1:"$Sreact.fragment" 2:I[5882,["6874","static/chunks/6874-d27b54d0b28e3259.js","7177","static/chunks/app/layout-7bfcc2bd5d45bcdd.js"],"default"] 3:I[7798,["6874","static/chunks/6874-d27b54d0b28e3259.js","7177","static/chunks/app/layout-7bfcc2bd5d45bcdd.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 14:I[8393,[],""] :HL["/_next/static/media/4cf2300e9c8272f7-s.p.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/93f479601ee12b01-s.p.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/css/258b820ccf66587c.css","style"] :HL["/_next/static/css/d8fac4f8d77ff309.css","style"] 0:{"P":null,"b":"zDTSUfRwhK2XIwbvgSoaP","p":"","c":["","services","cybersecurity","security-awareness-training"],"i":false,"f":[[["",{"children":["services",{"children":["cybersecurity",{"children":["security-awareness-training",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/258b820ccf66587c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/d8fac4f8d77ff309.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":["$","body",null,{"className":"__variable_188709 antialiased","children":["$","$L2",null,{"children":[["$","$L3",null,{}],["$","div",null,{"className":"mt-[70px]","children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"bg-[#020517] text-white pt-16 pb-8 ","children":[["$","div",null,{"className":" w-full h-full flex items-center justify-center mb-[70px] md:mb-[100px]","children":[" ",["$","div",null,{"className":" py-20 bg-[#0D137A] text-white text-center w-full rounded-[32px] max-w-7xl mx-[1rem]","children":[["$","h2",null,{"className":"text-[24px] sm:text-4xl font-bold mb-4 geistbold md:leading-[48px]","data-aos":"fade-down","children":["$","span",null,{"className":"items-center flex flex-col items-center justify-center","children":["Ready to secure and",["$","span",null,{"className":"flex flex-row items-center md:space-x-[12px]","children":[" ",["$","span",null,{"children":" transform your"}],["$","span",null,{"className":"hidden md:block","children":[" ",["$","svg",null,{"width":"48","height":"48","viewBox":"0 0 48 48","fill":"none","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"d":"M18 26V32H30V26H44V40C44 41.1046 43.1046 42 42 42H6C4.89544 42 4 41.1046 4 40V26H18ZM22 22H26V28H22V22ZM14 10V4C14 2.89544 14.8954 2 16 2H32C33.1046 2 34 2.89544 34 4V10H42C43.1046 10 44 10.8954 44 12V22H30V18H18V22H4V12C4 10.8954 4.89544 10 6 10H14ZM18 6V10H30V6H18Z","fill":"white"}]}]]}],["$","span",null,{"children":" business"}]]}]]}]}],["$","p",null,{"className":"max-w-2xl mx-auto mb-8 text-[16px] geistreg text-[#d4d4d4]","data-aos":"fade-right","children":"Contact DecyfoTech today and take the first step toward stronger security, smarter decisions, and scalable solutions."}],["$","a",null,{"href":"/contact","className":"px-6 py-3 bg-white hover:bg-white/80 text-black rounded-full font-semibold hover:bg-gray-800 transition geistreg","data-aos":"fade-up","children":"Request a Consultation"}]]}]]}],["$","div",null,{"className":"mx-auto max-w-7xl px-4 sm:px-6 lg:px-8 flex flex-col space-y-[24px] md:space-y-0 md:flex-row justify-between","style":"$undefined","children":[["$","div",null,{"className":"w-full md:w-[30%]","data-aos":"fade-up","children":[["$","h3",null,{"className":"text-lg font-semibold mb-4 geistsemibold","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm","children":[["$","li","Cybersecurity & Digital Risk Management",{"children":"$L6"}],"$L7","$L8","$L9","$La"]}]]}],"$Lb","$Lc","$Ld"]}],"$Le"]}]]}]}]}]]}],{"children":["services","$Lf",{"children":["cybersecurity","$L10",{"children":["security-awareness-training","$L11",{"children":["__PAGE__","$L12",{},null,false]},null,false]},null,false]},null,false]},null,false],"$L13",false]],"m":"$undefined","G":["$14",[]],"s":false,"S":true} 