Social engineering

More than 70% of targeted cyberattacks start with phishing and other social engineering tactics. Moreover, this trend is coupled with the emergence of new and more advanced online fraud schemes.

The following workshop aims to teach the average Internet user the best practices for using the Internet so that they can avoid becoming the next victim of lurking threat actors.

The program

The workshop contains not only lectures but also tests and other gamified educational formats designed by experts who deal with online threats every day. This allows the learner to more deeply understand these threats and what Internet users need to do to protect themselves.

Cyberattack trends

arrow_drop_down

Learn about attackers’ technology, instruments, and goals, as well as fraud schemes and targeted attacks that involve social engineering and malware.

Securing your personal computer and workspace

arrow_drop_down

Learn the basic rules for securing your workspace, and how to protect yourself against malware infection, data leaks, and data encryption.

Safely navigating your web browser

arrow_drop_down

Learn about cloned sites, pharming, and malware distribution through viruses, and how to detect and prevent device infection and data theft.

Securing your mobile device

arrow_drop_down

Learn how to secure work and personal data that is stored on your mobile phone, as well as the basic safety settings for your browser and how to share data securely.

Phishing

arrow_drop_down

Learn all you need to know about phishing, including real-life examples and detection methods.

Social media and messenger safety

arrow_drop_down

Learn how to set up the safety settings of your social networks and messengers, and how to responsibly post personal information on these platforms.

Safety of corporate communication and conference rooms

arrow_drop_down

Learn the safest channels of information exchange at work, including mail services and messengers.

Password policy

arrow_drop_down

Learn how to properly create, store, and change passwords.

IoT and home network safety

arrow_drop_down

Learn how to secure your devices at home, including smart devices and routers, and adjust your safety settings to protect your home network against attacks. Get insights on how to work safely from home.

Traditional fraud

arrow_drop_down

Learn about fraudulent giveaways and investment schemes, vishing, spam, pirated resources, and SIM card cloning.

What to do during an attack

arrow_drop_down

Learn how to act in the event of a cyberattack.

Kids in cyberspace

arrow_drop_down

Learn about the specific threats targeting children on the Internet and how to protect your kids in cyberspace.

Interactive cybersecurity awareness training for employees

The Cybersecurity awareness workshop contains not only lectures but also tests and other gamified educational formats designed by experts who deal with online threats every day. This allows the learner to more deeply understand these threats and what Internet users need to do to protect themselves.

What you’ll walk away with after the course

  • The rules for how to maintain personal cybersecurity
  • Methods for protecting both personal and work devices
  • Understanding of the threat landscape and the methods used by threat actors today