Skip to main content
๐Ÿ“ฃCompany News15 min read
โ€ข

Announcing M Square 2025 Training Workshops

New training programs for 2025 including hands-on workshops, executive briefings, and customized security awareness programs.

announcementtrainingworkshops

Announcing M Square 2025 Training Workshops

I'm excited to announce new training offerings for 2025, designed based on feedback from clients over the past year. These programs are structured by length, delivery format, and skill level to meet your team exactly where they are.


๐Ÿ—‚๏ธ Delivery Formats

Fully Hosted (Virtual)

Live instructor-led over Zoom/Teams. Includes downloadable materials and access to a secure lab environment.

On-Site

Delivered at your location. Includes live demos, handouts, and optional assessments.

Hybrid

Pre-recorded modules plus one or more live virtual Q&A or workshop sessions. Perfect for teams with scheduling constraints.

Fully Hosted (Luxury Experience)

Premium venue with catering, interactive games, swag bags, and hands-on simulations. Perfect for executive offsites and team retreats. Includes custom swag, policy templates, compliance checklists, and "Hacker Buster" awards.


โฑ๏ธ Package Length Options

๐Ÿ”น 1-Day Intensive Workshops

Great for awareness, leadership buy-in, or as an employee training day.

Beginner: Cyber Hygiene in a Day

Key Outcomes:

  • Spot phishing attempts effectively
  • Create strong passwords and enable MFA
  • Understand basic security hygiene
  • Reduce phishing risk by 60%

Topics Covered:

  • Phishing identification techniques
  • Password security best practices
  • Multi-factor authentication setup
  • Safe browsing and email habits

Bonus: Includes printable cheat sheet and internal quiz

Perfect for: All employees, non-technical staff

๐Ÿ“‹ Detailed Schedule:

TimeActivity
09:00โ€“09:30โ˜• Welcome, Icebreaker & "Spot the Hacker" Game
09:30โ€“10:30๐Ÿ“บ Threats in Plain English (Video + Discussion)
10:30โ€“10:45โ˜• Coffee Break
10:45โ€“12:00๐Ÿ’ป Live Demo: How Phishing Works (Simulated Email + Remote Control)
12:00โ€“13:00๐Ÿฝ๏ธ Lunch (provided for hosted events)
13:00โ€“14:00๐Ÿ” Passwords, MFA, Social Engineering Defense
14:00โ€“14:45๐ŸŽฏ Game: "Hack or Fact" โ€” Quiz Show with Prizes
14:45โ€“15:30๐ŸŒ Safe Browsing, USB Threats, Cloud Storage Risks
15:30โ€“16:00๐Ÿ’ฌ Wrap-Up, Feedback Cards, Certificate of Completion

๐Ÿง  Learning Objectives:

  • Understand modern threats like phishing, ransomware, and scams
  • Build basic defense habits (MFA, secure passwords, email safety)
  • Leave with real-world knowledge and confidence

๐ŸŽ Interactive Elements:

  • Live phishing demos with audience participation
  • "Hack or Fact" quiz game with prizes
  • Spot-the-Hacker icebreaker game
  • Certificate of completion

Intermediate: Small Business Security Fundamentals

Key Outcomes:

  • Understand network security basics
  • Configure basic firewall rules
  • Implement secure BYOD policies
  • Identify common misconfigurations

Topics Covered:

  • Network segmentation basics
  • Firewall configuration
  • Secure BYOD practices
  • Endpoint protection fundamentals

Perfect for: IT staff, managers, small business owners


Advanced: The CEO Briefing

Key Outcomes:

  • Understand risk exposure and cost of inaction
  • Board-level risk communication strategies
  • Cyber insurance considerations
  • Strategic security decision-making

Topics Covered:

  • Current threat landscape (industry-specific)
  • Board-level risk communication
  • Cyber insurance considerations
  • Incident response decision-making frameworks

Bonus: Executive summary for risk posture

Perfect for: Executives, board members, leadership teams

Duration: 90 minutes to 1 day (condensed format)


๐Ÿ”น 3-Day Core Track

Ideal for technical teams, compliance prep, or deeper skill-building.

