Certified Security Aware User (CSAU) - All Employees & End Users

Duration: 1 Day
Modes: In-Person, Live Online, On-Demand, On-Site
Your people are your biggest security risk and your strongest line of defence. This high-impact, 100% live hacking demo workshop shows every employee exactly how real attacks happen and how to stop them.
Course Objectives
check icon
Understand how vulnerabilities are exploited and how defence technologies like firewalls and antivirus actually work
check icon
Recognise how hackers manipulate human behaviour to execute successful attacks
check icon
Identify and respond to social engineering attacks including phishing, Facebook-based scams, and business email compromise
check icon
Learn how mobile malware, ransomware, and Wi-Fi attacks are carried out through live demonstrations
check icon
Apply best practices for password creation, email security, and safe use of messaging applications
check icon
Secure personal and corporate devices against compromise
check icon
Understand how to detect, report, and respond to security incidents within your organisation
Expected Outcomes
check icon
Recognise and respond to cyber threats in real time without relying on IT support
check icon
Identify phishing emails, suspicious links, and social engineering attempts before falling victim
check icon
Apply strong password practices and secure authentication across all work and personal accounts
check icon
Protect corporate and personal devices from malware, ransomware, and unauthorised access
check icon
Communicate securely across email and messaging platforms, avoiding common compromise vectors
check icon
Report security incidents confidently and act as an active human sensor within your organisation
check icon
Contribute to a culture of security awareness that reduces your organisation's overall risk exposure
Training Modules
1. Introduction : Anatomy of an Attack
chevron down icon
1. What is Security, Vulnerabilities & Zero-Days
2. Attack Life Cycle & how much hackers earn from selling your data
3. Different Attack Vectors, Threats vs. Risks, Exploit Basics
4. Why perimeter defences are failing
5. Why antivirus is not enough
2. Latest Attack Trends : 100% Live Hacking Demo
chevron down icon
1. Mobile Malware
2. Web Attacks
3. Business Email Compromise (BEC)
4. Ransomware
5. Advanced Persistent Threats
6. Malvertising
7. Identity Theft
3. Social Engineering Attacks : 100% Live Hacking Demo
chevron down icon
1. Drive by Download Attack with Java
2. USB / File attachment Attacks
3. Phone Call & Sweet Talking
4. Facebook and social Media based attacks
5. Best Practices for Safer Social Media Usage for Adults and Kids
4. Password Management & Privacy
chevron down icon
1. What is a strong password and why change every 90 days
2. Why you should never reuse passwords across applications
3. Best Practices for Password Management & Privacy
5. Email & Messaging Security
chevron down icon
1. Email Spoofing
2. Phishing
3. Disposable Emails
4. WhatsApp, Telegram, and similar Messaging Systems Security
5. Best Practices for Email Security
6. Best Practices for Messaging Software
6. Wireless Attacks : 100% Live Hacking Demo  
chevron down icon
1. Why public Wi-Fi and free hotspots are dangerous
2. Sniffing and Man-in-the-Middle attacks on Wi-Fi
3. How to secure office and home Wi-Fi
7. Mobile Security  
chevron down icon
1. Jailbreaking & Rooting: Why it's a disaster
2. Do you need antivirus on a mobile device?
3. How hackers hack your phone and control it
4. Security best practices for mobile devices
Certification & Accreditation
Certification Path 1: GlobalACE Certification
The GlobalACE certification is designed to align with internationally recognised Knowledge, Skills, and Attitudes (KSA) standards for Information Security Professionals. Candidates are assessed through a combination of multiple choice questions, practical assessments, assignments, and case studies. Examinations are conducted at authorised centres across participating member countries, and successful candidates are eligible to apply as Associate or Professional Members under the GlobalACE framework, recognised in 64+ countries.
Certification Path 2: CyberKnights Certification
The CyberKnights certification is conducted through the KALAM platform, a purpose-built cybersecurity examination and skills validation system. Candidates take a 25-question MCQ exam within 60 minutes, with a pass mark of 70%. Exam fees are inclusive in the course fees. All certified candidates receive complimentary membership access to the KALAM Cybersecurity Collaboration and Community Skills Validation Platform, giving them access to an active community of security professionals.
Frequently Asked Questions
Do I need any technical background to attend?
No. This programme is designed for non-technical users. Every concept is explained through live demonstrations that anyone can follow, regardless of their IT experience.
Can this training be conducted for our entire organisation?
Absolutely. We offer on-site and live online delivery for teams of any size. The programme can be customised to reflect your industry's specific threat landscape and compliance requirements.
Is this training aligned with Singapore regulations?
Yes. The programme is aligned with MAS TRM, PDPA, and CSA CCoP 2.0 requirements, helping your organisation meet regulatory compliance for employee security awareness.
Is the certification internationally recognised?
Yes. You can choose between the GlobalACE certification, recognised in 64+ countries, or the CyberKnights certification through the KALAM platform. Both are ISO 17024 audited.
What does the exam involve?
The CyberKnights exam is a 25-question MCQ completed in 60 minutes with a 70% pass mark. The GlobalACE path includes MCQs, practical assessments, and case studies.
What do participants receive after completing the course?
A globally recognised certification, complimentary membership to the KALAM Cybersecurity Collaboration platform, and practical skills they can apply from day one.
Ready to get started?
Train your team. Strengthen your defence.
Fill in the form and our training advisors will get back to you within 24 hours with a tailored programme recommendation for your team.
20,000+ professionals trained across enterprise and government sectors
chevron down icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.