Courses

Practical training for staff. Short, recognizable, and directly applicable.

Securing Accounts with Passwords

Weak or reused passwords remain one of the leading causes of cyber incidents. In this e-learning, employees learn why strong passwords are essential, how…

Read more →

Recognising Phishing Attacks

Phishing attacks are becoming increasingly sophisticated and remain one of the biggest cybersecurity risks for organisations. In this e-learning, employees…

Read more →

Recognising Social Engineering

More than 85% of cyberattacks do not start with technology, but with manipulation. In this e-learning, employees learn what social engineering is, why it is so…

Read more →

Basic GDPR (General Data Protection Regulation)

Personal data is everywhere and almost everyone works with it. In this e-learning, employees learn what the GDPR is, why it exists and how to handle personal…

Read more →

GDPR in Practice

The GDPR is not just theory, it directly affects daily work. In this e-learning, employees learn how to handle personal data, consent and deletion requests in…

Read more →

Data Protection and Secure Data Destruction

A found USB drive or an old laptop may seem harmless, but can pose serious risks. In this e-learning, employees learn how to securely store, share and destroy…

Read more →

Social Media: Safe and Responsible Use

Social media are essential, but they also come with risks. In this e-learning, employees learn how cybercriminals misuse social platforms and how to protect…

Read more →

Physical Security

Cybersecurity starts at the front door. In this e-learning, employees learn why physical security is essential and how alert behaviour and clear rules help…

Read more →

Flexible Working

Flexible and remote working are now the norm. In this e-learning, employees learn how to work securely outside the office and prevent data breaches and privacy…

Read more →

Secure Use of Mobile Devices

Mobile devices contain more sensitive information than ever before. In this e-learning, employees learn how to use smartphones, tablets and laptops securely to…

Read more →

CEO Fraud (Business Email Compromise)

CEO fraud is one of the most costly forms of cybercrime. In this e-learning, employees learn how criminals impersonate executives or suppliers and how to…

Read more →

Safe Online Working: Recognising URLs & Secure Browsing

Everyday internet use poses major risks. In this two-part course, employees learn how to recognise deceptive links and how to browse the web safely to prevent…

Read more →

Managing Security Risks

Employees are increasingly targeted by cybercriminals. In this e-learning, participants learn how to recognise, reduce and manage security risks in their daily…

Read more →

Mobile App Security

Mobile apps make work easier, but they also introduce risks. In this e-learning, employees learn how to recognise safe apps, assess risks and make informed…

Read more →

What Is Ransomware?

Ransomware is one of the most disruptive cyber threats today. In this e-learning, employees learn what ransomware is, how infections occur and how to prevent…

Read more →

Sensitive Personal Information

Sensitive personal information is highly valuable to cybercriminals. In this e-learning, employees learn what sensitive information is, why it matters and how…

Read more →

Insider Threats

Not all threats come from outside the organisation. In this e-learning, employees learn how insider threats arise, how to recognise warning signs and how to…

Read more →

Securely Connecting Mobile Devices

Mobile devices are always connected. In this e-learning, employees learn how to use Bluetooth, Wi-Fi and location services safely to prevent unintended data…

Read more →

Legal Bases of the GDPR

The GDPR allows personal data processing only under specific legal bases. In this e-learning, employees learn what these bases are, how to choose the right one…

Read more →

How to Prevent CEO Fraud

CEO fraud is a sophisticated form of phishing with serious financial impact. In this e-learning, employees learn how CEO fraud attacks are executed — and which…

Read more →

Real or Fake Message?

Not everything online is true. In this e-learning, employees learn how to recognise fake messages, disinformation and phishing — before they spread…

Read more →

Acting with Integrity

Integrity is about doing the right thing, even when no one is watching. In this e-learning, employees learn what acting with integrity means, how to recognise…

Read more →

Targeted Attacks

Not all cyberattacks are random. In this e-learning, employees learn what targeted attacks are, why individuals and organisations become targets and how to…

Read more →

More Privileges — What Now?

