In 2022, 12,947 cyber attacks were recorded in Italy
Techniques are evolving.
But would you know how to identify them?
#BeCyberSafe
Security Awareness Course to eliminate human error and forge personnel into an impenetrable line of defense !
Thanks to our course you will learn to:

Secure your accounts by mastering password best practices

Protect informations by safely archiving files

Secure your workspace when surfing the internet with secure browsing

Protect your infrastructure from malwares by identifying phishing attempts

Shield your reputation by distinguishing social engineering attacks

Safeguard your bank account through proper online banking practices

Keep your conversations safe by recognizing trusted Wi-Fi networks

Shield your smartphone from prying eyes and eavesdroppers
Key Course Features

Multisensory communication to stimulate visual and auditory memory and enhance learning

Jargon-free, easy-to-understand language. Accessible to all

Gamification to make learning fun and engaging

Quiz to check your level of understanding of the lessons

Infographics at the end of each lesson to promote long-term memory

Phishing simulations to test your employees in a controlled environment

Multilingual so that your employees from other countries can follow it

Final certification to demonstrate the level of awareness achieved
Would you like to purchase the course for multiple users?
We offer discounts based on purchase volume.

The Cyber Security Awareness Foundations course guarantees over timea an increase in awareness of IT security risks even among "non-specialist", employees that are unfamiliar with the world of IT
- 1 - Threats
- 2 - Password and smart management
- 3 - Cryptography
- 4 - Phishing
- 5 - Social Engineering
- 6 - Ransomware
- 7 - Fake news
- 8 - Social Network
- 9 - BEC (Business Email Compromise) frauds
- 10 - Online & Mobile banking
- 11 - Shopping Online
- 12 - GDPR

The Cyber Security Awareness for Mobile is a specific and up-to-date course capable of guaranteeing good practices to avoid all those activities that expose us to different cyber threats. Most attacks take place against our smartphones and companies neglect mobile security.
- 1 - Smart working
- 2 - Password patterns
- 3 - USB memories
- 4 - Wi-Fi networks
- 5 - Bluetooth technology
- 6 - Geolocation services
- 7 - Smartphone: malicious app and frauds
- 8 - Smartphone: lock Pattern and Face ID
- 9 - Smartphone: rooting and jailbreaking
- 10 - Smartphone: understand if your smartphone has been infected
- 11 - Smartphone: backup and hard reset
- 12 - Further reading

A series of stories and situations that illustrate in a practical and engaging way the most common cyber threats, the best practices to prevent them and the solutions to manage them. Thanks to Piero's story, you will be able to identify with a real situation and better understand how to protect your digital life.
- 1 - Soulder Surfing + Dumpster Diving
- 2 - A trip around Dublin
- 3 - Return from Dublin
- 4 - Month-end tasks
- 5 - All problems come to a head
- 6 - The suspicious email
- 7 - The CEO scam
- 8 - The strange phone call
- 9 - The voice message
- 10 - The unrepeatable offer
- 11 - The mobile phone ha no reception
- 12 - The QR Code
It complies with the training objectives set by the NIST directive and the National Plan for Cyber Protection and IT Security, and conforms to the NIST SP 800-171 directive.

