
Red Garrison Bootcamp
Building Human Firewalls, One Team at a Time.
Welcome to the Red Garrison Bootcamp — an immersive cybersecurity training experience built for real-world defense. Led by instructors with over 20 years of experience in adult education, this program is designed to equip your team with practical knowledge, hands-on skills, and lasting security habits. Backed by research showing that consistent coaching is the most effective way to change behavior, our Bootcamp delivers three powerful, 2-hour sessions scheduled throughout the year. Participants gain the confidence to spot threats, secure their digital lives, and take action when it counts. Every module is interactive, story-driven, and tailored specifically for non-technical users.
Ongoing Coaching Model
-
Session 1: Phishing & Social Engineering Defense
Cybercriminals don’t hack — they trick. In this session, your team will learn how to recognize and respond to manipulative messages designed to steal information or trigger bad decisions. With a real-world story, team-based phishing challenge, and practical coaching, participants will:
Identify common red flags in suspicious emails, texts, and calls
Understand how fear, urgency, and authority are used to manipulate
Learn what to do — and not do — when something feels off
Includes the Phishing Defender badge and a printable Red Flag Cheat Sheet.
-
Session 2: Passwords, Devices & Digital Hygiene
Most breaches happen not because of hackers, but because of small, preventable habits. This session focuses on building better digital routines through relatable stories, team discussion, and a behavior-based game. Your team will:
Learn what makes a password weak or risky
Explore real reasons people reuse passwords — and how to stop
Practice identifying unsafe behaviors around devices and software
Includes the Digital Defender badge and a self-assessment checklist.
-
Session 3: Insider Threats & Incident Response Basics
Security mistakes happen — the difference is how your team responds. In this session, participants will hear real insider threat examples, explore why fast reporting matters, and practice responding to realistic scenarios in a judgment-free format. Teams will:
Understand the difference between accidental and intentional insider threats
Learn the "Golden 10-Minute Rule" for reporting incidents quickly
Participate in a roleplay response drill to build confidence
Agenda
🎯 Session 1: Phishing & Social Engineering Defense
Time Topic
0:00 – 0:10 Welcome & Icebreaker
-Quick introduction and team icebreaker (2 truths/1 lie with a cyber twist)
0:10 – 0:25 Phishing Basics: What is Phishing?
-Understanding the tactics of cybercriminals (video, real-world examples)
0:25 – 0:50 Red Flags: Spotting the Scam
-Interactive team-based phishing challenge (quiz format or live examples)
0:50 – 1:00 Break
1:00 – 1:25 Psychology of Social Engineering
-Why fear, urgency, and authority make us vulnerable
-Case studies from different industries
1:25 – 1:45 What to Do (and Not Do) in Case of a Scam
-Practical steps for reporting phishing attempts and other social engineering attacks
1:45 – 2:00 Wrap-Up & Takeaways
-Recap of key points
-Issuance of Phishing Defender badge
-Feedback survey + questions
🧼 Session 2: Passwords, Devices & Digital Hygiene
Time Topic
0:00 – 0:10 Welcome & Icebreaker
- “Password Confessions”: anonymous poll on past bad habits
0:10 – 0:30 What Makes a Strong Password?
- Myths vs. Reality (length > complexity, etc.)
- Real-world story of a breached org due to reused credentials
0:30 – 0:50 Password Reuse: Why We Do It
- Interactive group discussion: psychology + fixes
- Introduce password managers (brief mention, no tool training)
0:50 – 1:00 Break
1:00 – 1:30 Digital Hygiene Habits
- Unsafe behaviors: unlocked screens, public Wi-Fi, downloads
- Physical security tips for laptops, phones, USBs
1:30 – 1:50 Digital Hygiene Game: “Risk or Reasonable?”
- Team challenge to vote on behaviors (real vs. exaggerated)
1:50 – 2:00 Wrap-Up & Takeaways
- Review key points
- Hand out self-assessment checklist + Digital Defender badge
- Feedback form
🧠 Session 3: Insider Threats & Incident Response Basics
Time Topic
0:00 – 0:10 Welcome & Warm-Up
- “Would You Report It?” quickfire poll: gray-area scenarios
0:10 – 0:30 Understanding Insider Threats
- Accidental vs. intentional threats
- Real-world case studies: mishaps vs. malice
0:30 – 0:50 Why Speed Matters: The 10-Minute Rule
- How fast action reduces harm
- Reporting pathways (IT, supervisor, form, etc.)
0:50 – 1:00 Break
1:00 – 1:40 Interactive Drill: “Something’s Wrong”
- Group roleplay (choose-your-path style)
- Walk through realistic scenarios as a team (USB left in lobby, sensitive email sent to wrong client, etc.)
1:40 – 1:55 Debrief: What Went Well? What Would You Do Differently?
- Facilitator-led discussion on responses
1:55 – 2:00 Wrap-Up & Badge
- Summary
- Distribute Response Ready badge + feedback form