A cyber-risk awareness course, customized for your operational environment. Give your team hands-on experience of how to handle cyber-risk by learning in a real-life simulation environment.
This course is suitable for personnel at any level, from higher management to entry-level staff. The ideal training team has a mix of students with different backgrounds, from different levels of the decision-making hierarchy, who work at different locations and/or within different departments. These varied viewpoints and experiences will foster discussions about:
For each scenario a link will be made to the corresponding sections of the ISO/IEC 27001 standard, as well as your organization’s security regulations and directives.
Learn how to identify potential cyber incidents and contribute to incident response.
The course is designed for technically oriented personnel from different disciplines who are not necessarily involved in systems management; for example, members of technical development teams, software developers, system engineers, system administrators, system operators and operations managers.
Learn how to analyze incidents in depth and propose measures to prevent similar events occurring in future.
The course is primarily for people working in systems support functions or supporting applications who may be called upon when there is a suspected incident. This course will teach the skills necessary to quickly identify a cyber-incident and react appropriately while correctly preparing for a forensic analysis.
Master the risk management practices and security controls to be applied from the early stages of project delivery.
The course is designed for programme and project planners. It focuses on the need to consider security requirements from the early stages of design and how integrated, targeted security controls can result in an appropriately secured and resilient outcome for a given cost. Students will have the opportunity to see how the methodology is implemented and the advantages of a security-by-design approach utilizing efficient tools.
Learn to defend your organization from real-time attacks in the safety of a virtual environment.
The course is for technical personnel who would like to enhance their capabilities for incident handling by allowing them to practice their skills and organizational procedures during real-time events. It provides lifelike experiences in incident response and forensics investigation using real-time attacks in the advanced emulation environment of RHEA’s Next Generation Cyber-Range to help prepare students for real-life events.
Our courses are run by expert cybersecurity specialists with international experience.
Created by the team who designed the curriculum for the European Space Agency Cyber-Range project.
We train using our advanced Cyber-Range emulation platform, customized to match your organization’s environment.
Each course has been carefully designed by experienced cybersecurity professionals to enable your staff to address growing cyber risks, both from external cyberattacks and cyber threats from within your own organization. When you book, we then customize the course for your organization, so you can see the threats you face and understand exactly how to respond.
We deliver our courses at our dedicated training facility based at the European Space Agency’s European Space Security and Education Centre (ESEC) in Redu, Belgium. This is designed to accommodate up to 20 people, with workstations for each trainee. We can also run our courses anywhere that has suitable equipment available for all trainees in a single physical location.
Our cybersecurity training programme uses a virtual environment for hands-on training, developed from our experience delivering the European Space Agency (ESA) Cyber-Range, with courses created by the team who designed the ESA curriculum. Now your organization can benefit from the same advanced training environment and the experience of our cybersecurity experts.
Get in touch to find out more about our cybersecurity training courses and how we can help you.
Get in touchWebsite by ELDO™