GT-100-FI
Shock & Awe: Cybersecurity Awareness for the Financial Industry – Level 1
Description
An interactive experience designed for the financial industry, this comprehensive course dives into common attacks like phishing and ransomware while showcasing cutting-edge defenses, live demos, The Hackers Toolkit, and fostering teamwork through workshops tailored for the financial industry (including credit card companies and banks). Learn regulatory best practices while collaborating to outsmart cyber threats.
Objectives
By the end of this course, participants will:
- Promote a culture of security within financial teams and organizations.
- Observe Ethical Hacker Instructors Toolkit (NDA/ethics contract must be signed, no photos).
- Understand the security risks unique to financial institutions and services.
- Recognize threats to client data, transactions, and internal systems.
- Learn how to identify and mitigate social engineering and cyberattack tactics.
- Apply best practices in information security, regulatory compliance, and incident response.
Key Takeaways
- How to build a human firewall and key traits
- Deepened awareness of the evolving threat landscape in finance
- Practical knowledge to secure sensitive financial and client data
- Confidence in identifying, avoiding, and reporting cyber and physical security threats
- Reinforced commitment to regulatory compliance and organizational trust
Who Is This For
This course is designed for financial industry professionals.
Certificate of Completion
- Certificate of Completion issued after successful completion of all chapters, hands-on exercises, and course evaluation.
- Certificate is downloadable from the Ghost Team Academy Education Portal.
Training Outline
Module 1: Introduction to Security in Finance
- The Financial Sector as a High-Value Target
- Overview of Security Threats: Fraud, Phishing, Insider Threats, and Cybercrime
- Regulatory Landscape: GDPR, GLBA, SOX, PCI DSS, and Others
- Ethical Hacker Instructors Toolkit (NDA/ethics contract must be signed, no photos)
Module 2: Information & Data Security
- Protecting Client and Transaction Data
- Secure Data Handling and Transmission
- Data Classification and Access Control
- Encryption Basics and Usage
Module 3: Cybersecurity Threats & Defense
- Common Attack Vectors: Phishing, Ransomware, Business Email Compromise (BEC)
- The Dark Web
- Safe Use of Email, Browsers, and Online Tools
- Password Management and Multi-Factor Authentication (MFA)
- Identifying and Reporting Suspicious Digital Activity
Module 4: Social Engineering & Insider Threats
- Recognizing Manipulation Tactics Used in Social Engineering
- Real-Life Case Studies from the Financial Sector
- Insider Threat Detection and Prevention
- Secure Communication with Clients and Vendors
Module 5: Physical & Remote Security Practices
- Securing Devices and Documents in the Office and at Home
- Clean Desk Policies and Physical Access Controls
- Security Considerations for Remote and Hybrid Workforces
- Safe Use of Mobile Devices and Public Networks
Module 6: Incident Response & Compliance
- What To Do in Case of a Breach or Suspected Attack
- Internal Reporting Channels and Protocols
- Working with IT, Legal, and Compliance Teams
- Regulatory Breach Notification Requirements
Module 7: Conclusion
- Course Summary
- Key takeaways
- Q&A
Optional: Live Audience Hacking



