Intermediate: Secure Networks & Endpoints

Audience: IT, sysadmins, junior analysts
Format: Hybrid or on-site
Goal: Build secure infrastructure and endpoint protection

๐Ÿ“‹ Day 1: Foundations & Network Defense

TimeActivity
09:00โ€“10:00Threat Landscape + SMB Attack Vectors
10:00โ€“11:30Network Topologies & Risk Zones
11:30โ€“12:30Firewall Concepts (with demo)
13:30โ€“15:00Setting Up a Segmented Network (Lab)
15:00โ€“16:00Network Monitoring Basics (Snort/Wireshark)

๐Ÿ“‹ Day 2: Endpoint Protection

TimeActivity
09:00โ€“10:00Malware Types + EDR/AV Role
10:00โ€“11:30Hardening OS: Windows/Linux
11:30โ€“12:30Patching, Updates, Asset Management
13:30โ€“15:30Endpoint Lab: Secure Configuration
15:30โ€“16:00Recap & Threat Simulation (interactive)

๐Ÿ“‹ Day 3: Response & Policy

TimeActivity
09:00โ€“10:30Incident Response Workflow
10:30โ€“12:00Hands-On Tabletop Breach Simulation
13:00โ€“14:30Writing a Basic Security Policy
14:30โ€“15:30Walkthrough: Free/Open Source Toolkits
15:30โ€“16:00Wrap-Up + Certificate of Completion

๐Ÿง  Learning Objectives:

  • Design and secure small business network architecture
  • Implement endpoint hardening and patching strategies
  • Respond to basic incidents and establish policies

Perfect for: IT staff, sysadmins, junior security analysts


Beginner: Security Awareness Bootcamp

Key Outcomes:

  • Understand security policies and procedures
  • Recognize social engineering attacks
  • Implement privacy fundamentals
  • Build security-conscious culture

Day-by-Day Breakdown:

  • Day 1: Security policies, privacy fundamentals, data handling
  • Day 2: Social engineering defense, phishing identification
  • Day 3: Security culture, incident reporting, assessment

Perfect for: All employees, compliance-focused teams


Interactive: Cyber Awareness Deep Dive (3-Day Experience)

Audience: Staff + IT teams
Format: Hosted, On-Site, or Virtual
Focus: Expanded awareness + intro to real threats through interactive simulations

๐Ÿ“‹ Day 1: Cyber Awareness Essentials Same as 1-Day Curriculum above

๐Ÿ“‹ Day 2: "Inside the Mind of a Hacker"

TimeActivity
09:00โ€“10:00๐ŸŽญ How Hackers Think: Tools & Motives
10:00โ€“11:00๐Ÿ”Ž Demo: How a Hacker Finds a Weak Link (OSINT)
11:00โ€“11:15โ˜• Break
11:15โ€“12:30๐Ÿง‘โ€๐Ÿ’ป Hands-On: "Break into Bob's Biz" Game (Guided Attack Simulation)
12:30โ€“13:30๐Ÿฝ๏ธ Lunch
13:30โ€“15:00๐Ÿ›ก๏ธ Defend the Castle: Setting Simple Policies That Work
15:00โ€“16:00๐Ÿ’ผ Q&A: Ask a Hacker โ€“ Real Stories, Real Advice

๐Ÿ“‹ Day 3: "Cyber Risk & Business Defense 101"

TimeActivity
09:00โ€“10:30โš–๏ธ Business Risk: Compliance, Ransomware, Vendors
10:30โ€“11:00๐Ÿ’ฌ Group Activity: What Would You Do? (Tabletop IR Scenarios)
11:00โ€“12:30๐Ÿ“Š Building a Human Firewall: Culture & Awareness
13:30โ€“15:00๐ŸŽฏ Cyber Escape Room (Interactive Live Game)
15:00โ€“16:00๐ŸŽ“ Graduation + Personal Cyber Checklist & Gifts

๐ŸŽ Includes:

  • Interactive games and simulations
  • "Break into Bob's Biz" guided attack simulation
  • Cyber Escape Room challenge
  • Personal cyber checklist handouts
  • Swag bags for participants
  • Certificate of completion

Perfect for: Teams new to cybersecurity, businesses wanting engaging training


Intermediate: Hands-On Hack Lab

Key Outcomes:

  • Learn OWASP Top 10 via real attack simulations
  • Practice identifying vulnerabilities
  • Understand attack techniques
  • Build defensive mindset

Day-by-Day Breakdown:

  • Day 1: OWASP Top 10 overview, injection attacks
  • Day 2: Authentication flaws, access control issues
  • Day 3: Hands-on CTF challenges, reporting

