Phishing Awareness Training
Kristen Greene
Intro 1:
Welcome
Intro 2:
Context
Outcome 1: Identify Red Flags
Intro 3:
Objectives
Content A
Suspicious Sender Information
Activity A
Language Clues
Content B
Dangerous Links and Attachments
Assessment
Module 1 Knowledge Check
Outcome 2: Responding to Phishing
Content C
Safe Steps to Respond
Activity C
Helpful vs Harmful Responses
Content D
Escalating Emails
Assessment
Module 2 Knowledge Check
Review 1:
Review
Assessment 1:
Summative Assessment
End 1:
Congratulations and Certificate
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Phishing Awareness Training
Intro - 1
Auto Advance after Narration
Company logo, inbox background, course title in center.
“Welcome to Phishing Awareness Training. In this course, you’ll learn to identify phishing emails and respond safely using realistic scenarios.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Context
Intro - 2
Next button
Image of a real-looking phishing email,
statistic about phishing attacks (for example,
“Over 90% of data breaches start with a phishing
email”)
“Phishing attacks are one of the most common and costly cyber threats. This training will help you recognize and respond effectively to protect yourself and the organization.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Learning Objectives
Intro - 3
Next button
Title: Learning Objectives
Bulleted text list on screen:
Other: Add supportive icons next to each (e.g., magnifying glass, shield, checkmark, certificate).
“By the end of this training, you’ll be able to spot common phishing clues, take safe actions, and escalate suspicious emails appropriately.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Module 1: Identify Red Flags
M1-1
Next button
Title: “Module 1: Identify Red Flags” with an icon of a magnifying glass over an email.
Example -
“In Module 1, you’ll learn how to identify common red flags in phishing emails.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Suspicious Sender Information
M1-2
Labeled graphic with the sender’s name to reveal actual email address.
Example email header with suspicious sender email highlighted.
“Check the sender’s address carefully. Phishers often spoof names while using a suspicious email address.”
Highlight correct answer with green check.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Language Clues
M1-3
Learners match clues such as “sense of urgency,” “grammatical errors,” “professional tone” as either “safe” or “suspicious”.
Example email body with urgency
& grammar errors highlighted.
Example -
“Look for unusual language: urgency, poor grammar, or threats can signal phishing.”
Highlight correct answer with green check.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Dangerous Links and Attachments
M1-4
Screenshot of an email with a fake link.
Learners click on hotspots to reveal the actual URL text & explanation.
Email with fake hyperlink & suspicious
attachment icon.
Example -
“Click the highlighted link to reveal the real destination. Do not open unexpected attachments.”
Show correct destination URL in pop-up.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Module 1 Knowledge Check
M1-5
Hotspot or multiple choice.
Full scenario email with several red flags.
Example -
“Identify at least three red flags in this email.”
Shows which flags were correct/missed.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Module 2: Responding to Phishing
M2-1
Next button
Title: “Module 2: Respond to Phishing” with an icon of a shield or security team.
“In Module 2, you’ll learn how to respond safely and escalate phishing attempts appropriately.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Safe Steps to Respond
M2-2
Clickable list of steps “What to do first?”
Icons for reporting, deleting, not clicking.
Examples -
“When you spot phishing, report to IT/security, delete the email, and avoid clicking anything.”
Reveals steps in order.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Helpful vs Harmful Responses
M2-3
Matching knowledge check
Table with correct vs incorrect actions side-by-side.
“Some responses can make things worse. Don’t forward phishing emails to colleagues.”
Feedback for each response.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Escalating Emails
M2-4
Matching or multiple choice knowledge check activity
Simple escalation flowchart graphic.
“Match each escalation step to the correct description to see how a proper report is constructed.”
Fill in missing parts of escalation email.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Module 2 Knowledge Check
M2-5
Scenario-based choices with feedback.
Email scenario where learner chooses correct response.
“Choose the correct response at each step in this scenario.”
Correct/incorrect feedback for each choice.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Review Key Points
Review-1
Next button
Checklist of key red flags & safe responses
For Example -
Checklist graphic:
✅ Check sender info
✅ Look for urgency & grammar issues
✅ Hover over links
✅ Don’t click suspicious attachments
✅ Report & escalate properly
“Let’s review what you’ve learned: spot suspicious sender info, watch for unusual language and links, and always report suspicious emails promptly.”
None
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Final Knowledge Check and Completion
Assessment-1
Mix of drag-and-drop & multiple choice.
Certificate icon + quiz intro screen.
“Complete this 5-question quiz to reinforce your knowledge and receive your certificate.”
Final score & certificate download option.
Lesson Title:
Slide ID:
Reviewer Comments
Programming/Interactions
Feedback:
Visual:
Audio:
Congratulations & Certificate
End-1
Click to download
Congratulations banner + button to download certificate.
“Congratulations! You’ve completed the Phishing Awareness Training. Click below to download your certificate.”
Confirmation of completion