1 of 18

Phishing Awareness Training

Kristen Greene

2 of 18

Intro 1:

Welcome

Intro 2:

Context

Outcome 1: Identify Red Flags

Intro 3:

Objectives

Content A

Suspicious Sender Information

Activity A

Language Clues

Content B

Dangerous Links and Attachments

Assessment

Module 1 Knowledge Check

Outcome 2: Responding to Phishing

Content C

Safe Steps to Respond

Activity C

Helpful vs Harmful Responses

Content D

Escalating Emails

Assessment

Module 2 Knowledge Check

Review 1:

Review

Assessment 1:

Summative Assessment

End 1:

Congratulations and Certificate

3 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Phishing Awareness Training

Intro - 1

Auto Advance after Narration

Company logo, inbox background, course title in center.

“Welcome to Phishing Awareness Training. In this course, you’ll learn to identify phishing emails and respond safely using realistic scenarios.”

None

4 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Context

Intro - 2

Next button

Image of a real-looking phishing email,

statistic about phishing attacks (for example,

“Over 90% of data breaches start with a phishing

email”)

“Phishing attacks are one of the most common and costly cyber threats. This training will help you recognize and respond effectively to protect yourself and the organization.”

None

5 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Learning Objectives

Intro - 3

Next button

Title: Learning Objectives

Bulleted text list on screen:

  • Identify common red flags in emails that indicate phishing.
  • Demonstrate appropriate responses to phishing attempts.
  • Differentiate helpful vs. harmful actions when responding.
  • Complete a final knowledge check to reinforce skills.

Other: Add supportive icons next to each (e.g., magnifying glass, shield, checkmark, certificate).

“By the end of this training, you’ll be able to spot common phishing clues, take safe actions, and escalate suspicious emails appropriately.”

None

6 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Module 1: Identify Red Flags

M1-1

Next button

Title: “Module 1: Identify Red Flags” with an icon of a magnifying glass over an email.

Example -

“In Module 1, you’ll learn how to identify common red flags in phishing emails.”

None

7 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Suspicious Sender Information

M1-2

Labeled graphic with the sender’s name to reveal actual email address.

Example email header with suspicious sender email highlighted.

“Check the sender’s address carefully. Phishers often spoof names while using a suspicious email address.”

Highlight correct answer with green check.

8 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Language Clues

M1-3

Learners match clues such as “sense of urgency,” “grammatical errors,” “professional tone” as either “safe” or “suspicious”.

Example email body with urgency

& grammar errors highlighted.

Example -

“Look for unusual language: urgency, poor grammar, or threats can signal phishing.”

Highlight correct answer with green check.

9 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Dangerous Links and Attachments

M1-4

Screenshot of an email with a fake link.

Learners click on hotspots to reveal the actual URL text & explanation.

Email with fake hyperlink & suspicious

attachment icon.

Example -

“Click the highlighted link to reveal the real destination. Do not open unexpected attachments.”

Show correct destination URL in pop-up.

10 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Module 1 Knowledge Check

M1-5

Hotspot or multiple choice.

Full scenario email with several red flags.

Example -

“Identify at least three red flags in this email.”

Shows which flags were correct/missed.

11 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Module 2: Responding to Phishing

M2-1

Next button

Title: “Module 2: Respond to Phishing” with an icon of a shield or security team.

“In Module 2, you’ll learn how to respond safely and escalate phishing attempts appropriately.”

None

12 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Safe Steps to Respond

M2-2

Clickable list of steps “What to do first?”

Icons for reporting, deleting, not clicking.

Examples -

“When you spot phishing, report to IT/security, delete the email, and avoid clicking anything.”

Reveals steps in order.

13 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Helpful vs Harmful Responses

M2-3

Matching knowledge check

Table with correct vs incorrect actions side-by-side.

“Some responses can make things worse. Don’t forward phishing emails to colleagues.”

Feedback for each response.

14 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Escalating Emails

M2-4

Matching or multiple choice knowledge check activity

Simple escalation flowchart graphic.

“Match each escalation step to the correct description to see how a proper report is constructed.”

Fill in missing parts of escalation email.

15 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Module 2 Knowledge Check

M2-5

Scenario-based choices with feedback.

Email scenario where learner chooses correct response.

“Choose the correct response at each step in this scenario.”

Correct/incorrect feedback for each choice.

16 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Review Key Points

Review-1

Next button

Checklist of key red flags & safe responses

For Example -

Checklist graphic:

✅ Check sender info

✅ Look for urgency & grammar issues

✅ Hover over links

✅ Don’t click suspicious attachments

✅ Report & escalate properly

“Let’s review what you’ve learned: spot suspicious sender info, watch for unusual language and links, and always report suspicious emails promptly.”

None

17 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Final Knowledge Check and Completion

Assessment-1

Mix of drag-and-drop & multiple choice.

Certificate icon + quiz intro screen.

“Complete this 5-question quiz to reinforce your knowledge and receive your certificate.”

Final score & certificate download option.

18 of 18

Lesson Title:

Slide ID:

Reviewer Comments

Programming/Interactions

Feedback:

Visual:

Audio:

Congratulations & Certificate

End-1

Click to download

Congratulations banner + button to download certificate.

“Congratulations! You’ve completed the Phishing Awareness Training. Click below to download your certificate.”

Confirmation of completion