Red Garrison Bootcamp

Building Human Firewalls, One Team at a Time.

Welcome to the Red Garrison Bootcamp — an immersive cybersecurity training experience built for real-world defense. Led by instructors with over 20 years of experience in adult education, this program is designed to equip your team with practical knowledge, hands-on skills, and lasting security habits. Backed by research showing that consistent coaching is the most effective way to change behavior, our Bootcamp delivers three powerful, 2-hour sessions scheduled throughout the year. Participants gain the confidence to spot threats, secure their digital lives, and take action when it counts. Every module is interactive, story-driven, and tailored specifically for non-technical users.

Ongoing Coaching Model

  • Session 1: Phishing & Social Engineering Defense

    Cybercriminals don’t hack — they trick. In this session, your team will learn how to recognize and respond to manipulative messages designed to steal information or trigger bad decisions. With a real-world story, team-based phishing challenge, and practical coaching, participants will:

    Identify common red flags in suspicious emails, texts, and calls

    Understand how fear, urgency, and authority are used to manipulate

    Learn what to do — and not do — when something feels off

    Includes the Phishing Defender badge and a printable Red Flag Cheat Sheet.

    Silhouette of a person fishing with a hat and a fishing rod against a clear sky at sunset.
  • Session 2: Passwords, Devices & Digital Hygiene

    Most breaches happen not because of hackers, but because of small, preventable habits. This session focuses on building better digital routines through relatable stories, team discussion, and a behavior-based game. Your team will:

    Learn what makes a password weak or risky

    Explore real reasons people reuse passwords — and how to stop

    Practice identifying unsafe behaviors around devices and software

    Includes the Digital Defender badge and a self-assessment checklist.

    Close-up of a metal gate secured with a chain and a Schlage padlock.
  • Session 3: Insider Threats & Incident Response Basics

    Security mistakes happen — the difference is how your team responds. In this session, participants will hear real insider threat examples, explore why fast reporting matters, and practice responding to realistic scenarios in a judgment-free format. Teams will:

    Understand the difference between accidental and intentional insider threats

    Learn the "Golden 10-Minute Rule" for reporting incidents quickly

    Participate in a roleplay response drill to build confidence

    Emergency SOS button with a red push button and yellow sign on a pole.

Agenda

🎯 Session 1: Phishing & Social Engineering Defense

Time Topic

0:00 – 0:10 Welcome & Icebreaker
-Quick introduction and team icebreaker (2 truths/1 lie with a cyber twist)

0:10 – 0:25 Phishing Basics: What is Phishing?
-Understanding the tactics of cybercriminals (video, real-world examples)

0:25 – 0:50 Red Flags: Spotting the Scam
-Interactive team-based phishing challenge (quiz format or live examples)

0:50 – 1:00 Break

1:00 – 1:25 Psychology of Social Engineering
-Why fear, urgency, and authority make us vulnerable
-Case studies from different industries

1:25 – 1:45 What to Do (and Not Do) in Case of a Scam
-Practical steps for reporting phishing attempts and other social engineering attacks

1:45 – 2:00 Wrap-Up & Takeaways
-Recap of key points
-Issuance of Phishing Defender badge
-Feedback survey + questions


🧼 Session 2: Passwords, Devices & Digital Hygiene

Time Topic

0:00 – 0:10 Welcome & Icebreaker
- “Password Confessions”: anonymous poll on past bad habits

0:10 – 0:30 What Makes a Strong Password?
- Myths vs. Reality (length > complexity, etc.)
- Real-world story of a breached org due to reused credentials

0:30 – 0:50 Password Reuse: Why We Do It
- Interactive group discussion: psychology + fixes
- Introduce password managers (brief mention, no tool training)

0:50 – 1:00 Break

1:00 – 1:30 Digital Hygiene Habits
- Unsafe behaviors: unlocked screens, public Wi-Fi, downloads
- Physical security tips for laptops, phones, USBs

1:30 – 1:50 Digital Hygiene Game: “Risk or Reasonable?”
- Team challenge to vote on behaviors (real vs. exaggerated)

1:50 – 2:00 Wrap-Up & Takeaways
- Review key points
- Hand out self-assessment checklist + Digital Defender badge
- Feedback form


🧠 Session 3: Insider Threats & Incident Response Basics

Time Topic

0:00 – 0:10 Welcome & Warm-Up
- “Would You Report It?” quickfire poll: gray-area scenarios

0:10 – 0:30 Understanding Insider Threats
- Accidental vs. intentional threats
- Real-world case studies: mishaps vs. malice

0:30 – 0:50 Why Speed Matters: The 10-Minute Rule
- How fast action reduces harm
- Reporting pathways (IT, supervisor, form, etc.)

0:50 – 1:00 Break

1:00 – 1:40 Interactive Drill: “Something’s Wrong”
- Group roleplay (choose-your-path style)
- Walk through realistic scenarios as a team (USB left in lobby, sensitive email sent to wrong client, etc.)

1:40 – 1:55 Debrief: What Went Well? What Would You Do Differently?
- Facilitator-led discussion on responses

1:55 – 2:00 Wrap-Up & Badge
- Summary
- Distribute Response Ready badge + feedback form