ICT Security of Office Workers

490 € (excl. VAT)

Training price:


The training takes place on a BYOL (Bring Your Own Laptop) basis. This means that you must bring your own laptop to the training or inform us if you do not have one.


The training introduces participants to threats, methods of cybercrime and sociotechnical methods aimed at people working in front of a computer on a daily basis.

During the training, participants will learn how the cybercrime market works, what amounts modern criminals deal with, what methods they use to access the ICT network as well as how fraudsters can obtain information under false pretences from an unaware employee during a personal conversation, phone call or e-mail conversation, e.g. information about the name of a sales manager or the topic of the sales department meeting. During the training, the participant also learns about the consequences of using a company computer for personal purposes and how it increases the risk of attack on the whole company.


  • The training is addressed to each employee of the company, regardless of their knowledge and skills in the field of ICT.


  • Gaining knowledge that includes safe workplace and data management
  • Gaining knowledge which enables the protection against social and technical attacks


6 h (1 days x 6 h)


  1. What is cybercrime
  2. Description of the functioning of organised cybercrime groups
  3. Are they really a threat to us
  4. Am I an attractive "customer" for cybercriminals
  5. What profits can a cybercriminal get by attacking my data
  6. Losses from a successful attack on the company
  7. Types of attacks aimed at office workers
  8. How does a cybercriminal join our computer to a Botnet network
  9. How to protect yourself against it
  10. Spam as a non-threatening method of threatening attacks
  11. E-mail addresses trade
  12. Phishing campaigns as a method of robbing our bank accounts
  13. Profitability of DoS/DDoS attacks aimed at our organisation
  14. Dangerous 0-day attacks - is there a way to defend ourselves against them
  15. Unpaid VAT invoice as a way to smuggle a virus into our system
  16. How does a cybercriminal know my password
  17. Payment card scanning - where and when did someone scan my card
  18. Social and technical attacks - that is, innocent "extortion" of data
  19. Provision of access passwords to colleagues
  20. Physical safety of the workplace
  21. A flash drive found in the car park as a permission to attack for a cybercriminal


Call Us: +48 800 080 322


1 d x 6 h (Total 6 h)

Do you have any questions?
Do you need more information?
Do you want to pre-book the place?

Call Us!
+48 32 259 11 80

Hotel during training

Are you looking for a Hotel for the duration of a training course? Select the city and see our offer.

Hotels in Gdansk
Hotels in Katowice
Hotels in Lodz
Hotels in Poznan
Hotels in Rzeszow
Hotels in Szczecin
Hotels in Warsaw
Hotels in Wroclaw