Raising awareness about cyber security
Specific results you can expect:
- 90% of participants recognize phishing attacks already in the first week
- 70% reduction in security incidents in the organization in the first 3 months
- Increasing employee awareness of digital threats
- Better habits in using passwords and accessing accounts
- Safer work with business data and documents
After training, your team will know how to:
- Recognize phishing emails and suspicious links before clicking
- Create and manage secure passwords for all accounts
- Use email and the Internet safely while working
- Protect business data on computers and mobile devices
- React properly when it suspects that a security incident has occurred
- Implement basic cyber security measures in daily work
We will work on:
- Recognizing cyber threats in real time (because hackers don't wait),
- Safe use of e-mail and Internet for daily work,
- Protection of business data through simple but effective measures,
- Managing passwords that really protect your accounts,
And creating habits that make you less vulnerable to attacks.
In the end, each participant gets practical tools that they can use right away - from recognizing suspicious emails to working securely on mobile devices.
This training is not technical - it focuses on practical skills that every employee can apply. 90% of participants recognize phishing attacks after the first week, and organizations reduce security incidents by 70% in the first three months.
- What awaits you?
Training content by modules
The training is organized through 9 connected modules that build on each other and create a complete picture of practical cyber security:
1. What is computer security?
- Fundamentals of cyber security and digital protection
- Understanding the main threats in the digital environment
- The importance of security for business and personal data
- An overview of the basic principles of information protection
2. Social engineering
- Recognizing the manipulative techniques of hackers
- Identification of fraud attempts through communication
- Protection against psychological attacks and manipulation
- Practical examples of social engineering
3. Internet Browsing Safety
- Safe use of web browsers and browsers
- Identifying malicious web pages
- Security of public Wi-Fi networks
- Privacy protection during online activities
4. Password security
- Creating strong and unique ciphers
- Using a password manager in practice
- Double authentication and additional security measures
- Safe storage and management of access data
5. Email security
- Recognition of phishing and spam messages
- Safe handling of attachments and links
- Encryption and secure email communication
- Best practices for business email communication
6. Malicious software
- Identification of viruses, trojans and other threats
- Use of antivirus programs and protection
- Recognizing signs of system infection
- Malware Removal Procedures
7. Operating system security
- Update and patch management
- Configuration of security settings
- Manage user accounts and permissions
- Backup strategies and data recovery
8. Security of mobile devices and wireless networks
- Protection of smartphones and tablets
- Safe use of applications and app stores
- Security Bluetooth and Wi-Fi connection
- Manage application permissions
9. Identity theft
- Recognizing attempts to steal personal data
- Protection of financial and personal information
- Procedures in case of identity compromise
- Monitoring and monitoring of data abuse
How does the Cyber Security Awareness training take place?
The training adapts to your company's needs through various delivery formats. We can organize in-house training directly at your business premises, which allows complete adaptation to your work atmosphere and company culture.
Alternatively, the training can be conducted online via Microsoft Teams platform, which is ideal when you have employees at different locations or want to reduce travel costs. We also offer a hybrid format that combines in-person and online instruction, adapting to your team's specificities.
For online training, a stable internet connection is required, a computer or laptop with camera and microphone, as well as the Microsoft Teams application. Access to shared documents during training is also necessary.
All materials are provided in digital format, which enables easy sharing with colleagues and access to materials even after training completion.
Upon training completion, each participant receives a digital attendance certificate that confirms acquired competencies. This certificate can be used for personal portfolio or company HR records.
Who delivers the Cyber Security Awareness training?
The trainings are conducted by our long-term collaborators - experts in the field of cyber security with years of practical experience in protecting organizations from digital threats in various industries. These are not theorists, but professionals who have successfully implemented security measures and responded to real cyber attacks.
My colleagues have practically applied all the cyber security techniques they teach, which allows them to share concrete experiences about how attacks work in practice and which protection measures are most effective. Each trainer goes through a selection process where I evaluate the practical experience in cyber security, the ability to transfer knowledge and the results achieved by raising awareness about security in organizations.
As a consultant, I analyze your industry, company culture, and the specific security risks you face, and then select the most appropriate trainer for your needs. During the training, I monitor the quality of the delivery and make sure that the content is adapted to your reality and that the participants get practical tools that they can use immediately.
This approach guarantees that you will receive a trainer who understands your business, the security challenges of your industry and can answer specific questions related to cyber security in your specific situation.
