{"id":7287,"date":"2022-09-07T14:25:26","date_gmt":"2022-09-07T11:25:26","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7287"},"modified":"2023-12-05T15:48:10","modified_gmt":"2023-12-05T12:48:10","slug":"security-awareness-training","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/services\/security-awareness-training","title":{"rendered":"Security Awareness Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7287\" class=\"elementor elementor-7287\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b50a57f elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b50a57f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21ced5e ot-flex-column-vertical\" data-id=\"21ced5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb9fbab elementor-widget elementor-widget-iheading\" data-id=\"cb9fbab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Security Awareness Trainings<\/span>\r\n\t        <h2 class=\"main-heading\">Cyber security trainings<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2b9b9 elementor-widget elementor-widget-text-editor\" data-id=\"5b2b9b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The trainings offered by our company are conducted by proven industry experts. The purpose of such cybersecurity trainings is mainly to improve the digital culture of your employees, as well as to understand what are the dangers in the digital world that they need to protect themselves from. Trainings are conducted both in-person and online in a dedicated online training platform. Depending on the client&#8217;s needs, the training sessions last between 6 and 8 astronomical hours. Upon request, a theory exam can be included to consolidate the knowledge. At the completion of the training, each employee receives a personal certificate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ffcfe20 ot-flex-column-vertical\" data-id=\"ffcfe20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f293b8 elementor-widget elementor-widget-image\" data-id=\"2f293b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana.png\" class=\"attachment-full size-full wp-image-6428\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana.png 2000w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Endpoint-pana-720x720.png 720w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3777e44 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"3777e44\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f0c71af ot-flex-column-vertical\" data-id=\"f0c71af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf115a1 elementor-widget elementor-widget-iheading\" data-id=\"cf115a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Security Awareness Trainings<\/span>\r\n\t        <h2 class=\"main-heading\">Why do you need cybersecurity training?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3372dc0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3372dc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybercrime will cost over $6 trillion to industries worldwide in 2021<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">85% of data leaks are due to human error<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">43% of employees are 'very' or 'fairly' sure they have made a mistake at work with security implications<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">80% of organisations say cyber security training has reduced their staff's vulnerability to hacker attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">3 billion fake emails are sent every day<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">36% of data leaks are due to phishing<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07f0dca elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"07f0dca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24c6a4f ot-flex-column-vertical\" data-id=\"24c6a4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-942e956 elementor-widget elementor-widget-iheading\" data-id=\"942e956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Security Awareness Trainings<\/span>\r\n\t        <h2 class=\"main-heading\">Table of content<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9bff530 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"9bff530\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-df29c85 ot-flex-column-vertical\" data-id=\"df29c85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4602245 elementor-widget elementor-widget-text-editor\" data-id=\"4602245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1.<\/strong> An introduction to cybersecurity and why it is so important for every organization<br \/><strong>2.<\/strong> Information leakage process<br \/><strong>3.<\/strong> Practical defence<\/p><p><strong>3.1.1<\/strong> Passwords<br \/><strong>3.1.2<\/strong> Password managers<br \/><strong>3.1.3<\/strong> Multifactor authentication<br \/><strong>3.1.4<\/strong> Expired passwords<br \/><strong>3.1.5<\/strong> Passwords &#8211; Practical training<\/p><p><strong>3.2.1<\/strong> Social engineering<br \/><strong>3.2.2<\/strong> Social engineering techniques<br \/><strong>3.2.3<\/strong> Phishing introduction<br \/><strong>3.2.4<\/strong> Types of phishing<br \/><strong>3.2.5<\/strong> Examples of phishing<br \/><strong>3.2.6<\/strong> Identifying phishing and fake sites &#8211; Practical training<\/p><p><strong>3.3.1<\/strong> Viruses<br \/><strong>3.3.2<\/strong> Types of malware<br \/><strong>3.3.3<\/strong> Purpose of viruses<br \/><strong>3.3.4<\/strong> Distribution of viruses<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-68dab71 ot-flex-column-vertical\" data-id=\"68dab71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74444dd elementor-widget elementor-widget-text-editor\" data-id=\"74444dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>3.3.5<\/strong> Protection against viruses<br \/><strong>3.3.6<\/strong> How to know that your device is infected<br \/><strong>3.3.7<\/strong> Malware Scanning &#8211; Practical training<\/p><p><strong>3.4.1<\/strong> Physical Security Introduction<br \/><strong>3.4.2<\/strong> Tailgating<br \/><strong>3.4.3<\/strong> Physical security addition<br \/><strong>3.4.4<\/strong> USB attacks<br \/><strong>3.4.5<\/strong> USB attacks &#8211; Demo<\/p><p><strong>3.5.1<\/strong> Other threats<br \/><strong>3.5.2<\/strong> Shoulder surfing<br \/><strong>3.5.3<\/strong> MITM<br \/><strong>3.5.4<\/strong> Old Software<br \/><strong>3.5.5<\/strong> Dumpster diving<br \/><strong>3.5.6<\/strong> Mobile security<br \/><strong>3.5.7<\/strong> Other threats &#8211; Demo<\/p><p><strong>4.<\/strong> What to do if we are already hacked<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Security Awareness Trainings Cyber security trainings The trainings offered by our company are conducted by proven industry experts. The purpose of such cybersecurity trainings is mainly to improve the digital culture of your employees, as well as to understand what are the dangers in the digital world that they need to protect themselves from. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7071,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7287","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7287"}],"version-history":[{"count":6,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7287\/revisions"}],"predecessor-version":[{"id":8435,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7287\/revisions\/8435"}],"up":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7071"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}