Cyber security training



Overview

The world of cyber security and privacy is constantly changing. Today, effective cyber security programs involve the entire organization and not only the IT or the information security teams. Employees that have access to critical assets of an organization, have become primary targets of cyber attacks. Those that have access to technology and organizational assets are also responsible for the protection of those assets. Are they fit and proper to handle this responsibility? Do they have the awareness and skills necessary to meet these expectations?

Our training programs have the objective to help managers and employees not only understand the cyber security threats, but also their responsibility towards protecting the assets they handle. We explain how to proactively apply good cyber security practices, how to identify threats and attacks, and what to do to protect themselves and their organizations. Cyber security is a shared responsibility.


Duration

We tailor each program to the needs of each client. We can provide trainings as short as one hour, but we can also deep dive into our topics for one or two days. The duration depends entirely on the needs, the agreed content of the program, and the case studies.


Our Education Method

In the core of our training approach is to ensure that our delivery is relatable, engaging, and interesting. We always make cyber security training an exciting adventure for our attendees. Our instructors have trained thousands of employees across the globe and have the skills and experience necessary to ensure that our attendees will enjoy the process while they learn. Our training programs may have workshop elements that get everyone involved.


Our Instructors

They are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.




Our Training Programs:



Information Security Awareness Training

1. Information Security Awareness Training: Managers and employees must understand the risk of cyber threats, and why cyber security is a shared responsibility. Process owners and persons having access to systems and data learn practical cyber security best practices to help protect themselves and their organization from cyber threats.

You may visit: https://www.cyber-risk-gmbh.com/1_Information_Security_Awareness_Training.html




Social Engineering Training: Awareness and Defense

2. Social Engineering Training: Awareness and Defense: About 80% of cyber attacks are being initiated or executed through social engineering. In this course, managers and employees learn to identify social engineering attacks, recognize the red flags, and respond to psychological exploitation from threat actors. Attendees learn to better protect the systems, assets, and information they handle.

You may visit: https://www.cyber-risk-gmbh.com/2_Social_Engineering_Awareness_Defence.html




Practical Social Engineering Training

3. Practical Social Engineering. Defense and Protection of Sensitive Information: Sensitive or classified information is often a powerful, high-value asset that attracts many attackers. Governmental or non-governmental organizations and companies handling this information acquire the skills and knowledge necessary to identify potential threats and respond to them. They also learn to be proactive in avoiding information leaks.

You may visit: https://www.cyber-risk-gmbh.com/3_Practical_Social_Engineering.html




Insider Threats Training

4. Insider Threats Awareness Training: When insiders blend illicit activities with licit business and harm their own organization, other employees often become silent witnesses of this activity. We help employees understand the insider threat, recognize the red flags of insider threat activity, respond to it by informing their organization, and more.

You may visit: https://www.cyber-risk-gmbh.com/4_Insider_Threats_Awareness_Training.html




Cybersecurity training for banks

5. The target is the bank. From hacking to cybercrime to cyberespionage: The number of cyber-attacks directed at financial institutions of all sizes is growing. Cyber risks, like reputational and financial risks, affect a bank’s bottom line. We help key people in financial institutions understand how cyber-criminals operate, the exploitation of IT vulnerabilities or the use of deceptive or manipulative attacks on people to gain access to facilities, systems, and the critical infrastructure.

You may visit: https://www.cyber-risk-gmbh.com/5_The_Target_Is_The_Bank.html




Cybersecurity training, hospitality industry

6. Cybersecurity training for managers and employees working in the hospitality industry: For decades, when we were using the words “hotel security”, we were usually referring to “physical security”. It was all about guest protection, locks, safes, and surveillance. Guests and hotel employees today expect that the same level of protection extends to the digital assets that reside not only on their laptops and smartphones, but also on the hotel’s systems.

You may visit: https://www.cyber-risk-gmbh.com/6_Cybersecurity_Training_Hospitality_Industry.html




Cybersecurity training, aviation industry

7. Cybersecurity training for managers and employees working in the commercial and private aviation industry: The commercial and private aviation must comply with cyber security and privacy laws and regulations and must follow international standards and best practices that protect their customers and employees. Aircraft cybersecurity involves the policies, procedures, awareness and training for the prevention, detection, and response to deliberate malicious acts that target systems, persons (via social engineering) and data, to compromise an aircraft's systems and staff.

