HACK ME,
 IF YOU CAN
practical course on protection against cyber threats
BOOK TRAINING
Problem
OVER 13 YEARS
44 BILLION ITEMS OF DATA HAVE LEAKED 
FROM COMMERCIAL COMPANIES AND THE PUBLIC SECTOR WORLDWIDE
THIS INCLUDES 14 BILLION RECORDS IN THE LAST YEAR ALONE.
C
C
!
In 8 out of 10 cases, when data loss occurs in businesses, it is the fault of employees.
Unauthorised access, blackmail or publicising of the consequences of disclosing confidential sources — these are actions that people are afraid to talk about openly.
DIGITAL ILLITERACY, NEGLIGENCE IN PROTECTION OF PERSONAL AND WORK DATA, FEAR OF REPRIMAND FROM MANAGEMENT — THESE CAN COST BUSINESSES MILLIONS OF DOLLARS, WITH THREATS OF CRIMINAL PROSECUTION OF TOP EXECUTIVES, TO THE EXTENT OF TERMINATION OF THE COMPANY’S FUNCTIONING ON THE MARKET.
C
What can we do?
How do cyber-criminals operate, when attempting to access confidential information?
How do social engineers influence you?
How can you effectively deal with and neutralise 90% of cyber threats?
Y
B
Our workshop will cover this and much more in detail, as well as looking at
WE EQUIP YOUR EMPLOYEES FOR THE BATTLE
effective tools for protecting personal data and trade secrets.
Programme
TRAINING
MODULES
1
Lecture-based part
EVERYTHING YOU WANT TO KNOW BUT ARE AFRAID TO ASK
The dangers of digital reality, the possibilities of the black market in data, the modern terms of hackers, social engineering processes and other secrets of this field.
2
Practical case study
SOCIAL
MEDIA NETWORKS
We demonstrate the level of information accessibility: every participant will independently put together a “person profile” from open sources, in just 3 clicks.
3
Masterclass
SECURE
PHONE
Creating a device that is difficult to identify with its owner for secure data transfer; the personnel directly in the field will minimise the risks of loss of sensitive data, by using simple operations.
4
Game module
THE CONTEMPORARY ART OF HACKING: DON’T LET THEM GET YOU
We will test the ability of each of your employees to distinguish phishing from genuine verification dialogues for email and other services, as well as their resistance to the tricks used by social engineers.
E
R
TRAINING
COST
Basic
  • 10 people
  • 4 hours
  • set of technical equipment for each participant
$3000
BOOK TRAINING
Special
  • Teams of 40 people
  • Repeat training for companies
  • Training courses in other cities
  • The price is calculated individually
CALCULATING
READY
TO NEUTRALISE
OF CYBER THREATS
take our training!
90%