Announcing M Square 2025 Training Workshops
I'm excited to announce new training offerings for 2025, designed based on feedback from clients over the past year. These programs are structured by length, delivery format, and skill level to meet your team exactly where they are.
๐๏ธ Delivery Formats
Fully Hosted (Virtual)
Live instructor-led over Zoom/Teams. Includes downloadable materials and access to a secure lab environment.
On-Site
Delivered at your location. Includes live demos, handouts, and optional assessments.
Hybrid
Pre-recorded modules plus one or more live virtual Q&A or workshop sessions. Perfect for teams with scheduling constraints.
Fully Hosted (Luxury Experience)
Premium venue with catering, interactive games, swag bags, and hands-on simulations. Perfect for executive offsites and team retreats. Includes custom swag, policy templates, compliance checklists, and "Hacker Buster" awards.
โฑ๏ธ Package Length Options
๐น 1-Day Intensive Workshops
Great for awareness, leadership buy-in, or as an employee training day.
Beginner: Cyber Hygiene in a Day
Key Outcomes:
- Spot phishing attempts effectively
- Create strong passwords and enable MFA
- Understand basic security hygiene
- Reduce phishing risk by 60%
Topics Covered:
- Phishing identification techniques
- Password security best practices
- Multi-factor authentication setup
- Safe browsing and email habits
Bonus: Includes printable cheat sheet and internal quiz
Perfect for: All employees, non-technical staff
๐ Detailed Schedule:
| Time | Activity |
|---|---|
| 09:00โ09:30 | โ Welcome, Icebreaker & "Spot the Hacker" Game |
| 09:30โ10:30 | ๐บ Threats in Plain English (Video + Discussion) |
| 10:30โ10:45 | โ Coffee Break |
| 10:45โ12:00 | ๐ป Live Demo: How Phishing Works (Simulated Email + Remote Control) |
| 12:00โ13:00 | ๐ฝ๏ธ Lunch (provided for hosted events) |
| 13:00โ14:00 | ๐ Passwords, MFA, Social Engineering Defense |
| 14:00โ14:45 | ๐ฏ Game: "Hack or Fact" โ Quiz Show with Prizes |
| 14:45โ15:30 | ๐ Safe Browsing, USB Threats, Cloud Storage Risks |
| 15:30โ16:00 | ๐ฌ Wrap-Up, Feedback Cards, Certificate of Completion |
๐ง Learning Objectives:
- Understand modern threats like phishing, ransomware, and scams
- Build basic defense habits (MFA, secure passwords, email safety)
- Leave with real-world knowledge and confidence
๐ Interactive Elements:
- Live phishing demos with audience participation
- "Hack or Fact" quiz game with prizes
- Spot-the-Hacker icebreaker game
- Certificate of completion
Intermediate: Small Business Security Fundamentals
Key Outcomes:
- Understand network security basics
- Configure basic firewall rules
- Implement secure BYOD policies
- Identify common misconfigurations
Topics Covered:
- Network segmentation basics
- Firewall configuration
- Secure BYOD practices
- Endpoint protection fundamentals
Perfect for: IT staff, managers, small business owners
Advanced: The CEO Briefing
Key Outcomes:
- Understand risk exposure and cost of inaction
- Board-level risk communication strategies
- Cyber insurance considerations
- Strategic security decision-making
Topics Covered:
- Current threat landscape (industry-specific)
- Board-level risk communication
- Cyber insurance considerations
- Incident response decision-making frameworks
Bonus: Executive summary for risk posture
Perfect for: Executives, board members, leadership teams
Duration: 90 minutes to 1 day (condensed format)
๐น 3-Day Core Track
Ideal for technical teams, compliance prep, or deeper skill-building.
