An ideal cybersecurity program should include which of the following points?

a) Online video tutorials
b) A separate security website
c) Role-based training
d) Intrusion, types of intruders, techniques and motivation