Description
Cybersecurity training for small and medium-sized enterprises - managers.
Two-stage training, addressed to lower and higher management.
The first part consists of a basic module intended for office workers.
Getting to know the basic concepts of what cybersecurity is, who a hacker is and what motivates him. The nature and scope of threats. Recognizing threats from the Internet - e-mail, links, logins, passwords, etc. How to create, use and manage passwords. How to minimize the effects of a cyber attack. How to implement good prevention and response practices with clear and practical guidance. Developing good habits that increase safety in the company.
The second part of the training covers knowledge of legal acts, procedures and obligations, corporate responsibility, risk analysis, incident response, and inter-departmental/job communication.
We offer a tailored approach to each group – the training program is adjusted according to the needs of the participants.
Training Formats:
Onsite
Online (min. 4 people, max. 9 people)
Please contact us at info(@)digitalit.pl
szkolenia z cyberbezpieczeństwa,szkolenia z cyberezpieczeństwa dla firm,szkolenia z cyberezpieczeństwa dla przedsiębiorstw,szkolenia z cyberezpieczeństwa dla biur księgwch,cyfrowa higiena,zagrożenia w sieci,ochrona informacji,, sztuczna inteligencja,bezpieczne hasła,kradzież danych osobowych,socjotechnika,kto to jest haker,niebezpieczne trści,Cybersecurity training,Cybersecurity training for companies, cybersecurity training for enterprises, cybersecurity training for accounting offices,digital hygiene, online threats, information protection, cyberbullying, hate, artificial intelligence, secure passwords, personal data theft, social engineering, who is a hacker, dangerous content,Cybersicherheitstraining, Cybersicherheitstraining für Kinder, Cybersicherheitstraining für Jugendliche, Cybersicherheitstraining für Eltern, digitale Hygiene, Online-Bedrohungen, Informationsschutz, Cybermobbing, Hass, künstliche Intelligenz, sichere Passwörter, Datendiebstahl, Social Engineering, wer ist ein Hacker, gefährliche Inhalte
Technical Data
| PART ONE | |
|---|---|
| 1. Cybersecurity - what is it, what does it cover? | |
| 2. Who is the hacker, what is his motivation, how does he work | |
| 3. Types, characteristics of attacks, threat recognition, | |
| 4. Rules for creating, using and managing passwords | |
| 5. Why some passwords are not effective | |
| 6. How to encrypt and protect sensitive data | |
| 6. Information protection | |
| 7. Protection tools (antivirus, firewall, etc.) | |
| 8. Good habits in preventing and responding to threats | |
| PART TWO | |
| 1. Legal acts | |
| 2. Corporate responsibility | |
| 3. Legal procedures and obligations | |
| 4. Risk transfer - transfer of responsibility to external companies | |
| 5. Risk analysis | |
| 6. Responding to incidents - communication, procedures, IT activities | |
| 7. Basic principles of cybersecurity, hygiene | |
| 8. Risk management (audits, physical security of equipment, network security, Internet, identification of vulnerabilities in security, tools, people's knowledge) | |
| 9. Minimizing the impact of a cyber attack on the company | |
| 10. Password policies (password change frequency, password protection) | |
| 11. Information encryption (files, e-mail, data transfer, copying) | |
| 12. Information access rights (security, limited access, etc.) | |
| 13. Planning training, raising awareness of threats | |
| 14. Building a safety culture in the company |