Who is it intended for?
This training was created for all employees who use computers and the Internet in their work, regardless of their technical knowledge or position in the company. It is especially useful for organizations that want to raise the level of cyber security through the education of their people.
The training is ideal for administrative staff who work daily with email and documents, managers who manage sensitive business information, sales staff who use various online platforms, as well as all employees who work with client data and confidential information.
It's designed to be easy to understand and useful for both those with basic computer knowledge and more advanced users who want to improve their security habits. No previous technical experience is required – the focus is on practical skills that anyone can apply.
Regardless of industry or company size, any employee who uses digital tools at work can benefit from this training and contribute to the overall security of the organization.
How long does it last?
This training is designed as an intensive education covering all key aspects of cyber security.
Standard format – Three hours cover all 9 modules through real examples and experiences of lecturers, interactive scenarios and analysis of real cases. This format is optimized to deliver maximum knowledge with minimal employee absenteeism, which is ideal for organizations that want to quickly and efficiently educate their teams.
During the training, the participants go through all the modules with enough time for questions, discussion and analysis of concrete situations from the lecturer's practice. The training is structured to keep the attention of the participants and enable them to immediately apply what they have learned in their work.
The three-hour duration allows organizations to educate a larger number of employees without significantly impacting day-to-day operations, while ensuring that everyone receives the necessary knowledge to safely use digital tools.
It is recommended that participants have:
- Basic computer and internet experience
- Motivation to learn how to protect themselves from cyber threats
- Willingness to change existing habits in using digital tools
- Openness to adopt new security practices
- They want to contribute to the overall security of their organization
Training price list
The price of the training depends on the number of participants, which allows us to provide the optimal level of attention to each participant:
For a small group (1 to 10) of participants
This approach allows organizations to educate a large number of employees at once, which is especially important for Microsoft Teams because all team members need to be familiar with the platform for effective digital collaboration.
110 EUR
+VAT
per student
The training includes:
- Better dynamics of learning through group discussions
- Exchange of experiences between colleagues from the same organization
- Creating a shared culture of using Teams tools
- A more effective approach to the education of a larger number of employees
- All materials and practical guides
- Digital certificate of attendance
- Support during training
- Lecturer experiences and real examples adapted to the specifics of your industry
For a larger group (11+ participants)
Larger groups bring the dynamics of teamwork, the exchange of experiences between participants and the possibility of learning through interaction with colleagues.
75 EUR
+VAT
per student
The training includes:
- Better dynamics of learning through group discussions
- Exchange of experiences between colleagues from the same organization
- Creating a shared culture of using Teams tools
- A more effective approach to the education of a larger number of employees
- All materials and practical guides
- Digital certificate of attendance
- Support during training
- Lecturer experiences and real examples adapted to the specifics of your industry
Notes: 1. Registration of 10 participants or more from your company is necessary for this training. 2. Possibility of customized offer for 25+ participants.
Frequently asked questions and answers
Is the training technical and complex to understand?
No! The training is designed for all employees regardless of technical knowledge. The focus is on practical skills that everyone can apply in everyday work.
Why is a minimum of 10 participants required?
Cyber security is a team effort – all employees need to be aware of the threat. A larger group enables better learning dynamics and the creation of a common safety culture in the organization.
How long does it take to see results in safety?
Most participants start to recognize phishing attacks already in the first week. A significant reduction in security incidents is seen after 4-6 weeks of applying what has been learned.
Do I get specific protection tools?
Yes, you get practical cyber security guides, security checklists, security tool recommendations and templates you can use right away.
What if a security incident occurs after the training?
The training also covers incident response procedures. Participants will know how to recognize, report and respond to security threats.
Is the training adapted to the specifics of our industry?
Yes, trainers adapt examples and scenarios to the specific security risks of your industry and business environment.
Can I get a certificate?
Yes, all participants who complete the training receive an official certificate of attendance that confirms acquired competencies in cyber security.
How far in advance should I book an appointment?
We recommend booking at least 6-8 weeks in advance, especially for in-house trainings that require additional planning.
Does the training cover mobile devices?
Yes, Module 8 focuses on the security of mobile devices, applications and wireless networks used by employees at work.
What if some employees cannot attend the training?
We recommend that all key employees undergo training. We can arrange additional sessions or a hybrid format for those unable to attend.