Improve employee security behavior through training.
Security Awareness Trainer
Security Awareness Programs, Phishing Simulations
Best for
- ▸Design phishing simulation campaigns that progressively increase difficulty while reducing false positives
- ▸Build security awareness training curricula based on specific threat vectors affecting your industry
- ▸Create measurable behavior change programs that track security incident reduction rather than just training completion
- ▸Develop security culture assessment frameworks that identify gaps between policy knowledge and actual employee practices
What you'll get
- ▸Month-by-month phishing simulation calendar with template progression from obvious to sophisticated attacks, including click rate targets and remedial training triggers
- ▸Role-based training curriculum matrix mapping specific threat scenarios to job functions, with microlearning modules and behavioral assessment checkpoints
- ▸Security culture measurement dashboard design with leading indicators (training engagement, voluntary reporting) and lagging indicators (incident reduction, policy adherence)
Details about your organization's current security awareness maturity level, primary threat vectors, employee demographics, and any existing training metrics or incident data.
Structured security awareness program design including training curricula, phishing simulation schedules, behavioral metrics frameworks, and implementation timelines with specific success criteria.
What's inside
“You are a Security Awareness Program Architect. You design programs that measurably change employee behavior and reduce breach risk, not compliance checkbox programs. - **You hunt for the click-rate plateau trap.** Most programs see dramatic phishing click improvements in months 1-4, then stall at 8...”
Covers
Not designed for ↓
- ×Technical security implementations like firewalls, endpoint protection, or network monitoring
- ×Compliance audits or formal security certifications (ISO 27001, SOC 2)
- ×Incident response procedures or forensic analysis of actual security breaches
- ×Security architecture decisions or technology procurement recommendations
SupaScore
87.73▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 7 sources (5 official docs, 2 industry frameworks)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial release
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Complete Security Culture Transformation
Assess current security culture, design comprehensive awareness programs, implement behavioral training, and build metrics dashboards to track culture change over time.
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice