Courses
Practical training for staff. Short, recognizable, and directly applicable.
Securing Accounts with Passwords
Weak or reused passwords remain one of the leading causes of cyber incidents. In this e-learning, employees learn why strong passwords are essential, how…
Recognising Phishing Attacks
Phishing attacks are becoming increasingly sophisticated and remain one of the biggest cybersecurity risks for organisations. In this e-learning, employees…
Recognising Social Engineering
More than 85% of cyberattacks do not start with technology, but with manipulation. In this e-learning, employees learn what social engineering is, why it is so…
Basic GDPR (General Data Protection Regulation)
Personal data is everywhere and almost everyone works with it. In this e-learning, employees learn what the GDPR is, why it exists and how to handle personal…
GDPR in Practice
The GDPR is not just theory, it directly affects daily work. In this e-learning, employees learn how to handle personal data, consent and deletion requests in…
Data Protection and Secure Data Destruction
A found USB drive or an old laptop may seem harmless, but can pose serious risks. In this e-learning, employees learn how to securely store, share and destroy…
Social Media: Safe and Responsible Use
Social media are essential, but they also come with risks. In this e-learning, employees learn how cybercriminals misuse social platforms and how to protect…
Physical Security
Cybersecurity starts at the front door. In this e-learning, employees learn why physical security is essential and how alert behaviour and clear rules help…
Flexible Working
Flexible and remote working are now the norm. In this e-learning, employees learn how to work securely outside the office and prevent data breaches and privacy…
Secure Use of Mobile Devices
Mobile devices contain more sensitive information than ever before. In this e-learning, employees learn how to use smartphones, tablets and laptops securely to…
CEO Fraud (Business Email Compromise)
CEO fraud is one of the most costly forms of cybercrime. In this e-learning, employees learn how criminals impersonate executives or suppliers and how to…
Safe Online Working: Recognising URLs & Secure Browsing
Everyday internet use poses major risks. In this two-part course, employees learn how to recognise deceptive links and how to browse the web safely to prevent…
Managing Security Risks
Employees are increasingly targeted by cybercriminals. In this e-learning, participants learn how to recognise, reduce and manage security risks in their daily…
Mobile App Security
Mobile apps make work easier, but they also introduce risks. In this e-learning, employees learn how to recognise safe apps, assess risks and make informed…
What Is Ransomware?
Ransomware is one of the most disruptive cyber threats today. In this e-learning, employees learn what ransomware is, how infections occur and how to prevent…
Sensitive Personal Information
Sensitive personal information is highly valuable to cybercriminals. In this e-learning, employees learn what sensitive information is, why it matters and how…
Insider Threats
Not all threats come from outside the organisation. In this e-learning, employees learn how insider threats arise, how to recognise warning signs and how to…
Securely Connecting Mobile Devices
Mobile devices are always connected. In this e-learning, employees learn how to use Bluetooth, Wi-Fi and location services safely to prevent unintended data…
Legal Bases of the GDPR
The GDPR allows personal data processing only under specific legal bases. In this e-learning, employees learn what these bases are, how to choose the right one…
How to Prevent CEO Fraud
CEO fraud is a sophisticated form of phishing with serious financial impact. In this e-learning, employees learn how CEO fraud attacks are executed — and which…
Real or Fake Message?
Not everything online is true. In this e-learning, employees learn how to recognise fake messages, disinformation and phishing — before they spread…
Acting with Integrity
Integrity is about doing the right thing, even when no one is watching. In this e-learning, employees learn what acting with integrity means, how to recognise…
Targeted Attacks
Not all cyberattacks are random. In this e-learning, employees learn what targeted attacks are, why individuals and organisations become targets and how to…
More Privileges — What Now?
Users with elevated privileges are essential to organisations, but also high-value targets. In this e-learning, privileged users learn how to manage their…
The Danger of Malware
Malware is one of the most common digital threats today. In this e-learning, employees learn what malware is, how infections occur and how to prevent damage to…
The Danger of Deepfakes
What you see or hear is not always real. In this e-learning, employees learn what deepfakes are, how they are used for deception and how to recognise warning…
Data Classification and the ‘Need to Know’ Principle
Not all information carries the same risk. In this e-learning, employees learn how data classification works and why the ‘need to know’ principle is essential…
Policies and Procedures for Information Security and Privacy
Strong security starts with clear rules, not just technology. In this e-learning, employees learn why policies and procedures are vital for information…
Secure Outsourcing of Services
Outsourcing creates opportunities — and risks. In this e-learning, employees learn how to outsource services securely while maintaining control over security,…
Information Sharing with Other Organisations
Collaboration requires information sharing. In this e-learning, employees learn how to safely exchange information with external organisations, recognise risks…
What Are You Responsible For?
Information security is not just an IT responsibility. In this e-learning, employees discover their own role and how alert behaviour can prevent incidents…
Everything Is Moving to the Cloud
The cloud is now part of everyday work. In this e-learning, employees learn what the cloud is, which risks it introduces and how their own behaviour can…
Identity Theft
Identity theft is the most common form of cybercrime. In this e-learning, employees learn how identity theft occurs, how to recognise warning signs and what to…
Recovering from Data Breaches
A data breach can happen to anyone. In this two-part course, employees learn how to handle personal data responsibly and how to act quickly and correctly when…
Intellectual Property
Creative content is rarely free to use. In this e-learning, employees learn what intellectual property is, why it matters and how to avoid unintentional misuse…
Spoofing
Spoofing looks trustworthy but is deceptive. In this e-learning, employees learn how spoofing works, which forms it takes and how to recognise and stop…
Safe Use of AI
Generative AI tools such as ChatGPT create new opportunities, but also introduce risks. In this e-learning, employees learn how to use AI safely, responsibly…
Clickjacking
Clickjacking is a subtle but dangerous attack technique. In this e-learning, employees learn how clickjacking works, how to recognise it and how to prevent…
The Evolution of Phishing
Phishing has evolved. In this advanced e-learning, employees learn how modern phishing works, including spear phishing, CEO fraud, voice phishing and video…
Cybersecurity in the Supply Chain
Cyberattacks do not stop at organisational boundaries. In this e-learning, employees learn how supplier and partner risks can lead to major incidents — and…
Data Breach Handling
A data breach can happen to anyone. In this e-learning, employees learn how to recognise data breaches, limit damage and respond correctly when something goes…
Incident Response
Incidents are inevitable — chaos is not. In this e-learning, employees learn how to recognise security incidents, prevent them where possible and respond…
As malware becomes smarter
Malware is evolving rapidly. In this advanced e-learning, employees learn how modern malware works, how to recognise subtle warning signs and how their actions…
Secure software does not start with code
Secure software does not happen by accident. In this e-learning, employees learn that Secure Development Lifecycle is not a technical trick, but a shared…
What you share reveals more than you realise
Social media are powerful tools, but also rich information sources for attackers. In this e-learning, employees learn how open source intelligence (OSINT)…
NIS2 for Board Members
Cybersecurity is no longer an IT issue — it is a board-level responsibility. This e-learning provides board members with clear insight into the NIS2 directive,…