Online Trainings Platform

for Cybersecurity and Data Protection

Training Dashboard

Our trainings platform provides engaging and accessible cybesecurity educational content to improve awareness and enhance sensitive data handling practices for everyone in your enterprise.

REQUEST a DEMO >>

Cybersecurity Awareness Trainings

Cybersecurity Foundations

  1. What is cybersecurity?
  2. Threats and vulnerabilities
  3. How hackers steal your data

Malware and Viruses

  1. Most common malware types
  2. Phishing and ransomware threats
  3. Statistics: most recent data breaches

Practical Cyber-protection

  1. Safe email, password and device handling
  2. Remote-work cybersecurity
  3. Physical cybersecurity
Training Cybersecurity Awareness

Anti-Phishing Training

Phishing & Social Engineering Intro

  1. Phishing Explained
  2. Social Engineering Explained
  3. How (and why) phishing works

Phishing Methods

  1. Interesting messages and links
  2. Dangerous attachments
  3. Messages from trusted friends and family
  4. Authoritative requests
  5. Scarcity and fear of missing out
  6. Business-email compromise

Protection Against Social Engineering

  1. Verify Identities
  2. Follow Protocols
  3. Be Skeptical of Unsolicited Requests
  4. Educate Yourself
  5. Report Suspicious Activity
  6. Trust your Instinct
Training Social Engineering

Data Protection (GDPR) Training

GDPR Basics

  1. Goals and significance of GDPR
  2. Definitin of Personal Data
  3. Definitin of Data Processing
  4. Fines for GDPR non-compliance

GDPR Requirements (pt.1)

  1. Principle of lawful and transparant processing
  2. Principle of Purpose Limitation
  3. Principle of Accuracy
  4. Data protection Impact Assessment
  5. Privacy by Design

GDPR Requirements (pt.2)

  1. Controller-processor contracts
  2. List of data-subject rights
  3. Data-protection officer
  4. International data transfers
  5. Personal data breach reporting

GDPR Data-Subject Rights Explained

  1. The right to be informed
  2. The right of access
  3. The right to rectification
  4. The right to erasure
  5. The right to restrict processing
  6. The right to data portability
  7. The right to object
  8. Rights related to automated decision-making, including profiling
Training GDPR

Secure Information Handling Training

Information Classification

  1. Public, Personal, Restricted & Confidential data
  2. Sensitive Company Data Types
  3. Information life-cycle in the organisation

Information Handling

  1. In the office
  2. On remote and in home-office
  3. In social networks

Information Protection

  1. Clean desk policy
  2. Need-to-know basis
  3. Receivier verification
  4. Automated protection

Data-breach incident responce

  1. Signs of data-breach
  2. Recommended course of action
  3. Communication guidelines
  4. Data Security & Backups
Training Secure Information Handling

Training Dashboard

The combination of a teaching lecture, helpful animations and meaningful quizzes lead to better understanding and lasting learning success!

REQUEST a DEMO >>