You may visit: https://www.cyber-risk-gmbh.com/7_Cybersecurity_Training_Aviation_Industry.html




Cybersecurity training, healthcare industry

8. Cybersecurity training for managers and employees working in the healthcare industry: In 2020, hospitals, healthcare providers and medical facilities were struggling to handle not only the influx of patients suffering from Covid-19, but also a surge of ransomware attacks, as criminals (including state-sponsored groups) exploited the crisis to hit the sector. Month after month, there are many successful cyberattacks on the healthcare industry. Cybersecurity breaches that expose sensitive data from thousands of people are especially important, as the privacy rules have become a nightmare for healthcare providers.

You may visit: https://www.cyber-risk-gmbh.com/8_Cybersecurity_Training_Healthcare_Industry.html




9. NIS 2 Directive Trained Professional (NIS2DTP) program: The program has been designed to provide with the skills needed to understand and support compliance with the NIS 2 Directive. It also provides with the skills needed to pass the NIS 2 Directive Trained Professional (NIS2DTP) exam, and to receive the Certificate of Completion, that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter.

You may visit: https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html




10. Digital Operational Resilience Act Trained Professional (DORATPro) program: The program has been designed to provide with the skills needed to understand and support compliance with the Digital Operational Resilience Act (DORA). It also provides with the skills needed to pass the Digital Operational Resilience Act Trained Professional (DORATPro) exam, and to receive the Certificate of Completion, that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter.

You may visit: https://www.digital-operational-resilience-act.com/Digital_Operational_Resilience_Act_Trained_Professional_(DORATPro).html




11. Critical Entities Resilience Directive Trained Professional (CERDTPro) program: The program has been designed to provide with the skills needed to understand and support compliance with the Critical Entities Resilience Directive (CER). It also provides with the skills needed to pass the Critical Entities Resilience Directive Trained Professional (CERDTPro) exam, and to receive the Certificate of Completion, that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter.

You may visit: https://www.critical-entities-resilience-directive.com/Critical_Entities_Resilience_Directive_Trained_Professional_(CERDTPro).html




12. Digital Services Act Trained Professional (DiSeActTPro) program: The program has been designed to provide with the skills needed to understand and support compliance with the Digital Services Act. It also provides with the skills needed to pass the Digital Services Act Trained Professional (DiSeActTPro) exam, and to receive the Certificate of Completion, that provides independent evidence that you have a quantifiable understanding of the subject matter.

You may visit: https://www.eu-digital-services-act.com/DiSeActTPro_Training.html




13. Digital Markets Act Trained Professional (DiMaActTPro) program: The program has been designed to provide with the skills needed to understand and support compliance with the Digital Markets Act. It also provides with the skills needed to pass the Digital Markets Act Trained Professional (DiMaActTPro) exam, and to receive the Certificate of Completion, that provides independent evidence that you have a quantifiable understanding of the subject matter.

You may visit: https://www.eu-digital-markets-act.com/DiMaActTPro_Training.html




14. Data Governance Act Trained Professional (DatGovActTP) program: The program has been designed to provide with the skills needed to understand and support compliance with the Data Governance Act. It also provides with the skills needed to pass the Data Governance Act Trained Professional (DatGovActTP) exam, and to receive the Certificate of Completion, that provides independent evidence that you have a quantifiable understanding of the subject matter.

You may visit: https://www.european-data-governance-act.com/DatGovActTP_Training.html



Cyber Risk GmbH, some of our clients





Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Training

Online Training

Recorded on-demand training and live webinars.

In-house Training

In-house Training

Engaging training classes and workshops.

Social Engineering

Social Engineering

Developing the human perimeter to deal with cyber threats.


Cybersecurity for the Board

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessments

Assessments

Open source intelligence (OSINT) reports and recommendations.


Cybersecurity for High Value Targets

High Value Targets

They have the most skilled adversaries. We can help.



Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver





Cyber Risk GmbH, Cyber Risk Awareness and Training