Cyber Security Training Style And Methods

A mix of slides, challenges, exercises, quizzes and tools are used which include tangible items (two factor authentication and encryption tokens) to please all learning styles. Slides are kept to a minimum with just a few words per line meaning the audience does not simply read line by line which means the trainer is not semi-pointless. Modern security tools are used which are researched before being built into training events. AWS is used to replicate real world infrastructure building.
Training Topics On Offer
|
|
|
Technical Consulting Offering
- Business ECP (Executive Cyber Protection) - digital security for your C-suite
- Cyber Security For HNWIs and SMEs - enterprise+ grade security for your family
- Email TAP (Targeted Attack Protection) - 80% of intrusions start by email
- Private Mail Servers - don't trust Google, Yahoo, AOL? Get your own infrastructure
- Smartphone Security - a smartphone is a portable computer, protect it
- Voice & SMS Encryption - don’t trust WhatsApp? Go beyond the standard apps
- Secure Microsoft 365 Implementation and Security Augmentation
- DLP (Data Loss Prevention) Projects - powered by Digital Guardian DLP
Globally Available Services
As you would expect, the client will need to meet all costs i.e.: flights, trains, taxis, hotels and meals. For new engagements, the client will need to arrange flights or trains and hotels in advance which can be verified online.