For all employees who work with information systems and data, aimed at increasing their awareness of cyber threats and security practices.
For executives, information security managers (CISOs), IT managers, and responsible personnel involved in risk management and compliance with standards.
An awareness course introducing current online threats and advising how to avoid them.
This training course introduces all areas of an Information Security Management System (ISMS).
We teach you the basic steps and processes of risk management so you and your colleagues can manage them effectively.
Training focused on managing IT in a way that withstands security threats.
We show you how to build IT services that can withstand outages and common disruptions.
We prepare you for the role of ISMS Manager responsible for the information security management system under ISO 27001. We guide you through all requirements and show you how to implement them in your organization.
We teach you how to properly audit an ISMS, prepare audit procedures, and focus on key areas.
We teach you how to manage security risks according to ISO 27005—from identification and assessment, to risk management decisions, through to successful handling and acceptance.
We train you to become a manager of organizational disaster recovery and business continuity. You will learn to conduct risk assessments, business impact analyses (BIA), identify critical systems, processes, and technologies, and create and test Disaster Recovery Plans (DRP) and Business Continuity Plans (BCP).
Security incidents affect every organization. That’s why it is essential to have in-house competence and a responsible person who can resolve incidents effectively so they no longer pose a threat. We will train you to become that person.
We tailor training to your needs and preferences—on-site or online.
Our trainers are seasoned professionals in information and cybersecurity.
We emphasize real-world examples, threat simulations, and case studies.
Graduates receive a certificate of successful course completion.
Increased employee awareness of cyber threats and data protection.
Compliance with key standards and legislation.
Enhanced ability to respond to security incidents.
Support for long-term security and customer trust.