Frequently Asked Questions (FAQ)
This page provides answers to common questions. If your question isn't listed here, or if the answer provided doesn't meet your needs, please don't hesitate to send an email.
My goal is to provide a simple set of knowledge to help you build and grow your security awareness.
I built this course primarily for the ages of 13 and up. These person are at the age where exposure to computers is increasing and has become a part of their everyday life. It doesn't matter whether you are 13, 33, 63, or 93, we all interact with computers in some shape or form and, what's more, are holders of very important personal data.
For people under the age of 13, this course can be useful but the terms, jargon, and definitions used may be difficult for them to absorb, reducing this course's effectiveness. I encourage a parent, guardian or someone older to sit and listen with the younger person to explain the lesson being taught.
It is important to note that there is no swearing, cursing, or sexual terms used in this course. Not because these words are right or wrong — that is an individual choice we each make — but because these words can be powerful with unintended consequences, and younger minds may not understand how to wield the power in an effective manner, so I made the choice to omit them from any spoken or written materials.
I hope it is accessible because it was on the top of my mind when designing this course's materials. That said, I have not tested this against all the types of accessibility needs people require. I have tried my best to provide enough materials in formats and styles that make it accessible to everyone.
Audio and written course materials are provided in a neutral colour scheme. The website is mostly text-based, with few images, and with fonts and colours that are easy to read. My hope is that accessibility devices, such as screen readers and their ilk, are able to enjoy the website and the course without any degraded experience.
If you find that there is an accessibility issue with the website or the course materials, please don't hesitate to contact me. I will try my best to remedy the problem as quickly as possible.
Course topics are intended to give a comprehensive overview to both non-technical and technical people across a variety of situations.
When used in a workplace, this course can replace security awareness training for the average employee working in non-regulated industries, which is the majority of people. However, it's best to use it in conjunction with on-site training — which often happens just once a year — because this course provides positive reinforcement of security awareness topics for the other 364 days of the year when employees are going about their daily work.
While 5 minutes per week doesn't seem like a lot of time for an employee to spend on security awareness training, the benefit of this type of training is that it is happening over a longer span of time. So even the required on-site training from six months ago will be remembered by employees since they are receiving regular training lessons from this course.
In terms of the course content, this course will complement security awareness training that dive deeper into technical topics because it provides employees with the groundwork for understanding more complex topics and terminology.
This course is designed, authored, and presented by
No part of the course materials may be reproduced in whole or in part, or stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the publisher. For information regarding permission, write to email@example.com.
Email has become a tricky thing, because people get so much unwanted "spam" these days. I want to change that by providing quality, timely email content to you.
It's genuinely annoying, isn't it? There is no 100% solution to this, as email providers are always changing their spam algorithms (i.e. the way they determine what is "spam email") to combat new threats.
The best way to ensure that the course emails are delivered successfully to your inbox, and not your spam folder, is to add firstname.lastname@example.org to your address book (also known as a "Contact" in some applications). The reason this works is that you are consenting to making the email address a known contact (i.e. a colleague) and it causes your email application to ensure that all emails from this address are delivered directly to you and not marked as spam.
I don't hide costs and discounts behind sales tactics — all of it is up front — so that the only surprise you have is one of delight.
The price of a single seat in this course is $52. Unless explicitly specified, all prices displayed on this website are in US dollars (USD).
A seat is defined as a single student, which is defined a single individual human being. I ask that you do not sign up for this course with an email address going to a group of people, as this violates this website's Terms of Service. Instead, please have each person sign up individually.
Taxes may be added onto the cost of the course based on the country and state/province provided in your credit card billing details. These taxes will be displayed as a separate line item on your receipt.
Yes, I'm pleased to help groups small and large become more secure. I want to make pricing fair and accessible to everyone so, depending on your size, you can see discounts of up to
|# of Seats||Discount||Price Per Seat|
|1 - 9||0%||$52.00|
|10 - 99||10%||$46.80|
|100 - 249||20%||$41.60|
|250 - 499||30%||$36.40|
|500 - 999||40%||$31.20|
Purchases made via the website, https://securityawareness.email, require credit cards to be processed through our payment processor, Stripe. This may be due to the use of credit cards, your concern over the security of Web security, or just a personal preference. Whatever the case, if for any reason you cannot or do not want to make a purchase in this manner, there are some alternative options as shown in the list below. Please note these alternate payment processes are handled manually and registration may take a bit longer (about 1 day) to complete.
- Interac® E-Transfer: please email email@example.com and we can setup an email address and shared password to use as required when sending money via E-Transfer. For more information about Interac® E-Transfer, please visit this page.
- Invoice: please email firstname.lastname@example.org and an invoice can be generated that you can pay. The payment will still be done via credit card (processed by Stripe), but will be performed using Stripe's secure capture payment portal.
- Paypal: please use https://paypal.me/justplainsimple to send money in this manner. I will respond back to the email address you used when making the purchase and we will setup the registration.
My number one concern is your safety and security. I want to help you feel comfortable and safe while learning the topics in this course.
Never. I firmly believe in individual privacy and that means monitoring email open rates and other types of tracking violates people's privacy, so I leave them out of any email communications to you. This means I cannot tell whether you have opened the email or viewed the attached lessons, I simply need to trust that you are learning at your own pace.
The payment processor which processes your credit card, Stripe, sends receipts via email to you after your payment has succeeded. They are a third-party company and may opt to using email tracking features. I have no control over their email communications or usage of tracking, though I have no yet seen them use tracking pixels or other surveillance in their email communications to customers.
Yes, definitely! But this is the only way the course materials can be delivered without you needing to login anywhere or sit in a classroom. We will talk more about what makes attachments dangerous in the lesson titled
Every email attachment you receive should be approached with a bit of healthy caution. Make sure you scan attachments with anti-virus, though your email provider may do this automatically for you. Never open attachments from people or emails that you weren't expecting.
In the case of this course, you are purchasing for a course that delivers its materials via email attachments on a consistent schedule, so the expectation is already set out up front during sign up. Let's look at a similar, but different, situation. If you purchase something from a store and then ask them to email you the receipt, you can feel safer opening the attachment from that store because it is (a) expected by you, (b) consented by you, and (c) arrived within an appropriate time. If the same store sent an email attachment to you one year later, without you consenting or purchasing anything, you would be correct in suspecting something is wrong and would need to follow up with the store directly to ensure the email attachment is legitimate.