Send your request
Send your request
Send your request
Course objectives

Getting to know the most common cyber attacks targeted at employees and learning how to detect them and protect against tchem.

Benefits
  • Participants:
    • Raising awareness of security in the organization
    • Getting to know the most common attacks targeted at employees
    • Acquiring basic skills in the area of identification of and protection against the most common attacks
  • Organization:
    • Greater resistance to employee-targeted attacks
    • Fewer security-related incidents in the organization
    • Less resistance to security-related programs from employees
Training scope
  • General security awareness
  • Information security
  • Description of main threats to the employee with examples and protection methods
  • Malware – most frequent sources of infection
  • Hiding file extensions
  • Ransomware as one of the biggest cybersecurity threats
  • SPAM/SCAM
  • Rules for secure web browsing
  • Social media – potential source of information
  • Sociotechniques – achieving a goal through manipulation, examples of large-scale attacks
  • Phishing – attack based on user trust
  • Examples of phishing attacks through email spoofing
  • Secure accessing of company resources via Wi-Fi
  • Electronic mail and Microsoft Office Suite
  • Mobile devices
  • Secure data storage and transfer
  • Physical security of documents and workplace
  • Creating hard-to-break passwords
  • Best practices
Audience

Employees who use IT systems and email at work.

Training details

The training lasts 3 hours and is for a few participants or the entire department.

Course objectives

Getting to know the most common cyber attacks targeted at employees and learning how to detect them and protect against tchem.

Benefits
  • Participants:
    • Raising awareness of security in the organization
    • Getting to know the most common attacks targeted at employees
    • Acquiring basic skills in the area of identification of and protection against the most common attacks
  • Organization:
    • Greater resistance to employee-targeted attacks
    • Fewer security-related incidents in the organization
    • Less resistance to security-related programs from employees
Training scope
  • General security awareness
  • Information security
  • Description of main threats to the employee with examples and protection methods
  • Malware – most frequent sources of infection
  • Hiding file extensions
  • Ransomware as one of the biggest cybersecurity threats
  • SPAM/SCAM
  • Rules for secure web browsing
  • Social media – potential source of information
  • Sociotechniques – achieving a goal through manipulation, examples of large-scale attacks
  • Phishing – attack based on user trust
  • Examples of phishing attacks through email spoofing
  • Secure accessing of company resources via Wi-Fi
  • Electronic mail and Microsoft Office Suite
  • Mobile devices
  • Secure data storage and transfer
  • Physical security of documents and workplace
  • Creating hard-to-break passwords
  • Best practices
Audience

Employees who use IT systems and email at work.

Training details

The training lasts 3 hours and is for a few participants or the entire department.

The number of participants: 8-40 people

Duration: 1 day

Available language: PL / EN

Available course material: PL / EN

Course form
Lecture – theory and examples.

Download materials

Download

Thank You!

Sorry, something went wrong.

Please refresh the page and try again.

File upload error

No file was uploaded

Incorrect file size (max 5MB)

Invalid file format

Empty file

Processing...

Download materials

Download

Contact our experts with questions about any of our trainings

Natalia & Agata

Training Practice Team

Contact our experts

Natalia & Agata

Uploaded file:

  • danieltroc.pdf

Allowed extensions: DOC, DOCX, PDF (max 5MB)

Thank you for filling out the form

We will look over your message and get back to you as soon as possible

Sorry, something went wrong and your message couldn’t be delivered

Please refresh the page and try again

File upload error

No file was uploaded

Incorrect file size (max 5MB)

Invalid file format

Empty file

Processing...

You might also like

Cybersecurity

Security of web applications for developers

Duration:
1 day
Cybersecurity

Introduction to web application security testing

Duration:
1 day

ITIL® and PRINCE2® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
AgilePM® is a registered trademark of Agile Business Consortium Limited.
All AgilePM® Courses are offered by Sii, an Affiliate of Quint Wellington Redwood, an Accredited Training Organization of The APM Group Ltd.
Lean IT® Association is a registered trademark of the Lean IT Association LLC. All rights reserved. Sii is an Affiliate of Accredited Training OrganizationQuint Wellington Redwood.
SIAM™ is a registered trademark of EXIN Holding B.V.
All prices presented on the website are net prices. 23% VAT should be added.

SUBMIT

Ta treść jest dostępna tylko w jednej wersji językowej.
Nastąpi przekierowanie do strony głównej.

Czy chcesz opuścić tę stronę?

Einige Inhalte sind nicht in deutscher Sprache verfügbar.
Sie werden auf die deutsche Homepage weitergeleitet.

Möchten Sie fortsetzen?