Our trainings platform provides engaging and accessible cybesecurity educational content to improve awareness and enhance sensitive data handling practices for everyone in your enterprise.
Online Trainings Platform
for Cybersecurity and Data Protection
Cybersecurity Awareness Trainings
Cybersecurity Foundations
- What is cybersecurity?
- Threats and vulnerabilities
- How hackers steal your data
Malware and Viruses
- Most common malware types
- Phishing and ransomware threats
- Statistics: most recent data breaches
Practical Cyber-protection
- Safe email, password and device handling
- Remote-work cybersecurity
- Physical cybersecurity
Anti-Phishing Training
Phishing & Social Engineering Intro
- Phishing Explained
- Social Engineering Explained
- How (and why) phishing works
Phishing Methods
- Interesting messages and links
- Dangerous attachments
- Messages from trusted friends and family
- Authoritative requests
- Scarcity and fear of missing out
- Business-email compromise
Protection Against Social Engineering
- Verify Identities
- Follow Protocols
- Be Skeptical of Unsolicited Requests
- Educate Yourself
- Report Suspicious Activity
- Trust your Instinct
Data Protection (GDPR) Training
GDPR Basics
- Goals and significance of GDPR
- Definitin of Personal Data
- Definitin of Data Processing
- Fines for GDPR non-compliance
GDPR Requirements (pt.1)
- Principle of lawful and transparant processing
- Principle of Purpose Limitation
- Principle of Accuracy
- Data protection Impact Assessment
- Privacy by Design
GDPR Requirements (pt.2)
- Controller-processor contracts
- List of data-subject rights
- Data-protection officer
- International data transfers
- Personal data breach reporting
GDPR Data-Subject Rights Explained
- The right to be informed
- The right of access
- The right to rectification
- The right to erasure
- The right to restrict processing
- The right to data portability
- The right to object
- Rights related to automated decision-making, including profiling
Secure Information Handling Training
Information Classification
- Public, Personal, Restricted & Confidential data
- Sensitive Company Data Types
- Information life-cycle in the organisation
Information Handling
- In the office
- On remote and in home-office
- In social networks
Information Protection
- Clean desk policy
- Need-to-know basis
- Receivier verification
- Automated protection
Data-breach incident responce
- Signs of data-breach
- Recommended course of action
- Communication guidelines
- Data Security & Backups
The combination of a teaching lecture, helpful animations and meaningful quizzes lead to better understanding and lasting learning success!