14-day contact with the trainer after the training.
TRAINING DESCRIPTION
The training introduces participants to threats, methods of cybercrime and sociotechnical methods aimed at people working in front of a computer on a daily basis.
During the training, participants will learn how the cybercrime market works, what amounts modern criminals deal with, what methods they use to access the ICT network as well as how fraudsters can obtain information under false pretences from an unaware employee during a personal conversation, phone call or e-mail conversation, e.g. information about the name of a sales manager or the topic of the sales department meeting. During the training, the participant also learns about the consequences of using a company computer for personal purposes and how it increases the risk of attack on the whole company.
REQUIREMENTS:
The training is addressed to each employee of the company, regardless of their knowledge and skills in the field of ICT.
TRAINING BENEFITS:
Gaining knowledge that includes safe workplace and data management
Gaining knowledge which enables the protection against social and technical attacks
TRAINING DURATION:
6 h (1 days x 6 h)
TRAINING PROGRAMME
What is cybercrime
Description of the functioning of organised cybercrime groups
Are they really a threat to us
Am I an attractive "customer" for cybercriminals
What profits can a cybercriminal get by attacking my data
Losses from a successful attack on the company
Types of attacks aimed at office workers
How does a cybercriminal join our computer to a Botnet network
How to protect yourself against it
Spam as a non-threatening method of threatening attacks
E-mail addresses trade
Phishing campaigns as a method of robbing our bank accounts
Profitability of DoS/DDoS attacks aimed at our organisation
Dangerous 0-day attacks - is there a way to defend ourselves against them
Unpaid VAT invoice as a way to smuggle a virus into our system
How does a cybercriminal know my password
Payment card scanning - where and when did someone scan my card
Social and technical attacks - that is, innocent "extortion" of data
Provision of access passwords to colleagues
Physical safety of the workplace
A flash drive found in the car park as a permission to attack for a cybercriminal