You are on page 1of 3

Student ID:

Student Name:

Cybersecurity training and information session

How would you evaluate the 1. It is important as an IT team, we have to


training provided? (50-100 generate all kinds of sufficient resources for the
words)   training of the organization, and meeting the
requirements for this must be:
The training was relevant to
2. Have educational and interactive materials such
the needs and requirements
as presentation slides and multimedia videos.
of the audience
Materials provided were
helpful 3. Have content organized in the best way very
specific topics in the presentation.
Length of the training was
sufficient and complied
The content was well 4. Take into account the suggestions made by
organised cybersecurity experts
Questions were encouraged
Instructions were clear and
understandable
5. Generally speaking, the training met most
The training met all expectations, however it is important to provide
expectations ongoing training on cybersecurity issues within
the organization.
The topics covered well in
the presentation

How did others evaluate the


training provided? (50-100 All those present at the training program evidenced,
words)
the IT team provided all the cyber information in the

following way:
The training was relevant to
the needs and requirements
of the audience
 Company security training was provided first.
Materials provided were
helpful
Length of the training was  Second, the rescue drill was carried out causing
sufficient and complied
 the attack activity will make a great impression
The content was well
organised
on all participants.
Questions were encouraged
Instructions were clear and
understandable  Third, the training process managed the current
The training met all
cybersecurity risks which provided suggestions
expectations
for students and staff.
The topics covered well in
the presentation
 

You might also like