15:I[6874,["6874","static/chunks/6874-d27b54d0b28e3259.js","8684","static/chunks/8684-4509bf21fe836fe5.js","8974","static/chunks/app/page-7ae93ba92de374ac.js"],""] 16:I[9665,[],"OutletBoundary"] 18:I[4911,[],"AsyncMetadataOutlet"] 1a:I[9665,[],"ViewportBoundary"] 1c:I[9665,[],"MetadataBoundary"] 1d:"$Sreact.suspense" 6:["$","$L15",null,{"href":"/services/cybersecurity","className":"hover:text-[#3AB0FF] transition-colors whitespace-nowrap","children":"Cybersecurity & Digital Risk Management"}] 7:["$","li","Advanced Data Analytics & Automation",{"children":["$","$L15",null,{"href":"/services/data-analytics","className":"hover:text-[#3AB0FF] transition-colors whitespace-nowrap","children":"Advanced Data Analytics & Automation"}]}] 8:["$","li","Remote & Onsite Training",{"children":["$","$L15",null,{"href":"/services/training","className":"hover:text-[#3AB0FF] transition-colors whitespace-nowrap","children":"Remote & Onsite Training"}]}] 9:["$","li","Software & System Development",{"children":["$","$L15",null,{"href":"/services/software-development","className":"hover:text-[#3AB0FF] transition-colors whitespace-nowrap","children":"Software & System Development"}]}] a:["$","li","Global Remote IT Support",{"children":["$","$L15",null,{"href":"/services/it-support","className":"hover:text-[#3AB0FF] transition-colors whitespace-nowrap","children":"Global Remote IT Support"}]}] b:["$","div",null,{"className":"w-full md:w-[20%]","data-aos":"fade-up","children":[["$","h3",null,{"className":"text-lg font-semibold mb-4 geistsemibold","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm","children":[["$","li","About Us",{"children":["$","$L15",null,{"href":"/about","className":"hover:text-[#3AB0FF] transition-colors","children":"About Us"}]}],["$","li","Case Studies",{"children":["$","$L15",null,{"href":"/case-studies","className":"hover:text-[#3AB0FF] transition-colors","children":"Case Studies"}]}],["$","li","Careers",{"children":["$","$L15",null,{"href":"/careers","className":"hover:text-[#3AB0FF] transition-colors","children":"Careers"}]}],["$","li","Contact Us",{"children":["$","$L15",null,{"href":"/contact","className":"hover:text-[#3AB0FF] transition-colors","children":"Contact Us"}]}]]}]]}] c:["$","div",null,{"className":"w-full md:w-[20%]","data-aos":"fade-up","children":[["$","h3",null,{"className":"text-lg font-semibold mb-4 geistsemibold","children":"Legal & Policies"}],["$","ul",null,{"className":"space-y-2 text-sm mb-6","children":[["$","li","Privacy Policy",{"children":["$","$L15",null,{"href":"/privacy-policy","className":"hover:text-[#3AB0FF] transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L15",null,{"href":"/terms","className":"hover:text-[#3AB0FF] transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L15",null,{"href":"/cookie-policy","className":"hover:text-[#3AB0FF] transition-colors","children":"Cookie Policy"}]}]]}]]}] d:["$","div",null,{"className":"w-full md:w-[23%]","data-aos":"fade-up","children":[["$","$L15",null,{"href":"/","className":"flex items-center space-x-2 mb-4","children":["$","span",null,{"className":"text-xl font-bold geistsemibold","children":"DecyfoTech"}]}],["$","p",null,{"className":"text-gray-300 text-sm leading-relaxed geistreg","children":"Your trusted partner in Cybersecurity, Data Analytics & Digital Intelligence. We empower businesses with cutting-edge solutions, anywhere in the world."}]]}] e:["$","div",null,{"className":" mx-auto max-w-7xl px-4 sm:px-6 lg:px-8 bg-[#374E7A80] w-fit rounded-full text-center text-sm text-[#FFFFFFB2] p-[10px] mt-[40px]","children":["© ",2025," DecyfoTech Nigeria Limited. All Rights Reserved."]