Show all

Cyber security

The course focuses on the practical acquisition of basic skills in the field of cybersecurity in accordance with the new EU directive:
NIS (EU 2016/1148), NIS2 Directive (EU 2022/2555) and Czech legislation: Act No. 181/2014 Coll., on cybersecurity.

Participants will learn to recognize the most common threats, protect data and devices, communicate securely online, and prevent cyber attacks. The training is interactive, with an emphasis on real-life examples and participant involvement.
Level
Designed for participants without knowledge and experience
basic
Course length
1 day
Language
 cz  eu
Course code
PU21010306
Cyber Security
Category:
Do you want this tailor-made course to your company? Contact us

Courses with lecturer

Term
Language
Place
Form
?
How and where the course takes place.
Price without VAT
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: PU21010306-0001
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: PU21010306-0002
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
online
Form
virtual classroom
?
Online training with a lecturer at a specific time.
Code of the course: PU21010306-0003
Price without VAT
6 900 Kč
Open term
?
We will agree on a specific date together. This is a non-binding order.
Language
Place
Praha
Form
classroom
?
The course with an instructor in classroom.
Code of the course: PU21010306-0004
Price without VAT
6 900 Kč

Course description

The training focuses on increasing the security awareness of employees (users) in the field of cyber and information security.
It includes a definition and illustrative examples of threats and examples.
Demonstration of real practices used by attackers.
Advice on how to prevent attacks.

We recommend it as a closed training in the company. 

Required knowledge

Basic knowledge of working with PC, basic knowledge of the Internet

Target audience

  • Employees who work with computers, email, and the internet on a daily basis.
  • Employees of private companies and public administration who want to increase their digital security.
  • Teams that want to reduce the risk of cyber attacks and strengthen security awareness.
  • Organizations that want to build a security culture and protect sensitive data.
  • The course can be a suitable introduction to the world of security for ordinary users and novice IT administrators.

Course content

  1. Introduction to cybersecurity – Why is it important? The most common threats and risks.
  2. Social engineering – What is it and how does it work? Practical examples of manipulation.
  3. Phishing and fraudulent emails – How to recognize them? How to defend yourself?
  4. Creating a strong password – Techniques for remembering and managing passwords.
  5. Preventing identity theft - How to protect personal data? What to do if you suspect misuse.
  6. Security on social networks - Privacy settings, risks of sharing information.
  7. Protecting smart devices - Mobile phones, tablets, laptops.
  8. Updates, antivirus software, encryption.
  9. Secure online communication - Email, chat, video calls.
  10. Principles of secure data sharing.
  11. Caution when working on the internet - Fake websites, advertisements, links. How to recognize a trustworthy source?
  12. Data and file protection - Backups, encryption, and access rights.
  13. Cyber hygiene in the workplace - Rules for working with sensitive data, safe behavior in the workplace.
  14. Incident response - What to do in case of an attack? · First steps, when and to whom to report an incident?
  15. GDPR basics and legal liability - What can and cannot an employee do? Risks of violating the law.
  16. Organizational security culture - How to build awareness? The role of management and employees.
  17. Current trends in cyber threats - AI attacks, deepfakes, ransomware. How to prepare for the future?

Certification

Participants will receive a certificate of completion that meets the requirements of the NIS2 Directive and the Cybersecurity Act.

Materials

Materials in electronic form. 

Objectives

  • Raise awareness of cyber threats and learn how to prevent them effectively.
  • Recognize social engineering and phishing techniques and learn how to defend against them.
  • Learn the principles of secure password, data, and device management in both your professional and personal life.
  • Improve your organization's security culture and reduce the risk of incidents caused by human error.
  • Meet the requirements of the NIS2 Directive and the Cybersecurity Act for training regular users in cybersecurity

Lecturers

Cybersecurity Specialist
Cybersecurity Specialist

CEHv10, eWPTv1, CompTIA Pentest+, PECB ISO/IEC 27001 Lead Auditor, Microsoft MVP, MCSE | CISO  

  • SCADA/ICS Penetration Testing
  • Mobile Device Forensics
  • Web Application & REST API Penetration Testing by OWASP
  • Offensive Security & Red Team Operations
  • Spy operations and intelligence work using OSINT, HUMINT, GEOINT, SOCINT etc.
  • Plan TTP's and APT Attack using by MITRE ATT&CK Framework
  • Cyb3r Days (https://www.cyb3r-days.com/) conference organizer & speaker
  • Cyber Rangers Podcast organizer & speaker

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to become a cybersecurity expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Fortinet 22. 2. 2024
New Fortinet certification program

The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to become a cybersecurity expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Fortinet 22. 2. 2024
New Fortinet certification program

The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Why with us