Intermediate: Secure Networks & Endpoints
Audience: IT, sysadmins, junior analysts
Format: Hybrid or on-site
Goal: Build secure infrastructure and endpoint protection
๐ Day 1: Foundations & Network Defense
| Time | Activity |
|---|---|
| 09:00โ10:00 | Threat Landscape + SMB Attack Vectors |
| 10:00โ11:30 | Network Topologies & Risk Zones |
| 11:30โ12:30 | Firewall Concepts (with demo) |
| 13:30โ15:00 | Setting Up a Segmented Network (Lab) |
| 15:00โ16:00 | Network Monitoring Basics (Snort/Wireshark) |
๐ Day 2: Endpoint Protection
| Time | Activity |
|---|---|
| 09:00โ10:00 | Malware Types + EDR/AV Role |
| 10:00โ11:30 | Hardening OS: Windows/Linux |
| 11:30โ12:30 | Patching, Updates, Asset Management |
| 13:30โ15:30 | Endpoint Lab: Secure Configuration |
| 15:30โ16:00 | Recap & Threat Simulation (interactive) |
๐ Day 3: Response & Policy
| Time | Activity |
|---|---|
| 09:00โ10:30 | Incident Response Workflow |
| 10:30โ12:00 | Hands-On Tabletop Breach Simulation |
| 13:00โ14:30 | Writing a Basic Security Policy |
| 14:30โ15:30 | Walkthrough: Free/Open Source Toolkits |
| 15:30โ16:00 | Wrap-Up + Certificate of Completion |
๐ง Learning Objectives:
- Design and secure small business network architecture
- Implement endpoint hardening and patching strategies
- Respond to basic incidents and establish policies
Perfect for: IT staff, sysadmins, junior security analysts
Beginner: Security Awareness Bootcamp
Key Outcomes:
- Understand security policies and procedures
- Recognize social engineering attacks
- Implement privacy fundamentals
- Build security-conscious culture
Day-by-Day Breakdown:
- Day 1: Security policies, privacy fundamentals, data handling
- Day 2: Social engineering defense, phishing identification
- Day 3: Security culture, incident reporting, assessment
Perfect for: All employees, compliance-focused teams
Interactive: Cyber Awareness Deep Dive (3-Day Experience)
Audience: Staff + IT teams
Format: Hosted, On-Site, or Virtual
Focus: Expanded awareness + intro to real threats through interactive simulations
๐ Day 1: Cyber Awareness Essentials Same as 1-Day Curriculum above
๐ Day 2: "Inside the Mind of a Hacker"
| Time | Activity |
|---|---|
| 09:00โ10:00 | ๐ญ How Hackers Think: Tools & Motives |
| 10:00โ11:00 | ๐ Demo: How a Hacker Finds a Weak Link (OSINT) |
| 11:00โ11:15 | โ Break |
| 11:15โ12:30 | ๐งโ๐ป Hands-On: "Break into Bob's Biz" Game (Guided Attack Simulation) |
| 12:30โ13:30 | ๐ฝ๏ธ Lunch |
| 13:30โ15:00 | ๐ก๏ธ Defend the Castle: Setting Simple Policies That Work |
| 15:00โ16:00 | ๐ผ Q&A: Ask a Hacker โ Real Stories, Real Advice |
๐ Day 3: "Cyber Risk & Business Defense 101"
| Time | Activity |
|---|---|
| 09:00โ10:30 | โ๏ธ Business Risk: Compliance, Ransomware, Vendors |
| 10:30โ11:00 | ๐ฌ Group Activity: What Would You Do? (Tabletop IR Scenarios) |
| 11:00โ12:30 | ๐ Building a Human Firewall: Culture & Awareness |
| 13:30โ15:00 | ๐ฏ Cyber Escape Room (Interactive Live Game) |
| 15:00โ16:00 | ๐ Graduation + Personal Cyber Checklist & Gifts |
๐ Includes:
- Interactive games and simulations
- "Break into Bob's Biz" guided attack simulation
- Cyber Escape Room challenge
- Personal cyber checklist handouts
- Swag bags for participants
- Certificate of completion
Perfect for: Teams new to cybersecurity, businesses wanting engaging training
Intermediate: Hands-On Hack Lab
Key Outcomes:
- Learn OWASP Top 10 via real attack simulations
- Practice identifying vulnerabilities
- Understand attack techniques
- Build defensive mindset
Day-by-Day Breakdown:
- Day 1: OWASP Top 10 overview, injection attacks
- Day 2: Authentication flaws, access control issues
- Day 3: Hands-on CTF challenges, reporting
Bonus: Temporary CTF-style access to hosted lab environment
Perfect for: IT staff, developers, security professionals
Advanced: Build Your IR Playbook
Key Outcomes:
- Create customized incident response plan
- Test breach readiness
- Develop actionable playbooks
- Practice tabletop simulations
Day-by-Day Breakdown:
- Day 1: IR plan development, roles and responsibilities
- Day 2: Playbook templates, communication procedures
- Day 3: Tabletop simulation, testing, refinement
Bonus: Includes tabletop simulation and IR template kit
Perfect for: Mixed-level teams, security teams, IT leadership
๐น 5-Day Work Week Program
Comprehensive trainingโperfect for internal upskilling, red/blue team prep, or cert-track readiness.
