Professional Cyber Security Services
Security Awareness Training
// Security Awareness Trainings
Cyber security trainings
The trainings offered by our company are conducted by proven industry experts. The purpose of such cybersecurity trainings is mainly to improve the digital culture of your employees, as well as to understand what are the dangers in the digital world that they need to protect themselves from. Trainings are conducted both in-person and online in a dedicated online training platform. Depending on the client’s needs, the training sessions last between 6 and 8 astronomical hours. Upon request, a theory exam can be included to consolidate the knowledge. At the completion of the training, each employee receives a personal certificate.
// Security Awareness Trainings
Why do you need cybersecurity training?
- Cybercrime will cost over $6 trillion to industries worldwide in 2021
- 85% of data leaks are due to human error
- 43% of employees are 'very' or 'fairly' sure they have made a mistake at work with security implications
- 80% of organisations say cyber security training has reduced their staff's vulnerability to hacker attacks
- 3 billion fake emails are sent every day
- 36% of data leaks are due to phishing
// Security Awareness Trainings
Table of content
1. An introduction to cybersecurity and why it is so important for every organization
2. Information leakage process
3. Practical defence
3.1.1 Passwords
3.1.2 Password managers
3.1.3 Multifactor authentication
3.1.4 Expired passwords
3.1.5 Passwords – Practical training
3.2.1 Social engineering
3.2.2 Social engineering techniques
3.2.3 Phishing introduction
3.2.4 Types of phishing
3.2.5 Examples of phishing
3.2.6 Identifying phishing and fake sites – Practical training
3.3.1 Viruses
3.3.2 Types of malware
3.3.3 Purpose of viruses
3.3.4 Distribution of viruses
3.3.5 Protection against viruses
3.3.6 How to know that your device is infected
3.3.7 Malware Scanning – Practical training
3.4.1 Physical Security Introduction
3.4.2 Tailgating
3.4.3 Physical security addition
3.4.4 USB attacks
3.4.5 USB attacks – Demo
3.5.1 Other threats
3.5.2 Shoulder surfing
3.5.3 MITM
3.5.4 Old Software
3.5.5 Dumpster diving
3.5.6 Mobile security
3.5.7 Other threats – Demo
4. What to do if we are already hacked