Training

Cybercrime is part of the modern world. Minimize the risk of a potential attack. Learn how to protect your business from dangerous online activities and what to pay special attention to employees.
● SZ/01
Basic training

SECURITY AWARENESS, basic training

Security awareness

Excellent training for anyone who wants to learn more about network security. The training clearly indicates the main directions in which a person who wants to delve into the topic of security should educate themselves. A trained employee in the field of security awareness will be more likely to recognize a threat when faced with spoofing or phishing. Aware network employees will make fewer mistakes, which can protect the company from installing a sniffer or botnet software. Security awareness training is part of the first line of security, consisting of avoiding and proactively protecting against threats.

What is the scope of the training?

Cybersecurity: Definitions

white arrow right
white arrow right

In this part of the training, we will discuss important definitions and vocabulary in the field of cybersecurity.

  • Cybersecurity incident
  • Login/password: Strong, weak
  • Company network/wi-fi
  • Antivirus software
  • Firewall
  • Company network node

Legal basis

white arrow right
white arrow right

You will learn about the legal regulations governing the operation of organizations and the principles you must follow when running a business.

  • KSC Act
  • GDPR
  • Accounting Act

Basic types of attacks in cyberspace

white arrow right
white arrow right

Many hacker attacks are simple technical and social engineering. Ensure employees maintain an appropriate level of vigilance. 

  • Ransomware
  • Bots
  • Trojan Horse
  • Phishing, Pharming, Sniffing
  • DNS Attack
  • Third-party Attacks

Examples of successful hacker attacks

white arrow right
white arrow right

Presentation of facts, combined with discussion, is a way to develop individual solutions for your organization. 

  • Examples of successful hacker attacks 
  • Discussion of how they were carried out 
  • Identification of weak points in the organization

Depending on the size of the site and the condition of the network, the Site Survey assessment takes from 1 to 5 days. Each stage can be carried out individually or as part of a comprehensive project.

● SZ/02
Other training
arrow right arrow right
Praca w ICT Future
Praca w ICT Future
Praca w ICT Future
Praca w ICT Future

What other training do we provide?

Topics of other trainings

Our educational offer has been carefully prepared to meet the diverse needs and challenges in the field of information security and cybersecurity. We invite you to deepen your knowledge and develop your skills in the area of ​​information security by taking advantage of our diverse training offer. If you have any questions or would like to register, please contact us. We are ready to share our experience with you!

Key Services Operator

Learn about the latest cybersecurity regulations, such as the National Cybersecurity System and the European Network and Information Security, and understand what obligations they impose on Key Service Operators.

Implementation of ISMS

Learn how to effectively create and implement an Information Security Management System within your organization to protect valuable information assets.

Information security management

Implementation and improvement of the information security management system in the organization – requirements of the ISO 27001:2022 standard.

Internal auditor

Internal Auditor ISO 27001.

Microsoft 365 - End User and System Administrator

Microsoft 365 at the end-user level covering the use of all MS365 applications and Microsoft at the system administrator level – training conducted by a certified Microsoft Trainer.