fbpx
Skip to content
Home » Training

Training

Cybersecurity training

We offer three training classes: one for the general public, known as Cybersecurity Awareness training, one for IT staff and management, and one for the C-Suite. Here are the details of each

Please contact us if you have any questions or are interested in a private training class.

Cybersecurity Awareness

This training class uses everyday language and is designed for the general public, whether on the job market or not. So, no computer expertise is expected. It comes with a certificate of completion. This is an excellent option for your company’s Cybersecurity Awareness requirements, which NIS, DORA, and other regulations require, as well as certifications like ISO 27001.

Security Basics Topics

In this section, we will discuss and define the following topics

  • Password Management
  • MFA
  • Critical Thinking
  • Links, Attachment, USB Drives
  • Social Engineering
  • Scams
  • FUD
  • Risks and Threat Profiling
  • Threat Protection

Online Privacy Topics

In this section, we’ll discuss what footprint you leave online and how to minimize it. Furthermore, we’ll discuss general online privacy tips and tricks.

Price and schedule

Head on over to our Series Event Calendar to find the schedule and pricing for this training. Please contact us if you don’t find a schedule that meets your needs or to request an alternative location.

Vulnerability Management How-To Training

This is for IT staff and management looking for training on either setting up cybersecurity programs in their orgs or looking to beef it up. We explore topics in enough detail so you have a good overview and know what you need to focus on. If we need to do a deep dive into any of these topics, please let us know, as we’d love to get feedback on what other training to offer.

Topics

In this section, we will discuss and define the following topics

  • What is Vulnerability Management, and why is it important
  • How do you set up a Vulnerability Management Program? What are the components?
  • Cybercrime and its nature.
  • Data Classification
  • Governmental requirements include NIS, NIS2, and DORA. Who is subject to which directive, and what are the requirements
  • Who is CERT-is, and how do they play into all of this?

Price and schedule

Head on over to our Series Event Calendar to find the schedule and pricing for this training. Please contact us if you don’t find a schedule that meets your needs or to request an alternative location.

Cybersecurity for Executives

This high-level training is designed for executives and the C-suite who want to better understand cybersecurity, why it is important, and what they can expect from cybersecurity programs. We are still developing this one; further details will be posted here when available. If you have questions, please contact us.