We offer three training classes: one for the general public, known as Cybersecurity Awareness training, one for IT staff and management, and one for the C-Suite. Here are the details of each
Please contact us if you have any questions or are interested in a private training class.
Cybersecurity Awareness
This training class uses everyday language and is designed for the general public, whether on the job market or not. So, no computer expertise is expected. It comes with a certificate of completion. This is an excellent option for your company’s Cybersecurity Awareness requirements, which NIS, DORA, and other regulations require, as well as certifications like ISO 27001.
Security Basics Topics
In this section, we will discuss and define the following topics
- Password Management
- MFA
- Critical Thinking
- Links, Attachment, USB Drives
- Social Engineering
- Scams
- FUD
- Risks and Threat Profiling
- Threat Protection
Online Privacy Topics
In this section, we’ll discuss what footprint you leave online and how to minimize it. Furthermore, we’ll discuss general online privacy tips and tricks.
Price and schedule
Head on over to our Series Event Calendar to find the schedule and pricing for this training. Please contact us if you don’t find a schedule that meets your needs or to request an alternative location.
Vulnerability Management How-To Training
This is for IT staff and management looking for training on either setting up cybersecurity programs in their orgs or looking to beef it up. We explore topics in enough detail so you have a good overview and know what you need to focus on. If we need to do a deep dive into any of these topics, please let us know, as we’d love to get feedback on what other training to offer.
Topics
In this section, we will discuss and define the following topics
- What is Vulnerability Management, and why is it important
- How do you set up a Vulnerability Management Program? What are the components?
- Cybercrime and its nature.
- Data Classification
- Governmental requirements include NIS, NIS2, and DORA. Who is subject to which directive, and what are the requirements
- Who is CERT-is, and how do they play into all of this?
Price and schedule
Head on over to our Series Event Calendar to find the schedule and pricing for this training. Please contact us if you don’t find a schedule that meets your needs or to request an alternative location.
Cybersecurity for Executives
This high-level training is designed for executives and the C-suite who want to better understand cybersecurity, why it is important, and what they can expect from cybersecurity programs. We are still developing this one; further details will be posted here when available. If you have questions, please contact us.