Beginner: Security Foundations
Day-by-Day Breakdown:
- Day 1-2: Security awareness fundamentals
- Phishing identification
- Password security
- MFA implementation
- Safe browsing habits
- Day 3: Email & web threats
- Email security best practices
- Web threat landscape
- Social engineering defense
- Day 4: Policy & compliance basics
- Security policies
- Data handling procedures
- Compliance fundamentals
- Day 5: Review & assessment
- Knowledge check
- Q&A session
- Action planning
Perfect for: All employees, new hires, security awareness programs
Intermediate: Blue Team Essentials
Topics Covered:
- SIEM fundamentals and log analysis
- Threat hunting techniques
- Alert triage and investigation
- Incident response procedures
- Security monitoring best practices
Perfect for: IT security teams, SOC analysts, security operations
Advanced: Red Team Jumpstart
Audience: Intermediate+ tech staff, devs, security analysts
Format: On-site or hosted lab
Goal: Understand attacker methodologies and apply pen testing techniques
๐ Daily Schedule (same each day):
| Time | Activity |
|---|---|
| 09:00โ10:30 | Lecture + Case Study |
| 10:30โ12:00 | Tool Demo or Guided Walkthrough |
| 13:00โ15:00 | Hands-On Lab |
| 15:00โ16:00 | Discussion, Reflection, Optional Challenge |
๐ Day-by-Day Breakdown:
Day 1: Introduction to Ethical Hacking
- Cyber kill chain, hacker mindset, legal considerations
- Lab: Kali Linux + Virtual Lab Setup
Day 2: Recon & Scanning
- OSINT, subdomain enum, port scanning (Nmap)
- Lab: Enumerate mock targets
Day 3: Vulnerability Discovery
- Web app scanning (Nikto, Dirb), CVEs, exploits
- Lab: Discover vulnerabilities in a hosted site
Day 4: Exploitation Basics
- Exploit chaining, Metasploit, simple RCEs
- Lab: Gain shell access on a vulnerable machine
Day 5: Reporting & Defense
- Writing a pen test report, debrief with blue team
- Optional: Red vs Blue live exercise
- Final Q&A + Certificates
๐ง Learning Objectives:
- Understand and replicate the attack lifecycle
- Conduct basic penetration testing and write findings
- Increase empathy for defense via offense
Perfect for: Security professionals, penetration testers, red team members
Mixed-Level: Compliance & Risk for SMBs
Topics Covered:
- HIPAA/GDPR compliance fundamentals
- Policy development and documentation
- Risk assessment methodologies
- Vendor risk management
- Audit preparation
Perfect for: Compliance teams, healthcare organizations, regulated industries
๐ก๏ธ 5-Day Executive & Team Offsite โ Awareness, Simulation, Strategy
Designed for org-wide behavior shift. Hosted at a retreat-like venue.