Bonus: Temporary CTF-style access to hosted lab environment

Perfect for: IT staff, developers, security professionals


Advanced: Build Your IR Playbook

Key Outcomes:

  • Create customized incident response plan
  • Test breach readiness
  • Develop actionable playbooks
  • Practice tabletop simulations

Day-by-Day Breakdown:

  • Day 1: IR plan development, roles and responsibilities
  • Day 2: Playbook templates, communication procedures
  • Day 3: Tabletop simulation, testing, refinement

Bonus: Includes tabletop simulation and IR template kit

Perfect for: Mixed-level teams, security teams, IT leadership


๐Ÿ”น 5-Day Work Week Program

Comprehensive trainingโ€”perfect for internal upskilling, red/blue team prep, or cert-track readiness.

Beginner: Security Foundations

Day-by-Day Breakdown:

  • Day 1-2: Security awareness fundamentals
    • Phishing identification
    • Password security
    • MFA implementation
    • Safe browsing habits
  • Day 3: Email & web threats
    • Email security best practices
    • Web threat landscape
    • Social engineering defense
  • Day 4: Policy & compliance basics
    • Security policies
    • Data handling procedures
    • Compliance fundamentals
  • Day 5: Review & assessment
    • Knowledge check
    • Q&A session
    • Action planning

Perfect for: All employees, new hires, security awareness programs


Intermediate: Blue Team Essentials

Topics Covered:

  • SIEM fundamentals and log analysis
  • Threat hunting techniques
  • Alert triage and investigation
  • Incident response procedures
  • Security monitoring best practices

Perfect for: IT security teams, SOC analysts, security operations


Advanced: Red Team Jumpstart

Audience: Intermediate+ tech staff, devs, security analysts
Format: On-site or hosted lab
Goal: Understand attacker methodologies and apply pen testing techniques

๐Ÿ“‹ Daily Schedule (same each day):

TimeActivity
09:00โ€“10:30Lecture + Case Study
10:30โ€“12:00Tool Demo or Guided Walkthrough
13:00โ€“15:00Hands-On Lab
15:00โ€“16:00Discussion, Reflection, Optional Challenge

๐Ÿ“‹ Day-by-Day Breakdown:

Day 1: Introduction to Ethical Hacking

  • Cyber kill chain, hacker mindset, legal considerations
  • Lab: Kali Linux + Virtual Lab Setup

Day 2: Recon & Scanning

  • OSINT, subdomain enum, port scanning (Nmap)
  • Lab: Enumerate mock targets

Day 3: Vulnerability Discovery

  • Web app scanning (Nikto, Dirb), CVEs, exploits
  • Lab: Discover vulnerabilities in a hosted site

Day 4: Exploitation Basics

  • Exploit chaining, Metasploit, simple RCEs
  • Lab: Gain shell access on a vulnerable machine

Day 5: Reporting & Defense

  • Writing a pen test report, debrief with blue team
  • Optional: Red vs Blue live exercise
  • Final Q&A + Certificates

๐Ÿง  Learning Objectives:

  • Understand and replicate the attack lifecycle
  • Conduct basic penetration testing and write findings
  • Increase empathy for defense via offense

Perfect for: Security professionals, penetration testers, red team members


Mixed-Level: Compliance & Risk for SMBs

Topics Covered:

  • HIPAA/GDPR compliance fundamentals
  • Policy development and documentation
  • Risk assessment methodologies
  • Vendor risk management
  • Audit preparation

Perfect for: Compliance teams, healthcare organizations, regulated industries


๐Ÿ›ก๏ธ 5-Day Executive & Team Offsite โ€” Awareness, Simulation, Strategy

Designed for org-wide behavior shift. Hosted at a retreat-like venue.

Audience: Leadership + Teams
Format: Fully Hosted (Luxury Experience)
Goal: Complete cybersecurity transformation through engaging, interactive experience

DayThemeCore Activities
Day 1Awareness 101Follows 1-Day Curriculum with interactive elements
Day 2How Hackers ThinkOSINT demos, simulated attacks, hacker mindset, "Break into Bob's Biz" game
Day 3Business Risk & Tabletop IRReal-world scenarios, plan walkthroughs, Q&A with expert
Day 4Culture & PreventionLive games, role-specific breakouts, employee involvement, Cyber Escape Room
Day 5Executive Risk WorkshopExecutive-focused workshop on cost, liability, strategy, board communication

