Cyber awareness Training
Level
BeginnerDuration
16h / 2 daysDate
Individually arrangedPrice
Individually arrangedCyber awareness Training
The Cyber awareness training is dedicated to every network user. During the live training, attacks that can be carried out on any network user will be demonstrated. Models of work of cybercriminals and technology companies will be shown. The training can be conducted on-site or online and, depending on needs, delivered in a basic two-day or extended three-day model. The training is workshop-based – it can be personalized for a specific company/institution as part of the Digital Municipality program.
Who is this training for?
For managers of organizational units
For administrators and persons responsible for internal employee training
For all employees of the enterprise
What You Will Learn
- How to protect your identity on the Internet and properly secure your devices
- What attacks are currently used by cybercriminals
- How to properly approach the issue of securing company assets
- How to recognize attack symptoms and HID implants, such as fake USB drives, etc.
Training Program
-
Cybersecurity Threat Landscape
- Review of recent high-profile cyberattacks on companies and employees
- Case studies of real-world security incidents
- Contemporary threats and attack trends
-
Information Exposure and Reconnaissance
- What can be found online about employees and companies
- Using leaked employee data to prepare attacks
- Open-source intelligence (OSINT) basics
-
Personal Data Protection and GDPR
- Personal data and GDPR – beyond procedures
- Major current threats to personal and company data
- Methods to reduce data exposure and risk
-
Authentication and Password Security
- How passwords are attacked
- Best practices for creating and managing passwords
- Password managers and multi-factor authentication
-
Devices and Physical Security
- Personal devices vs. company devices
- Key security risks and what to pay attention to
- Basics of secure use of Android and iOS smartphones
-
How Attackers Operate
- How hackers and spies steal company data
- Common tools and techniques used in attacks
-
Live Attack Demonstrations
- Demonstration of an attack on a “model” company computer
- Demonstration of social engineering attacks
- Accessing a company car or disabling alarms
- Spying devices
- Signal interception
- Attacks on company devices
-
Incident Awareness and Response
- Symptoms of computer infection
- How to respond to a suspected security incident
-
Secure Daily Work Practices
- Office suite and (in)secure documents
- Safe use of email
- Basic rules of secure computer work
- Data encryption and secure storage
-
Protection Against Social Engineering
- Recognizing social engineering techniques
- Protection methods against manipulation and phishing
- Building security awareness in daily work