Cyber awareness Training
Level
BeginnerDuration
24h / 3 daysDate
Individually arrangedPrice
Individually arrangedCyber awareness Training
The Cyber awareness training is dedicated to every network user. During the live training, attacks that can be carried out on any network user will be demonstrated. Models of work of cybercriminals and technology companies will be shown. The training can be conducted on-site or online and, depending on needs, delivered in a basic two-day or extended three-day model. The training is workshop-based – it can be personalized for a specific company/institution as part of the Digital Municipality program.
Who is this training for?
For managers of organizational units
For administrators and persons responsible for internal employee training
For all employees of the enterprise
What You Will Learn
- How to protect your identity on the Internet and properly secure your devices
- What attacks are currently used by cybercriminals
- How to properly approach the issue of securing company assets
- How to recognize attack symptoms and HID implants, such as fake USB drives, etc.
Training Program
- Review of recent high-profile attacks on companies/employees – case studies
- What can be found online – how to prepare an attack on a company from employee data leaks
- Personal data / GDPR – not just procedures – an overview of the largest current threats to data and methods to reduce risk
- Passwords – how to work with them
- Personal devices vs. company devices – what to pay attention to in terms of security
- How hackers and spies operate to steal company data
- Demonstration of an attack on a “model” company computer
- Demonstration of social engineering attacks
- How to access a company car or disable an alarm – demonstration of spying devices, signal interception, and attacks on company devices
- Possible symptoms of computer infection and how to respond
- Office suite and (in)secure documents
- Basics of secure use of Android and iOS smartphones
- Safe use of email
- Basic rules of computer work security
- Data encryption/storage
- Contemporary threats
- Protection against social engineering attacks