IT Security Modules
Eight modules covering the everyday security habits that protect you, your colleagues, and PAC's clients. Each includes a real-world story, red flags to watch for, and clear steps to respond.
Clean Desk Policy
Your desk is a data source. What you leave out, unlocked, or visible can be just as dangerous as a cyberattack.
Password Hygiene
Weak and reused passwords are involved in over 80% of breaches. Learn the right habits and tools.
Acceptable Use Policy
PAC systems are provided for PAC work. Understand the boundaries, the reasons, and how to raise concerns.
Physical Security & Tailgating
Badge access, visitor management, and why holding a door open for a stranger could be the most expensive habit you have.
Social Media Safety
What you share publicly is research material for attackers. One LinkedIn post enabled a $2.3M fraud.
Working Remotely & VPN
Home networks, public Wi-Fi, and personal devices change your threat environment significantly. Always use the VPN.
Incident Reporting
The worst outcome is not an incident. The worst outcome is not reporting one. PAC's no-blame culture means you should always tell IT — immediately. One company waited 206 days. It cost $250M.
AI Acceptable Use Policy
PAC has approved specific AI tools for specific uses. Learn the Data Classification Framework (Public, Private, Restricted), which AI tools are approved, and why one engineer pasting source code into ChatGPT sparked a global policy change.
Ready to prove your skills?
Once you've worked through the modules, take the assessment to earn your certificate.