheet: Understanding Supply Chain Risks
4.5 - Quiz: Understanding Supply Chain Risks

Lesson 4.6 - Physical Security Basics

Learn how to manage ID badges, control office access, and maintain a secure environment.

4.6 - Physical Security Basics
4.6 - Cheatsheet: Physical Security Basics
4.6 - Quiz: Physical Security

Lesson 4.7 - Shadow IT and Unapproved Tools

4.7 - Shadow IT and Unapproved Tools
4.7 - Cheatsheet: Shadow IT and Unapproved Tools
4.7 - Quiz: Shadow IT and Unapproved Tools