UA

Digital Security Fundamentals

Cybersecurity training program for companies and non-tech teams

Submit an application

Digital Security Fundamentals

Program Start: upon request
Duration: 2 hours — lecture and training simulation
Format: online
Language of Instruction: Ukrainian

about

In times of massive cyberattacks, cybersecurity has become an essential soft skill — even for employees who don’t work directly with security teams or in high-risk industries. That’s why we’ve developed a special program for teams that will help quickly raise the basic level of cybersecurity in your company. This program includes a lecture on the main cyber risks to be prepared for in 2025 and a training simulation — a quick test of the knowledge acquired.

what we'll teach

key cyber threats and how to recognize them
how to respond to a digital incident
basics of personal cybersecurity: accounts and access
how to implement digital hygiene in workplace and personal life

For Whom

non-technical teams who need to acquire basic knowledge about digital hygiene

companies taking their first steps toward implementing cybersecurity practices

department managers who want to improve cybersecurity in their teams

organizations that have already faced cyber threats (phishing, data leaks, account hacking, etc.)

instructor

Oleksii Baranovskyi

President of ISACA Kyiv Chapter — Information Systems Audit and Control Association. Expert with 15+ years of experience in the field of information and cybersecurity. Worked as a Security Analyst, CISO.
Ph.D. in Information Technology, Associate Professor at NTUU Kyiv Polytechnic Institute, Senior Lecturer at Blekinge Institute of Technology in Sweden.

program's benefits

a short, productive format

ability to customize the program upon request

accessibility — each team member will understand the content, regardless of their seniority level

training simulation with a detailed report for the requestor

customization options

We can customize the program to your needs to make learning even more effective, including:

⚫️ Breaking the lecture into several bite-sized lessons

⚫️ Changing the type of learning practice

⚫️ Including case studies or incidents from your company or domain into the training

program's content

Introduction to Information Security

Common cyber threats

Accounts: vulnerabilities and ways to protect them

Data: backups, encryption, and secure transfer

Digital hygiene

Attack inside the house: algorithm of actions if an incident has already occurred

Apply for the training here, and we do our best to solve your cyberhygiene request

I have a promo code
Thank you! We will contact you shortly.
We use cookies to improve your experience.