Cyber Security Training Style And Methods
We have all sat through two-hour account updates with each slide divided into four and each section crammed with fifty words. Equally as bad is learning about tools and techniques from ten years ago or how many users there were or are in 2019, 2020 and currently on Facebook. If you are learning Open Source Intelligence, a basic knowledge of DNS is needed but not ten plus slides on TCP and UDP. People, especially younger ones, switch off if they are being talked at for hours solid.
A mix of slides, challenges, exercises, quizzes and tools are used which include tangible items (two factor authentication and encryption tokens) to please all learning styles. Slides are kept to a minimum with just a few words per line meaning the audience does not simply read line by line which means the trainer is not semi-pointless. Modern security tools are used which are researched before being built into training events. AWS is used to replicate real world infrastructure building.
Training Topics On Offer
|
|
|
Technical Consulting Offering
- Business ECP (Executive Cyber Protection) - digital security for your C-suite
- Cyber Security For HNWIs and SMEs - enterprise+ grade security for your family
- Email TAP (Targeted Attack Protection) - 80% of intrusions start by email
- Private Mail Servers - don't trust Google, Yahoo, AOL? Get your own infrastructure
- Smartphone Security - a smartphone is a portable computer, protect it
- Voice & SMS Encryption - don’t trust WhatsApp? Go beyond the standard apps
- Secure Microsoft 365 Implementation and Security Augmentation
- DLP (Data Loss Prevention) Projects - powered by Digital Guardian DLP
Globally Available Services
As you would expect, the client will need to meet all costs i.e.: flights, trains, taxis, hotels and meals. For new engagements, the client will need to arrange flights or trains and hotels in advance which can be verified online.