top of page

Milestone 3

Capstone Spring 2024

Our Project Focus: ChatGPT and Cybersecurity Training

During Milestone 3, We worked with ChatGPT to create a cybersecurity training program.

We asked ChatGPT various prompts to get it to tailor a cybersecurity training program to our needs. This often took rephrasing to get it to provide us with the exact information we wanted to include in our curriculum.

​

We used ChatGPT to complete 8 cybersecurity training modules and 5 training documents. You can find more information about them below:

Module 1: Introduction to Cybersecurity

  1. What is Cybersecurity?​

  2. Importance of Cybersecurity for Individuals and Organizations​

  3. Types of Cyber Attacks​

  4. Consequences of Cyber Attacks​

  5. Basic Cyber Hygiene Practices

  6. Module 1 Quiz

Module 2: Importance of Cybersecurity

  1. Why Cybersecurity Matters

  2. Importance of Cybersecurity for Individuals

  3. Importance of Cybersecurity for Organizations

  4. Cybersecurity Compliance and Regulations

  5. Key Takeaways

  6. Module 2 Quiz

Module 3: Understanding and Avoiding Phishing Emails

  1. Introduction

  2. What are Phishing Emails?

  3. Why are Phishing Emails Dangerous?

  4. Common Characteristics of Phishing Emails

  5. Examples of Phishing Emails

  6. How to avoid Falling Victim to Phishing Emails

  7. Reporting Suspicious Emails

  8. Conclusion

  9. Module 3 Quiz

Module 4: Password Security and Data Protection

  1. Creating Strong Passwords

  2. Why Strong Passwords Matter

  3. Password Best Practices

  4. Avoiding Common Passwords

  5. Multi-factor Authorization

  6. Introduction to MFA

  7. Implementing MFA

  8. Data Encryption

  9. Understanding Encryption

  10. Types of Encryption

  11. Conclusion

  12. Module 4 Quiz

Module 5: Incident Response

  1. Introduction

  2. Incident Response Plan

  3. Recognizing Security Incidents

  4. Incident Escalation

  5. Containment and Mitigation

  6. Forensic Investigation

  7. Lessons Learned and Post-Incident Review

  8. Reporting to Authorities

  9. Conclusion

  10. Module 5 Quiz

Module 6: Secure Remote Work Practices

  1. Secure Remote Work Practices​

  2. Remote Work Landscape​

  3. Securing Remote Connections​

  4. Device Security Best Practices​

  5. Data Protection in Remote Work​

  6. Phishing Awareness for Remote Workers​

  7. Remote Work Policy Compliance​

  8. Remote Work Security Checklist

  9. Module 6 Quiz

Module 7: Social Engineering and Insider Threats

  1. Introduction to Social Engineering​

  2. Phishing Attacks​

  3. Pre-texting​

  4. Baiting and Tailgating​

  5. Insider Threats Overview​

  6. Malicious Insider Threats​

  7. Negligent Insider Threats​

  8. Protecting Against Social Engineering and Insider Threats​

  9. Incident Response and Reporting

  10. Module 7 Quiz

Module 8: Cyber Response Tabletop Exercise

  1. Incident Response Framework

  2. Scenario 1

  3. Question 1

  4. Question 1 Answers

  5. Question 2

  6. Question 2 Answers

  7. Scenario 2

  8. Question 3

  9. Question 3 Answers

  10. Question 4

  11. Question 4 Answers

Ed AI: Cybersecurity Training Documents

  1. Document 1: Cybersecurity Knowledge Survey

  2. Document2: Cybersecurity Training - Continuous Learning

  3. Document 3: Cybersecurity Phishing Emails

  4. Document 4: Quiz answers Modules 1-5

  5. Document 5: Quiz answers Modules 6-7

Conclusions

  • Our project's focus was to utilize an AI tool and to determine if it can be used to create an informal education tool.​
    ​We accomplished this goal by using ChatGPT to create a cybersecurity training program.​

​

  • ChatGPT was able to assist us in successfully creating this cybersecurity training program with improvements on the prompts we provided it.  When we compare our results to popular cybersecurity training tools, however,  we find we were unable to completely replace the more tools such as KnowBe4, Mimecast, and Proofpoint. These companies offer services we were unable to mimic using ChatGPT such as phishing security tests, enterprise-level reporting, simulated cyber-attacks, and interactive modules.​

​

  • Therefore, we have concluded that while they are an increasingly valuable resource that can assist us both in our professional and personal lives, AI tools are not yet able to completely replace other technologies that are often used in educational settings.

bottom of page