Audience: Leadership + Teams
Format: Fully Hosted (Luxury Experience)
Goal: Complete cybersecurity transformation through engaging, interactive experience
| Day | Theme | Core Activities |
|---|---|---|
| Day 1 | Awareness 101 | Follows 1-Day Curriculum with interactive elements |
| Day 2 | How Hackers Think | OSINT demos, simulated attacks, hacker mindset, "Break into Bob's Biz" game |
| Day 3 | Business Risk & Tabletop IR | Real-world scenarios, plan walkthroughs, Q&A with expert |
| Day 4 | Culture & Prevention | Live games, role-specific breakouts, employee involvement, Cyber Escape Room |
| Day 5 | Executive Risk Workshop | Executive-focused workshop on cost, liability, strategy, board communication |
๐ Luxury Experience Includes:
- Custom swag bags for all participants
- Policy templates and compliance checklist handouts
- "Hacker Buster" awards for top performers
- Premium venue with catering (snacks, drinks, meals)
- Live network demo setup
- Printed materials and handouts
- Interactive simulations and games
- Certificate of completion
Perfect for: Executive teams, company-wide training initiatives, retreat-style learning
๐ฆ Featured Training Packages
๐งพ "Cyber Hygiene in a Day"
Format: 1-day, on-site or virtual
Audience: Non-technical staff
Outcomes: Reduce phishing risk by 60%, create secure habits
Bonus: Includes printable cheat sheet, internal quiz
๐งพ "Hands-On Hack Lab"
Format: 3-day, hosted with virtual labs
Audience: IT staff / developers
Outcomes: Learn OWASP Top 10 via real attack simulations
Bonus: Temporary CTF-style access to hosted lab
๐งพ "Build Your IR Playbook"
Format: 3 or 5 days, hybrid
Audience: Mixed-level teams
Outcomes: Create customized IR plan, test breach readiness
Bonus: Includes tabletop simulation and templates
๐งพ "The CEO Briefing"
Format: 90 mins โ 1 day (condensed)
Audience: Executives, board
Outcomes: Understand risk exposure, cost of inaction
Bonus: Executive summary for risk posture
๐ง Add-On Services
Enhance your training with these optional add-ons:
- ๐ Policy and Documentation Review โ Review and improve your security policies
- ๐งช Simulated Phishing Test โ Test your team's awareness post-training
- ๐ง Post-Training Quiz or Mini-Cert โ Validate learning with assessments
- ๐งโ๐ป Managed Follow-Up Assessments โ Monthly/quarterly check-ins and refreshers
๐ฐ Training Formats & Pricing
| Format | Description | Starting At |
|---|---|---|
| Virtual | Remote via video conferencing | $1,500 |
| On-Site | At your location | $3,000 |
| Fully Hosted | Premium venue with catering | $6,000 |
| Hybrid | Pre-recorded + live sessions | Custom |
๐ Luxury Experience Pricing (Fully Hosted)
| Package | Virtual | On-Site | Fully Hosted (Luxury) |
|---|---|---|---|
| 1-Day | $1,500โ$2,500 | $3,000โ$5,000 | $6,000โ$8,000 |
| 3-Day | $4,000โ$6,000 | $6,000โ$10,000 | $12,000โ$18,000 |
| 5-Day | $7,000โ$9,000 | $10,000โ$15,000 | $20,000โ$30,000+ |
๐ก Luxury Hosted costs include: Premium venue, catering (snacks, drinks, meals), custom swag bags, live network demo setup, printed materials, hands-on simulations, interactive games, and certificates.
All formats include:
- Downloadable materials
- Hands-on labs (where applicable)
- Follow-up Q&A sessions
- Security culture consulting
- Interactive games and simulations (luxury packages)
๐ธ How We Price Training
Base Pricing Factors
Pricing is based on several factors:
- Duration: 1-day, 3-day, or 5-day programs
- Format: Virtual (lowest cost), On-Site (includes travel), Luxury Hosted (premium experience)
- Customization: Industry-specific content may adjust pricing
- Group Size: See attendee scaling below
๐ฅ Attendee Scaling
| Attendees | Cost Adjustment |
|---|---|
| 1โ10 | Base cost (standard) |
| 11โ25 | +10% |
| 26โ50 | +15โ20% |
| 51โ100+ | Custom quote |
โ๏ธ Travel & Location
- Regional (within service area): Included in on-site base pricing
- Out-of-state: +15โ25% to on-site base cost for travel, lodging, per diem
- Virtual: No travel costs
๐ฆ Add-On Services
Enhance your training with optional add-ons:
- Simulated Phishing Test: +$500 (2-week campaign)
- Custom Policy Review: +$1,000 (review + feedback)
- Live CTF Game Setup: +$750 (custom setup & scoring)
- Printed Workbook Packets: +$25/person (branded materials)
- Swag Bags/Prizes: +$20/person (stickers, shirts, awards)
- Post-Training Assessment: Included
- Certificates & Badges: Included
- Managed Follow-Up: Custom pricing (monthly/quarterly)
๐ Sample Quote
Example: On-Site, 3-Day Training, 20 People
- Base Training (3-Day, On-Site): $8,000
- Printed Materials ($25 ร 20): $500
- Swag Bags ($20 ร 20): $400
- Live CTF Game Setup: $750
- Attendee Scaling (11โ25 people, +10%): $800
- Total Estimate: $10,450
๐ก Pricing Transparency: All base prices are "starting at" estimates. Final pricing depends on your specific needs, group size, location, and customization requirements. We'll provide a detailed quote after understanding your requirements.