}] f:["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}] 10:["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}] 11:["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}] 12:["$","$1","c",{"children":[["$","main",null,{"children":[["$","section",null,{"className":"relative bg-[#020517] text-white py-20 text-center overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0","children":["$","img",null,{"src":"/images/awareness.jpg","alt":"Security Awareness Training","className":"w-full h-full object-cover opacity-[30%]"}]}],["$","div",null,{"className":"mx-auto max-w-7xl px-4 sm:px-6 lg:px-8 relative z-10 flex flex-col items-center justify-center","style":"$undefined","children":[["$","h1",null,{"className":"text-4xl sm:text-5xl font-bold mb-4","children":"Security Awareness Training"}],["$","p",null,{"className":"max-w-3xl mx-auto text-lg text-gray-300","children":"Empower your employees to become the first line of defense against cyber threats with our engaging, real-world security training."}]]}]]}],["$","section",null,{"className":"py-20 bg-white text-gray-800","children":["$","div",null,{"className":"mx-auto max-w-7xl px-4 sm:px-6 lg:px-8 space-y-8","style":"$undefined","children":[["$","h2",null,{"className":"text-3xl font-bold text-[#0B1D37]","children":"Security Awareness Training"}],["$","p",null,{"className":"leading-relaxed","children":"The weakest link in cybersecurity is often human error. Phishing, poor password practices, and mishandling of data are common entry points for attackers. We deliver interactive training programs that transform employees into the first line of defense."}],["$","div",null,{"children":[["$","h3",null,{"className":"text-2xl font-semibold mt-8 mb-4 text-[#0B1D37]","children":"Key Capabilities"}],["$","ul",null,{"className":"list-disc pl-6 space-y-2","children":[["$","li",null,{"children":"Phishing simulation exercises."}],["$","li",null,{"children":"Data protection and safe browsing workshops."}],["$","li",null,{"children":"Secure email and file-handling protocols."}],["$","li",null,{"children":"Role-specific training for executives, IT teams, and end users."}],["$","li",null,{"children":"Continuous reinforcement with real-world scenarios."}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-2xl font-semibold mt-8 mb-4 text-[#0B1D37]","children":"Business Value"}],["$","ul",null,{"className":"list-disc pl-6 space-y-2","children":[["$","li",null,{"children":"Reduced risk of social engineering attacks."}],["$","li",null,{"children":"Empowered employees who actively contribute to security."}],["$","li",null,{"children":"Enhanced compliance with NDPR and GDPR training requirements."}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-2xl font-semibold mt-8 mb-4 text-[#0B1D37]","children":"Example Use Case"}],["$","p",null,{"className":"leading-relaxed","children":"After deploying our training across a telecom provider, phishing click-through rates dropped from 25% to just 3% within six months — proving that awareness is a measurable security control."}]]}]]}]}]]}],null,["$","$L16",null,{"children":["$L17",["$","$L18",null,{"promise":"$@19"}]]}]]}] 13:["$","$1","h",{"children":[null,[["$","$L1a",null,{"children":"$L1b"}],["$","meta",null,{"name":"next-size-adjust","content":""}]],["$","$L1c",null,{"children":["$","div",null,{"hidden":true,"children":["$","$1d",null,{"fallback":null,"children":"$L1e"}]}]}]]}] 1b:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 17:null 1f:I[8175,[],"IconMark"] 19:{"metadata":[["$","title","0",{"children":"DecyfoTech"}],["$","meta","1",{"name":"description","content":"Your Trusted Partner in Cybersecurity, Data Analytics & Digital Intelligence"}],["$","link","2",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"16x16"}],["$","$L1f","3",{}]],"error":null,"digest":"$undefined"} 1e:"$19:metadata"