Cyber awareness Training

Level

Beginner

Duration

16h / 2 days

Date

Individually arranged

Price

Individually arranged

Cyber awareness Training

The Cyber awareness training is dedicated to every network user. During the live training, attacks that can be carried out on any network user will be demonstrated. Models of work of cybercriminals and technology companies will be shown. The training can be conducted on-site or online and, depending on needs, delivered in a basic two-day or extended three-day model. The training is workshop-based – it can be personalized for a specific company/institution as part of the Digital Municipality program.

Who is this training for?
  • logo infoshare For managers of organizational units
  • logo infoshare For administrators and persons responsible for internal employee training
  • logo infoshare For all employees of the enterprise

What You Will Learn

  • How to protect your identity on the Internet and properly secure your devices
  • What attacks are currently used by cybercriminals
  • How to properly approach the issue of securing company assets
  • How to recognize attack symptoms and HID implants, such as fake USB drives, etc.

Training Program

  1. Cybersecurity Threat Landscape

  • Review of recent high-profile cyberattacks on companies and employees
  • Case studies of real-world security incidents
  • Contemporary threats and attack trends
  1. Information Exposure and Reconnaissance

  • What can be found online about employees and companies
  • Using leaked employee data to prepare attacks
  • Open-source intelligence (OSINT) basics
  1. Personal Data Protection and GDPR

  • Personal data and GDPR – beyond procedures
  • Major current threats to personal and company data
  • Methods to reduce data exposure and risk
  1. Authentication and Password Security

  • How passwords are attacked
  • Best practices for creating and managing passwords
  • Password managers and multi-factor authentication
  1. Devices and Physical Security

  • Personal devices vs. company devices
  • Key security risks and what to pay attention to
  • Basics of secure use of Android and iOS smartphones
  1. How Attackers Operate

  • How hackers and spies steal company data
  • Common tools and techniques used in attacks
  1. Live Attack Demonstrations

  • Demonstration of an attack on a “model” company computer
  • Demonstration of social engineering attacks
  • Accessing a company car or disabling alarms
    • Spying devices
    • Signal interception
    • Attacks on company devices
  1. Incident Awareness and Response

  • Symptoms of computer infection
  • How to respond to a suspected security incident
  1. Secure Daily Work Practices

  • Office suite and (in)secure documents
  • Safe use of email
  • Basic rules of secure computer work
  • Data encryption and secure storage
  1. Protection Against Social Engineering

  • Recognizing social engineering techniques
  • Protection methods against manipulation and phishing
  • Building security awareness in daily work

Contact us

we will organize training for you tailored to your needs

Przemysław Wołosz

Key Account Manager

przemyslaw.wolosz@infoShareAcademy.com

    The controller of your personal data is InfoShare Academy Sp. z o.o. with its registered office in Gdańsk, al. Grunwaldzka 427B, 80-309 Gdańsk, KRS: 0000531749, NIP: 5842742121. Personal data are processed in accordance with information clause.