← Back to Portfolio

Cybersecurity Essentials: Spotting Phishing Emails

Project Overview

Format: 45-minute scroll-based microlearning (Articulate Rise)

A practical, scenario-driven course that teaches employees how to recognize phishing attempts and respond safely. Learners explore realistic email simulations, interactive hotspots, quick checklists, and micro-assessments designed to reinforce secure online habits.

Download Quick Safety Checklist

Key Outcomes:

Tools & Platforms:

Articulate Rise, Figma (visual design), LMS (SCORM/xAPI compatible), Miro

Project Summary

Project Type: Interactive eLearning Program / Multi-module Microlearning (Scroll-based, Articulate Rise)

Target Audience: Remote and hybrid employees across departments (IT, finance, operations, management, general staff), ages 22–55, with general computer literacy.

Learning Goals / Outcomes:

  • Understand key cybersecurity risks relevant to remote work.
  • Identify phishing attempts and recognize common red flags.
  • Apply strong password hygiene and use MFA effectively.
  • Follow secure data handling practices in home and public environments.
  • Report suspicious activity using company-approved procedures.

Project Scope / Highlights:

  • 3 interactive microlearning modules (Phishing, Passwords & MFA, Safe Remote Work).
  • Built in Articulate Rise with scroll-based UX and a modern tech visual identity.
  • Rich interactivity: hotspots, sorting activities, labeled graphics, comparison tabs, knowledge checks, and final quizzes.
  • Custom illustrations, icons, and UI elements designed in Figma.
  • Fully responsive design for desktop, tablet, and mobile.

Business / Learner Impact:

  • Reduces the risk of phishing-related breaches and user-driven vulnerabilities.
  • Strengthens employee awareness and adherence to cybersecurity policies.
  • Supports the organization’s security culture and compliance standards.
Needs Analysis Form
Training Intake Form
AudienceRemote employees globally distributed (North America, Europe, Canada).
Desired BehaviorIdentify phishing, use strong passwords/MFA, safe data handling, prompt reporting.
Knowledge GapUnderstanding threats, link verification, and company reporting steps.
Success Metrics≥80% pass rate in scenarios, reduction in reported incidents.
TechnicalMobile-friendly, delivered via SCORM-compliant LMS.
Training Blueprint
ModuleBloom's LevelOutcomeActivity
Phishing AwarenessApply / AnalyzeIdentify suspicious elements in sample emails.Labeled Graphic hotspots, Flashcards.
Password SecurityAnalyze / ApplyIdentify insecure behaviors and select MFA methods.Sorting activity (Safe/Unsafe), Comparison cards.
Safe Remote WorkAnalyze / ApplyEvaluate risky situations (public Wi-Fi) and reporting steps.Scenario blocks, Checklist, Workflow visualization.
Lesson Storyboard
Screen / SectionContent TitleVisuals / MediaInteractivity
1-3Phishing IntroDark tech background, email icons.Narrative intro, Statement block.
9-11Spot the Red FlagsGmail-style phishing screenshot.Hotspot interaction (Sender mismatch, Urgent tone).
14-17Password PracticeModern tech palette, clean icons.MCQs, Tabbed navigation.
26-27Home Office ActionsIllustration of remote workspace.Sorting activity (Safe vs Unsafe).
31-32Final AssessmentQuiz results screen.Final quiz with scenario-based MCQs.