๐ŸŽ Luxury Experience Includes:

  • Custom swag bags for all participants
  • Policy templates and compliance checklist handouts
  • "Hacker Buster" awards for top performers
  • Premium venue with catering (snacks, drinks, meals)
  • Live network demo setup
  • Printed materials and handouts
  • Interactive simulations and games
  • Certificate of completion

Perfect for: Executive teams, company-wide training initiatives, retreat-style learning


๐Ÿงพ "Cyber Hygiene in a Day"

Format: 1-day, on-site or virtual
Audience: Non-technical staff
Outcomes: Reduce phishing risk by 60%, create secure habits
Bonus: Includes printable cheat sheet, internal quiz


๐Ÿงพ "Hands-On Hack Lab"

Format: 3-day, hosted with virtual labs
Audience: IT staff / developers
Outcomes: Learn OWASP Top 10 via real attack simulations
Bonus: Temporary CTF-style access to hosted lab


๐Ÿงพ "Build Your IR Playbook"

Format: 3 or 5 days, hybrid
Audience: Mixed-level teams
Outcomes: Create customized IR plan, test breach readiness
Bonus: Includes tabletop simulation and templates


๐Ÿงพ "The CEO Briefing"

Format: 90 mins โ€“ 1 day (condensed)
Audience: Executives, board
Outcomes: Understand risk exposure, cost of inaction
Bonus: Executive summary for risk posture


๐Ÿ”ง Add-On Services

Enhance your training with these optional add-ons:

  • ๐Ÿ“ƒ Policy and Documentation Review โ€” Review and improve your security policies
  • ๐Ÿงช Simulated Phishing Test โ€” Test your team's awareness post-training
  • ๐Ÿง  Post-Training Quiz or Mini-Cert โ€” Validate learning with assessments
  • ๐Ÿง‘โ€๐Ÿ’ป Managed Follow-Up Assessments โ€” Monthly/quarterly check-ins and refreshers

๐Ÿ’ฐ Training Formats & Pricing

FormatDescriptionStarting At
VirtualRemote via video conferencing$1,500
On-SiteAt your location$3,000
Fully HostedPremium venue with catering$6,000
HybridPre-recorded + live sessionsCustom

๐Ÿ’Ž Luxury Experience Pricing (Fully Hosted)

PackageVirtualOn-SiteFully Hosted (Luxury)
1-Day$1,500โ€“$2,500$3,000โ€“$5,000$6,000โ€“$8,000
3-Day$4,000โ€“$6,000$6,000โ€“$10,000$12,000โ€“$18,000
5-Day$7,000โ€“$9,000$10,000โ€“$15,000$20,000โ€“$30,000+

๐Ÿ’ก Luxury Hosted costs include: Premium venue, catering (snacks, drinks, meals), custom swag bags, live network demo setup, printed materials, hands-on simulations, interactive games, and certificates.

All formats include:

  • Downloadable materials
  • Hands-on labs (where applicable)
  • Follow-up Q&A sessions
  • Security culture consulting
  • Interactive games and simulations (luxury packages)

๐Ÿ’ธ How We Price Training

Base Pricing Factors

Pricing is based on several factors:

  • Duration: 1-day, 3-day, or 5-day programs
  • Format: Virtual (lowest cost), On-Site (includes travel), Luxury Hosted (premium experience)
  • Customization: Industry-specific content may adjust pricing
  • Group Size: See attendee scaling below

๐Ÿ‘ฅ Attendee Scaling

AttendeesCost Adjustment
1โ€“10Base cost (standard)
11โ€“25+10%
26โ€“50+15โ€“20%
51โ€“100+Custom quote

โœˆ๏ธ Travel & Location

  • Regional (within service area): Included in on-site base pricing
  • Out-of-state: +15โ€“25% to on-site base cost for travel, lodging, per diem
  • Virtual: No travel costs

๐Ÿ“ฆ Add-On Services

Enhance your training with optional add-ons:

  • Simulated Phishing Test: +$500 (2-week campaign)
  • Custom Policy Review: +$1,000 (review + feedback)
  • Live CTF Game Setup: +$750 (custom setup & scoring)
  • Printed Workbook Packets: +$25/person (branded materials)
  • Swag Bags/Prizes: +$20/person (stickers, shirts, awards)
  • Post-Training Assessment: Included
  • Certificates & Badges: Included
  • Managed Follow-Up: Custom pricing (monthly/quarterly)

๐Ÿ“Š Sample Quote

Example: On-Site, 3-Day Training, 20 People

  • Base Training (3-Day, On-Site): $8,000
  • Printed Materials ($25 ร— 20): $500
  • Swag Bags ($20 ร— 20): $400
  • Live CTF Game Setup: $750
  • Attendee Scaling (11โ€“25 people, +10%): $800
  • Total Estimate: $10,450

๐Ÿ’ก Pricing Transparency: All base prices are "starting at" estimates. Final pricing depends on your specific needs, group size, location, and customization requirements. We'll provide a detailed quote after understanding your requirements.

