Thank you for visiting us! The shop is in catalogue mode. It is not yet possible to buy online. If you are interested in a product, please contact us. See you later!

Cybersecurity training for small and medium-sized enterprises - managers.

Two-stage training, addressed to lower and higher management.

Stock Status: Inquire about price and availability
Inquire about price and availability
This item is currently out of stock and cannot be purchased.

Description

Cybersecurity training for small and medium-sized enterprises - managers.

Two-stage training, addressed to lower and higher management.
The first part consists of a basic module intended for office workers.
Getting to know the basic concepts of what cybersecurity is, who a hacker is and what motivates him. The nature and scope of threats. Recognizing threats from the Internet - e-mail, links, logins, passwords, etc. How to create, use and manage passwords. How to minimize the effects of a cyber attack. How to implement good prevention and response practices with clear and practical guidance. Developing good habits that increase safety in the company.

The second part of the training covers knowledge of legal acts, procedures and obligations, corporate responsibility, risk analysis, incident response, and inter-departmental/job communication.

 

szkolenia z cyberbezpieczeństwa, zagrożenia w sieci, ochrona informacji, ceberprzemoc, hejt, sztuczna inteligencja, bezpieczne hasła, kradzież danych osobowych, socjotechnika, kto to jest haker, niebezpieczne trści, cybersecurity training online threats, information protection, cyberbullying, hate, artificial intelligence, secure passwords, personal data theft, social engineering, who is a hacker, dangerous content, Cybersicherheitstraining, Online-Bedrohungen, Informationsschutz, Cybermobbing, Hass, künstliche Intelligenz, sichere Passwörter, Diebstahl persönlicher Daten, Social Engineering, wer ist ein Hacker, gefährliche Inhalte,

Technical Data

PART ONE
1. Cybersecurity - what is it, what does it cover?
2. Who is the hacker, what is his motivation, how does he work
3. Types, characteristics of attacks, threat recognition,
4. Rules for creating, using and managing passwords
5. Why some passwords are not effective
6. How to encrypt and protect sensitive data
6. Information protection
7. Protection tools (antivirus, firewall, etc.)
8. Good habits in preventing and responding to threats
PART TWO
1. Legal acts
2. Corporate responsibility
3. Legal procedures and obligations
4. Risk transfer - transfer of responsibility to external companies
5. Risk analysis
6. Responding to incidents - communication, procedures, IT activities
7. Basic principles of cybersecurity, hygiene
8. Risk management (audits, physical security of equipment, network security, Internet, identification of vulnerabilities in security, tools, people's knowledge)
9. Minimizing the impact of a cyber attack on the company
10. Password policies (password change frequency, password protection)
11. Information encryption (files, e-mail, data transfer, copying)
12. Information access rights (security, limited access, etc.)
13. Planning training, raising awareness of threats
14. Building a safety culture in the company

Similar Products