SECURITY AWARENESS, basic training
Security awareness
Excellent training for anyone who wants to learn more about network security. The training clearly indicates the main directions in which a person who wants to delve into the topic of security should educate themselves. A trained employee in the field of security awareness will be more likely to recognize a threat when faced with spoofing or phishing. Aware network employees will make fewer mistakes, which can protect the company from installing a sniffer or botnet software. Security awareness training is part of the first line of security, consisting of avoiding and proactively protecting against threats.
What is the scope of the training?
Cybersecurity: Definitions
In this part of the training, we will discuss important definitions and vocabulary in the field of cybersecurity.
- Cybersecurity incident
- Login/password: Strong, weak
- Company network/wi-fi
- Antivirus software
- Firewall
- Company network node
Legal basis
You will learn about the legal regulations governing the operation of organizations and the principles you must follow when running a business.
- KSC Act
- GDPR
- Accounting Act
Basic types of attacks in cyberspace
Many hacker attacks are simple technical and social engineering. Ensure employees maintain an appropriate level of vigilance.
- Ransomware
- Bots
- Trojan Horse
- Phishing, Pharming, Sniffing
- DNS Attack
- Third-party Attacks
Examples of successful hacker attacks
Presentation of facts, combined with discussion, is a way to develop individual solutions for your organization.
- Examples of successful hacker attacks
- Discussion of how they were carried out
- Identification of weak points in the organization
Depending on the size of the site and the condition of the network, the Site Survey assessment takes from 1 to 5 days. Each stage can be carried out individually or as part of a comprehensive project.
What other training do we provide?
Topics of other trainings
Our educational offer has been carefully prepared to meet the diverse needs and challenges in the field of information security and cybersecurity. We invite you to deepen your knowledge and develop your skills in the area of information security by taking advantage of our diverse training offer. If you have any questions or would like to register, please contact us. We are ready to share our experience with you!
Key Services Operator
Learn about the latest cybersecurity regulations, such as the National Cybersecurity System and the European Network and Information Security, and understand what obligations they impose on Key Service Operators.
Implementation of ISMS
Learn how to effectively create and implement an Information Security Management System within your organization to protect valuable information assets.
Information security management
Implementation and improvement of the information security management system in the organization – requirements of the ISO 27001:2022 standard.
Internal auditor
Internal Auditor ISO 27001.
Microsoft 365 - End User and System Administrator
Microsoft 365 at the end-user level covering the use of all MS365 applications and Microsoft at the system administrator level – training conducted by a certified Microsoft Trainer.