What to Expect
Welcome to Cyber Safety by Spectrum Stream.
This course is designed to help you build practical, everyday habits that protect your data and your organisation from common cyber threats.
You don’t need a technical background to follow along. Each module is broken down into:
A short, to-the-point video
Written lessons for each individual lesson
Reference cheat sheets
Short quizzes to reinforce what you’ve learned
You’ll learn how to:
Spot phishing attempts
Create stronger passwords
Use multi-factor authentication effectively
Avoid common mistakes that lead to breaches
By the end of this course, you’ll feel more confident recognising risks, knowing how to respond, and helping keep your team safe.
Module 1 - Awareness is your crash course in recognising the most common cyber threats that you’re likely to face at work or at home. From phishing emails to ransomware, fake login pages to oversharing on social media, each lesson is designed to show you exactly how these scams work and how to avoid falling for them.
You’ll get a mix of real-world examples, practical advice, and clear checklists to build up your confidence. Even if you’re not a “tech person,” this module gives you the tools to spot a scam before it hits you or your company.
Includes: 5 lessons with written content, cheat sheets, quizzes, and downloadable PDFs, plus a dedicated module video.
Now that you know what some common threats look like, Module 2 - Best practices focuses on building strong habits to stop them. This module covers normal everyday actions that will make a big difference, like creating better passwords, spotting dodgy links, using Multi Factor Authentication, and keeping on top of locking your screen when you walk away.
It’s not about being paranoid. It’s about being prepared and consistent. If everyone followed the basics in this module, most attacks wouldn’t end up getting anywhere.
Includes: 6 lessons covering essential practices, each with supporting resources and a module overview video to tie it all together.
Module 3: Social Engineering digs into how attackers can manipulate people instead of systems. It’s where psychology meets with cybersecurity. You’ll learn how scams can evolve beyond email with voice calls, fake tech support, LinkedIn impersonators, and even people showing up at your office pretending to be delivery staff.
The examples in this module are pulled straight from real incidents, some are surprising, others are subtle enough to fool anyone. By the end, you’ll have a sharper eye for the manipulation tactics attackers use, and the confidence you need to pause, question, and act when something feels off.
Includes: 7 lessons with examples and red flags to watch for, alongside quizzes, cheat sheets, and a dedicated module video.
This lesson is an overview of psychological tactics attackers use to manipulate staff into giving up access or data.
You'll learn how to spot unusual behaviour and learn how to report suspicious internal activity without fear.
This lesson will teach you how attackers gain physical access by following employees or pretending to belong.
After this lesson you'll understand how attackers offer fake support or gifts in exchange for access.
Learn how attackers target websites your team regularly visits to compromise you silently.
Module 4 - Company Habits explores the day-to-day behaviours that form the backbone of a secure workplace. From maintaining a clean desk to only using approved tools while working remotely, these habits may seem routine, but they play a critical role in reducing your risk. You’ll learn how to spot the common gaps in physical and digital security, adopt practices that safeguard your company's sensitive information, and create a culture where security is a major part of the way you work, not just an afterthought.
Keep sensitive materials off desks, screens, and sticky notes to prevent accidental exposure
What should staff report? How? And when is something worth flagging, even if you're unsure?
These are the best practices for keeping company data safe while working from home or while travelling.
Learn how to use personal devices safely for work, including patching and antivirus basics.
Learn how third-party vendors and tools can create vulnerabilities if not carefully managed.
Learn how to manage ID badges, control office access, and maintain a secure environment.