Skip to main content

How to Effectively Schedule and Manage Cybersecurity Training in Academy

backBack

How to Effectively Schedule and Manage Cybersecurity Training in Academy

AcademyDuration6 min

Introduction

Proper scheduling ensures that employees receive cybersecurity training consistently and at the right time, without overwhelming them. With Academy, organizations can plan, manage, and track training sessions effectively.

This article explains how to efficiently schedule training, configure drip time, and monitor employee progress.


The Importance of Proper Scheduling

Avoiding Training Fatigue

  • Releasing too many sessions at once can overload employees.
  • Spaced training improves knowledge retention.

Ensuring Compliance & Awareness

  • Scheduled courses help meet mandatory security training requirements.
  • Regular training reduces the risk of human error-related security breaches.

Scheduling Individual Sessions vs. Courses

1. Scheduling a Single Session

  1. Go to Academy DashboardNew Awareness Training.
  2. Select the training session you want to assign.
  3. Click Setup Training and choose:
    • Start date.
    • completion timeframe
    • Target score.
    • Assigned employees or groups.
  4. Click Confirm to finalize the schedule.

2. Scheduling a Full Course

  1. Navigate to Academy DashboardNew Awareness Training.
  2. Select a pre-defined course (e.g., Annual Training, Advanced Threats, MFA).
  3. Click Setup Training and choose:
    • Start date.
    • completion timeframe
    • Target score.
    • Drip time between sessions.
    • Assigned employees or groups.
  4. Click Confirm to activate the course.

image.png


Understanding Drip Time & Why It Matters

What Is Drip Time?

Drip time controls the time interval between sessions within a course. Instead of delivering all sessions at once, employees receive them gradually.

Benefits of Drip Scheduling

✅ Prevents information overload.

✅ Increases knowledge retention.

✅ Ensures consistent training engagement over time.


Managing In-Progress & Upcoming Training

Tracking Employee Progress

  1. Open Academy Dashboard
  2. View the status of each employee:
    • Completed sessions.
    • In-progress courses.
    • Upcoming scheduled training.
  3. Identify low performers based on quiz scores.

Modifying an Active Training Schedule

  • Reschedule sessions if employees need more time.
  • Adjust drip time to match employee availability.
  • Pause or cancel courses if needed.

image.png


Best Practices for Effective Training Management

Schedule in advance to align with compliance deadlines.

Use drip time to avoid training fatigue.

Track completion rates and intervene early if participation is low.

Encourage employees with reminders and progress tracking.


Conclusion

Scheduling cybersecurity training effectively ensures continuous learning and compliance. By leveraging Academy’s drip scheduling, progress tracking, and reporting tools, organizations can improve employee engagement and security awareness.

In the next article, we’ll explore how to track and improve employee performance in Academy.

Frequently Asked Questions

Simulations
Can I test the phishing simulation before a full launch?

Yes, our platform offers a "Test" option that allows you to send the first simulation to a small group of selected users. This trial run lets you experience the simulation process and ensure everything is functioning correctly before deploying it to your entire target audience.

How does Rotate track and report simulation results?

Results from phishing simulations are displayed on the Phishing Page within the Awareness Hub. You can view which users failed specific campaigns, review individual performance summaries, and analyze overall metrics like failure rates and engagement rates. This data helps you identify areas for improvement and tailor your training programs accordingly.

How are phishing emails customized in simulations?

Our platform allows you to select from a variety of predefined email templates that resemble common phishing tactics, such as "Gmail Out of Storage" with a fake Google login page. You can also customize these templates to better fit your organization’s context, making simulations more relevant and effective.

Why is phishing simulation important?

Phishing simulations help identify how susceptible your employees are to phishing attacks. This allows you to provide targeted training, reduce the risk of data breaches, and strengthen your overall cybersecurity posture.

What is a phishing simulation?

A phishing simulation is a controlled, mock phishing attack designed to train and assess employees' ability to recognize and respond to real phishing attempts. It helps organizations evaluate their vulnerability and improve their security awareness programs.

On this page