Behavioral Cybersecurity
Training Curriculum
A modular, senior-friendly training program that teaches fraud prevention through behavior awareness—not technical skills. Focused on recognizing emotional manipulation and building lasting verification habits.
Program Overview
This curriculum teaches people to protect themselves from fraud by understanding how scammers manipulate emotions—not by learning technical security skills. Every module reinforces the same simple framework: Stop. Think. Verify.
Stop
Pause when you feel pressure, urgency, or strong emotion
Think
Ask yourself: Does this make sense? Would they really ask this way?
Verify
Confirm through a different channel using contact info you find yourself
What This Curriculum Is NOT
- •Not IT security training (no passwords, firewalls, or software)
- •Not fear-based messaging designed to scare people
- •Not technical jargon that confuses more than it helps
Learning Objectives
By completing this curriculum, participants will be able to:
Module Breakdown
Understanding the Human Target
Teaching Goal
Recognize why fraudsters target people—not systems—and understand the emotional triggers they exploit.
Topics Covered
- Why scammers focus on people, not computers
- The five emotional triggers: Fear, Urgency, Trust, Greed, Helpfulness
- How AI makes manipulation more convincing
- Real stories: What happened and why it worked
Behavior Outcome
Participants can identify when someone is trying to trigger an emotional response.
Stop: Recognizing the Warning Signs
Teaching Goal
Learn to pause when something feels wrong and identify common manipulation patterns.
Topics Covered
- The "pause reflex": Training yourself to stop
- Red flags in phone calls, emails, and messages
- Pressure tactics and why they work
- When "urgent" means "suspicious"
Behavior Outcome
Participants pause automatically when they encounter pressure or urgency.
Think: Evaluating the Situation
Teaching Goal
Develop critical thinking habits to assess requests before acting.
Topics Covered
- Questions to ask yourself before responding
- Does this request make sense?
- Would a real organization ask this way?
- The "trusted person" test: Who can I ask?
Behavior Outcome
Participants have a mental checklist they use before taking action.
Verify: Confirming Through Trusted Channels
Teaching Goal
Master the skill of independent verification using trusted sources.
Topics Covered
- What is a "second channel" and why it matters
- Finding official contact information (not from the message)
- How to verify identity without being rude
- Practice scenarios: Making verification calls
Behavior Outcome
Participants verify requests through independent channels before acting.
Protecting Your Community
Teaching Goal
Learn how to help others without creating shame or embarrassment.
Topics Covered
- How to talk to family members about scams
- Creating a family verification code word
- Being a safe person others can ask for help
- Reporting suspicious activity (and why it matters)
Behavior Outcome
Participants become trusted resources who help protect others.
Building Lasting Habits
Teaching Goal
Transform awareness into permanent protective behaviors.
Topics Covered
- The 30-day verification challenge
- Creating your personal safety routine
- Staying informed without becoming fearful
- Review: Stop. Think. Verify. in action
Behavior Outcome
Participants have a personal action plan for ongoing protection.
Suggested Delivery Formats
In-Person Workshop
Includes interactive exercises and role-play scenarios
Modular Sessions
Delivered weekly or bi-weekly with practice assignments
SAF Huddle Format
Micro-learning reinforcement between full sessions
Self-Paced Digital
Video modules with comprehension checks
SAF Huddle Reinforcement Integration
Between formal training sessions, the SAF Huddle Protocol provides ongoing reinforcement through brief, focused micro-sessions.
Recommended Huddle Schedule
Week 1-2: Daily Huddles (3-5 minutes)
Immediately after initial training to reinforce core concepts
Week 3-4: Three Times Weekly
Scenario-based discussions using real examples
Ongoing: Weekly Huddles
Maintenance reinforcement and new threat awareness
Behavior Outcome Metrics
Success is measured by behavior change, not test scores. These metrics help institutions track whether training translates into real-world protection.
Pause Rate
Percentage of participants who report stopping to think before responding to suspicious requests
Verification Behavior
Percentage who verify requests through independent channels
Family Conversation
Percentage who discuss fraud prevention with family members
Confidence Score
Self-reported confidence in recognizing manipulation attempts
Help-Seeking Behavior
Willingness to ask others before acting on suspicious requests
Bring This Curriculum to Your Organization
StopAiFraud Foundation partners with senior living facilities, financial institutions, healthcare organizations, faith communities, and government agencies to deliver this curriculum. Contact us to discuss implementation for your organization.
