Show all

Cyber security

Training in the basics of cyber security will introduce you to the issue of various types of attacks on the security of company and home infrastructure.
Level
Designed for participants without knowledge and experience
basic
Course length
1 day
Language
 cz  eu
Course code
KT21010306
Security
Category:
Do you want this tailor-made course to your company? Contact us

Courses on a specific date with a live lecturer

Term
Language
Place
Form
?
How and where the course takes place.
Price without VAT
26. 6. 2024 09:00 - 17:00
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21010306-0013
Price without VAT
6 900 Kč
27. 6. 2024 09:00 - 17:00
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: KT21010306-0011
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21010306-0001
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: KT21010306-0002
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: KT21010306-0003
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: KT21010306-0004
Price without VAT
6 900 Kč

Course description

The training focuses on increasing the security awareness of employees (users) in the field of cyber and information security.
It includes a definition and illustrative examples of threats and examples.
Demonstration of real practices used by attackers.
Advice on how to prevent attacks.

We recommend it as a closed training in the company. 

Required knowledge

Basic knowledge of working with PC, basic knowledge of the Internet

Target audience

The course is intended for employees of companies who work with information assets of the company, or with personal data. The course can be a suitable entry into the world of security for ordinary users and beginning administrators of the IT environment. 

Course content

  • Introduction
  • Social engineering
  • Spam
  • Phishing
  • Malware
  • Passwords
  • Workplace safety
  • A safe website
  • Digital footprint
  • Dumpster diving
  • Online identity
  • Wi-Fi security
  • How to be safe on the internet
  • Hacking toys

Materials

Materials in electronic form. 

Objectives

Increase user security awareness in the field of cyber and information security.

Lecturers

Cybersecurity Specialist
Cybersecurity Specialist

CEHv10, eWPTv1, CompTIA Pentest+, PECB ISO/IEC 27001 Lead Auditor, Microsoft MVP, MCSE | CISO  

  • SCADA/ICS Penetration Testing
  • Mobile Device Forensics
  • Web Application & REST API Penetration Testing by OWASP
  • Offensive Security & Red Team Operations
  • Spy operations and intelligence work using OSINT, HUMINT, GEOINT, SOCINT etc.
  • Plan TTP's and APT Attack using by MITRE ATT&CK Framework
  • Cyb3r Days (https://www.cyb3r-days.com/) conference organizer & speaker
  • Cyber Rangers Podcast organizer & speaker

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Why with us