๐ฆ Bundle Packages (Save 10โ15%)
Combine training with add-ons for maximum value:
- Essential Bundle: Training + Phishing Test + Printed Materials (Save 10%)
- Complete Bundle: Training + All Add-Ons (Save 15%)
- Annual Package: Yearly training + quarterly refreshers + ongoing support (Save 20%)
Bundle pricing calculated at time of quote. Contact us for custom bundle options.
๐ฏ 1-on-1 Tutoring
$150โ$250/session
Perfect for:
- Junior IT staff
- New hires
- Career changers moving into cybersecurity
- Personalized skill development
๐ Scheduling
I'm now booking for Q1 and Q2 2025. Popular dates fill quicklyโespecially for on-site workshops.
To discuss your team's needs or request a custom curriculum:
- ๐ง Email: m1k3@msquarellc.net
- ๐ Phone: (559) 670-3159
- ๐ Schedule: Book a free consultation
โ What Makes Our Training Different
- Real-world focus โ Not theoretical scenarios, but actual attacks and defenses
- Hands-on experience โ Live demos from a certified ethical hacker
- Practical outcomes โ Measurable results, not just completion certificates
- Flexible delivery โ Virtual, on-site, or hybrid to fit your schedule
- Customizable โ Tailored to your industry, team size, and skill levels
๐ฎ Interactive Training Experience Elements
Our training goes beyond traditional presentations. We create an engaging, memorable experience that makes cybersecurity stick.
๐ฏ Interactive Games & Activities
- "Spot the Hacker" โ Icebreaker game to kick off training
- "Hack or Fact" โ Quiz show format with prizes for winners
- "Break into Bob's Biz" โ Guided attack simulation game
- Cyber Escape Room โ Team-based challenge solving security puzzles
- "What Would You Do?" โ Tabletop incident response scenarios
๐ป Live Demos & Simulations
- Real-time phishing attacks โ See exactly how attackers craft emails
- OSINT demonstrations โ Watch how hackers gather information
- Mock network simulations โ Hands-on experience in controlled environment
- Remote control demonstrations โ See what happens when defenses fail
๐ Swag & Recognition
- Custom swag bags โ Branded cybersecurity essentials
- "Hacker Buster" awards โ Recognition for top performers
- Certificates of completion โ Professional documentation
- Personal cyber checklists โ Take-home action items
- Policy templates โ Ready-to-use security policies
๐ฝ๏ธ Premium Hosting (Luxury Packages)
- Premium venues โ Professional retreat-like settings
- Catering included โ Snacks, drinks, and meals provided
- Printed materials โ Professional handouts and resources
- Live network demos โ On-site demonstration setup
- Team building โ Designed to build security culture together
๐ฏ Training Structure Overview
| Format | Audience | Focus |
|---|---|---|
| 1-Day | All Staff | Awareness & Prevention Basics |
| 3-Day | Staff + IT | Expanded Awareness + Intro to Real Threats |
| 5-Day | Leadership + Teams | Awareness + Threat Simulation + Defense Mindset |
Each longer package builds on the previous, reinforcing concepts and introducing deeper awareness without going overly technical. It's not about teaching hackingโit's about understanding risk through simulation and storytelling.
Ready to level up your team's security knowledge? Let's talk.
Questions about training? Reach out directly:
- Email: m1k3@msquarellc.net
- Phone: (559) 670-3159
- Schedule: Book a free consultation
M Square LLC
Cybersecurity | Penetration Testing | No-Nonsense Advice