The purpose of the training is to introduce different cyber-attack methods. By knowing these an organization can prevent serious threats, such as taking over an e-mail address, stealing personal data and trade secrets, or even taking control of the entire organization's infrastructure and business.
Fraudulent e-mails (phishing/spoofing)
|
|
|

Password attacks
|
|
|
|
|
|
|
|
|
|
|

Spyware and adware
![]() |
|

Public Wi-Fi without password
|
|
|

Spam
|
||
|

Social Engineering
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|

Security solutions
|
|
|
|
|
|
|
|
|
Time of training: agreed with the customer
Trainer: Tarmo Kumar/ Maido Juss
Duration of training: 2 hours
Place of training: online
Number of participants: up to 20 people in one group or as agreed with the customer
Investment: €600 + VAT
Cyber-attack simulation
Before the cyber security training, we recommend going through a cyber attack
simulation. The attack simulation enables to start realistic attack scenarios that enable to identify and find vulnerable users before an actual attack impacts the whole organisation.
The simulation tests the security measures with the help of various user-aimed techniques,
including:
- Getting identification information: the attacker sends a message including a URL directing users to a website (often a well-known brand). The goal is to steal sensitive information.
- Malware attachment: the attacker sends the recipient a message with an attachment that, once opened, executes a random code on the user’s device, so that the attacker can dig even deeper in the company network.
- Attached link: a hybrid message where the attacker sends an e-mail with a URL attached.
- Malware link: the attacker sends a message containing a link to a file sharing site known by the user (e.g., SharePoint Online or Dropbox). Clicking on the link releases a random code that enables the attacker to infiltrate into the network of the company.
- Drive-by-URL: the attacker sends a message containing a URL that, once clicked, takes to a web page that in turn attempts to execute a background code to collect information about the recipient or launch a random malicious code in their device.
A prerequisite of the simulation is existing license of Microsoft Defender for Office 365 (Plan2).
It is possible to acquire one just for the simulation period, which is 1 month.
During the simulation, relevant settings are done in the Microsoft 365 environment, and the simulation is run for 1 month, after which a report is created.
Investments:
Microsoft Defender for Office 365 (Plan2): €5 per user for 1 month
Setup of service and report of results: €600