๐Ÿ“ฆ Bundle Packages (Save 10โ€“15%)

Combine training with add-ons for maximum value:

  • Essential Bundle: Training + Phishing Test + Printed Materials (Save 10%)
  • Complete Bundle: Training + All Add-Ons (Save 15%)
  • Annual Package: Yearly training + quarterly refreshers + ongoing support (Save 20%)

Bundle pricing calculated at time of quote. Contact us for custom bundle options.


๐ŸŽฏ 1-on-1 Tutoring

$150โ€“$250/session

Perfect for:

  • Junior IT staff
  • New hires
  • Career changers moving into cybersecurity
  • Personalized skill development

๐Ÿ“… Scheduling

I'm now booking for Q1 and Q2 2025. Popular dates fill quicklyโ€”especially for on-site workshops.

To discuss your team's needs or request a custom curriculum:


โœ… What Makes Our Training Different

  • Real-world focus โ€” Not theoretical scenarios, but actual attacks and defenses
  • Hands-on experience โ€” Live demos from a certified ethical hacker
  • Practical outcomes โ€” Measurable results, not just completion certificates
  • Flexible delivery โ€” Virtual, on-site, or hybrid to fit your schedule
  • Customizable โ€” Tailored to your industry, team size, and skill levels

๐ŸŽฎ Interactive Training Experience Elements

Our training goes beyond traditional presentations. We create an engaging, memorable experience that makes cybersecurity stick.

๐ŸŽฏ Interactive Games & Activities

  • "Spot the Hacker" โ€” Icebreaker game to kick off training
  • "Hack or Fact" โ€” Quiz show format with prizes for winners
  • "Break into Bob's Biz" โ€” Guided attack simulation game
  • Cyber Escape Room โ€” Team-based challenge solving security puzzles
  • "What Would You Do?" โ€” Tabletop incident response scenarios

๐Ÿ’ป Live Demos & Simulations

  • Real-time phishing attacks โ€” See exactly how attackers craft emails
  • OSINT demonstrations โ€” Watch how hackers gather information
  • Mock network simulations โ€” Hands-on experience in controlled environment
  • Remote control demonstrations โ€” See what happens when defenses fail

๐ŸŽ Swag & Recognition

  • Custom swag bags โ€” Branded cybersecurity essentials
  • "Hacker Buster" awards โ€” Recognition for top performers
  • Certificates of completion โ€” Professional documentation
  • Personal cyber checklists โ€” Take-home action items
  • Policy templates โ€” Ready-to-use security policies

๐Ÿฝ๏ธ Premium Hosting (Luxury Packages)

  • Premium venues โ€” Professional retreat-like settings
  • Catering included โ€” Snacks, drinks, and meals provided
  • Printed materials โ€” Professional handouts and resources
  • Live network demos โ€” On-site demonstration setup
  • Team building โ€” Designed to build security culture together

๐ŸŽฏ Training Structure Overview

FormatAudienceFocus
1-DayAll StaffAwareness & Prevention Basics
3-DayStaff + ITExpanded Awareness + Intro to Real Threats
5-DayLeadership + TeamsAwareness + Threat Simulation + Defense Mindset

Each longer package builds on the previous, reinforcing concepts and introducing deeper awareness without going overly technical. It's not about teaching hackingโ€”it's about understanding risk through simulation and storytelling.


Ready to level up your team's security knowledge? Let's talk.

Questions about training? Reach out directly:


M Square LLC
Cybersecurity | Penetration Testing | No-Nonsense Advice

Found this helpful? Share it:

Need Help With This?

Have questions about implementing these security practices? Let's discuss your specific needs.

Get in Touch

More in Company News

Explore more articles in this category.

Browse ๐Ÿ“ฃ Company News

Related Articles