Importance of Training
The aim of the user security awareness training is to turn your end users into a strong last line of defence in identifying cyber-attacks and protecting your organization. Securing an organization against cybersecurity threats is a collective responsibility that begins with comprehensive staff training. Cyber threats continue to evolve, becoming more sophisticated and targeted.
CEOs, holding pivotal roles within companies, are often prime targets for cybercriminals due to their access to sensitive information. Compromising a CEO's credentials can lead to severe consequences, including unauthorized access to critical data and strategic plans. Therefore, staff training is crucial to enhance the overall cybersecurity posture of an organization. It not only empowers employees to recognize and mitigate potential threats but also builds a united front against cyber risks. By fostering a culture of awareness and equipping staff with the knowledge to identify and respond to cyber threats, organizations can fortify their defenses and minimize the risks associated with cyberattacks.
Training Topics & Course Details
01 Introduction to Information Security and Defense
-
Introduction to Information Security (the CIA Triad)
-
Introduction to Security Standards (PCI, ISO27001, GDPR)
-
What are we defending? (Categories of Personal Data)
-
Know Your Environment and Equipment
-
The Internet of Things
-
Policies and Procedures Explained
02 Attack Techniques and Vulnerabilities
-
Popular, Current-Day Attack Techniques
-
Understanding Reconnaissance
-
Open-Source Intelligence
-
Personal Attack Surface and Exploitation
-
Use of Company Devices on Social Media and Entertainment Sites
-
Storage of Personal Data
-
Handling of Devices Physically
-
Technical Exploits Examples
03 Security Awareness and Human Element
-
End Point Protection: What It Is and Why You Need It
-
The Human Element - Security Awareness
-
Social Engineering
-
Types of Phishing
-
Removable Media Security
-
Passwords and Authentication Methods
-
Physical Security
-
Remote Working
-
Wi-Fi and Cloud Security
04 Practical Security Guidelines
-
Social Media Use
-
Internet and Email Use
-
Security at Home
-
Defense in Depth
-
Golden Rules for Information Security
Duration
The whole course lasts three hours with a short break
Assessment
Focused on security and penetration through an evaluation at the end
Pricing
€30/person excl. Vat