Users with elevated privileges are essential to organisations, but also high-value targets. In this e-learning, privileged users learn how to manage their…

Read more →

The Danger of Malware

Malware is one of the most common digital threats today. In this e-learning, employees learn what malware is, how infections occur and how to prevent damage to…

Read more →

The Danger of Deepfakes

What you see or hear is not always real. In this e-learning, employees learn what deepfakes are, how they are used for deception and how to recognise warning…

Read more →

Data Classification and the ‘Need to Know’ Principle

Not all information carries the same risk. In this e-learning, employees learn how data classification works and why the ‘need to know’ principle is essential…

Read more →

Policies and Procedures for Information Security and Privacy

Strong security starts with clear rules, not just technology. In this e-learning, employees learn why policies and procedures are vital for information…

Read more →

Secure Outsourcing of Services

Outsourcing creates opportunities — and risks. In this e-learning, employees learn how to outsource services securely while maintaining control over security,…

Read more →

Information Sharing with Other Organisations

Collaboration requires information sharing. In this e-learning, employees learn how to safely exchange information with external organisations, recognise risks…

Read more →

What Are You Responsible For?

Information security is not just an IT responsibility. In this e-learning, employees discover their own role and how alert behaviour can prevent incidents…

Read more →

Everything Is Moving to the Cloud

The cloud is now part of everyday work. In this e-learning, employees learn what the cloud is, which risks it introduces and how their own behaviour can…

Read more →

Identity Theft

Identity theft is the most common form of cybercrime. In this e-learning, employees learn how identity theft occurs, how to recognise warning signs and what to…

Read more →

Recovering from Data Breaches

A data breach can happen to anyone. In this two-part course, employees learn how to handle personal data responsibly and how to act quickly and correctly when…

Read more →

Intellectual Property

Creative content is rarely free to use. In this e-learning, employees learn what intellectual property is, why it matters and how to avoid unintentional misuse…

Read more →

Spoofing

Spoofing looks trustworthy but is deceptive. In this e-learning, employees learn how spoofing works, which forms it takes and how to recognise and stop…

Read more →

Safe Use of AI

Generative AI tools such as ChatGPT create new opportunities, but also introduce risks. In this e-learning, employees learn how to use AI safely, responsibly…

Read more →

Clickjacking

Clickjacking is a subtle but dangerous attack technique. In this e-learning, employees learn how clickjacking works, how to recognise it and how to prevent…

Read more →

The Evolution of Phishing

Phishing has evolved. In this advanced e-learning, employees learn how modern phishing works, including spear phishing, CEO fraud, voice phishing and video…

Read more →

Cybersecurity in the Supply Chain

Cyberattacks do not stop at organisational boundaries. In this e-learning, employees learn how supplier and partner risks can lead to major incidents — and…

Read more →

Data Breach Handling

A data breach can happen to anyone. In this e-learning, employees learn how to recognise data breaches, limit damage and respond correctly when something goes…

Read more →

Incident Response

Incidents are inevitable — chaos is not. In this e-learning, employees learn how to recognise security incidents, prevent them where possible and respond…

Read more →

As malware becomes smarter

Malware is evolving rapidly. In this advanced e-learning, employees learn how modern malware works, how to recognise subtle warning signs and how their actions…

Read more →

Secure software does not start with code

Secure software does not happen by accident. In this e-learning, employees learn that Secure Development Lifecycle is not a technical trick, but a shared…

Read more →

What you share reveals more than you realise

Social media are powerful tools, but also rich information sources for attackers. In this e-learning, employees learn how open source intelligence (OSINT)…

Read more →

NIS2 for Board Members

Cybersecurity is no longer an IT issue — it is a board-level responsibility. This e-learning provides board members with clear insight into the NIS2 directive,…

Read more →