You can freely combine the training modules available below. If you have any doubts, we will advise you on the most frequently chosen modules (write to: [email protected])
Training prepared by active practitioners with experience in protecting company security.
The training can be put together from ready-made subject modules. This allows the course to be tailored as closely as possible to the specific needs of the customer (also in terms of the duration of the training).
Most modules include a live demonstration, which engages training participants much more than the “talking heads” often found in such courses.
The training is regularly updated with new types of attacks and new defence methods – participants have access to the most up-to-date knowledge.
The training, conducted in understandable language, is aimed at all employees who use computers.
We pay particular attention to engaging course participants through mini tasks, live surveys, and answering questions.
The training is conducted live. Direct contact with the trainer and the possibility of adapting the agenda to the needs of a given organisation guarantee a real increase in employees’ knowledge of cyber threats.
The training formula is tailored to the client’s needs and budget – onsite, online, and division into groups, with the possibility of using the training recording as internal material.
Nearly 70% of Polish companies have already experienced an attack targeting their infrastructure, and with rapid digitalisation, these numbers are growing rapidly.
In response to growing demand, we have developed a course for office staff that provides appropriate training, translating into improved ICT security awareness and threat response skills.
The material has been prepared in such a way that a person with basic computer skills can look at a given situation or event from the attacker’s perspective and thus protect themselves and their company from an attack.
During the training, the latest examples of attacks targeting Polish and international companies will be presented, ranging from small and medium-sized enterprises to corporations and public institutions. Topics covered will include best practices for ensuring online security, appropriate procedures to be implemented in everyday work, secure data storage, correct use of browsers, email clients and office suites, and the ability to recognise social engineering attacks.
We also offer the option of tailoring the agenda to precisely match the educational needs of your organisation.
The training can be enhanced with additional social engineering testing services. These tests may be of the following type:
A phishing test checks employees’ resistance to email attacks in which they are persuaded to click on a URL or open a ‘malicious’ attachment. After preliminary Open-Source Intelligence (OSINT) research to tailor the attack, our auditors simulate a typical email interaction using seemingly harmless URLs or attachments. Depending on the pre-agreed scenario, emails may lead to a specially prepared website or contain an attachment disguised as an executable file that is used to transfer data from the computer. Our team customises each test scenario using dedicated web domains, the necessary infrastructure and software. Upon completion, a report is prepared that includes the assumptions, implemented scenarios and comprehensive statistics reflecting the scope of the campaign.
Vishing, or voice phishing, refers to social engineering attacks carried out over the telephone, aimed at persuading employees to disclose confidential information or perform actions that could compromise security. During the test, our auditors assume specific roles to gain the trust of the target person and persuade them to take certain actions, such as following instructions or sharing confidential data. The final report contains detailed information on the assumptions, scenarios implemented and results, providing insight into areas requiring attention and improvement.
The aim of on-site testing is to overcome physical security measures, such as building reception or security, using social engineering techniques. First, reconnaissance of the location where the test is to take place is carried out, followed by an attempt to enter the designated location and perform specific activities. The entire social engineering attack is documented with photographs taken during the attack. Before work begins, a detailed plan will be developed in case the auditors are detected while attempting to physically breach security (e.g. unauthorised passage through a security gate). Social engineering tests can be conducted before and/or after training.
Yes, we select specific training modules that are determined already at the proposal stage. Before the training takes place, the trainer always contacts the client in order to further clarify the agenda.
The training is conducted live, with a choice of online or onsite (at the client’s premises or a location specified by them).
It depends on the arrangements and the client’s needs. Most often, training sessions last between 1 and 3 hours (single training sessions).
The training can be conducted in Polish or English.
In principle, the group size can be any size. However, it should be noted that the larger the group, the more difficult it becomes to ensure that each participant has meaningful contact with the trainer and the opportunity to ask questions, etc.
This is determined individually in each offer and depends on the client’s requirements. Usually, it includes a shortened version of the training presentation and a quiz designed to verify the participants’ knowledge.
Yes, provided that the license option for such a recording has been purchased – this is usually a separately priced option in the offer.
This training course is intended for companies. For individuals, we offer open training courses, available in our shop: sklep.securitum.pl