CINXE.COM
Online Cybersecurity Training | Flexible and Expert-Led Courses | Cyber Risk GmbH
<!DOCTYPE html> <html lang="en"> <head> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-EY64M9QQ17"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-EY64M9QQ17'); </script> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Online Cybersecurity Training | Flexible and Expert-Led Courses | Cyber Risk GmbH</title> <meta name="description" content="Cyber Risk GmbH offers expert-led online cybersecurity training programs, providing flexible learning options for professionals. Our online courses cover cybersecurity, compliance, and risk management, designed to help individuals and organizations stay ahead of cyber threats."> <meta name="keywords" content="online cybersecurity training, flexible cybersecurity courses, expert-led cybersecurity training, online compliance courses, cyber risk management online training, remote cybersecurity training, online cyber threat training, Cyber Risk GmbH online courses, cybersecurity certification online, online cybersecurity training Switzerland"> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <style> .wrapper-banner { background: url("https://www.cyber-risk-gmbh.com/Online_Training.jpg"); background-size: cover; background-position: center; } </style> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.cyber-risk-gmbh.com/"> <img src="images/logo/CyberRisk5FINALFINAL.png" alt="Cyber Risk GmbH, Cyber Risk Awareness and Training" width="240" class="img-responsive"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.cyber-risk-gmbh.com/About.html">About</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Training.html">Training</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Board.html">For The Board</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Assessment.html">Assessment</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Reading_Room.html">Reading Room</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Contact.html">Contact</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Cyber_Risk_Links.html" target="_blank">Cyber Risk Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <br> <br> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>Online Cybersecurity Training</h1> <br> <br> <p class="text-left"><b>Overview </b></p> <p class="text-left">The world of cyber security and privacy is constantly changing. Today, effective cyber security programs involve the entire organization and not only the IT or the information security teams. Employees that have access to critical assets of an organization, have become primary targets of cyber attacks. Those that have access to technology and organizational assets are also responsible for the protection of those assets. Are they fit and proper to handle this responsibility? Do they have the awareness and skills necessary to meet these expectations?</p> <p class="text-left">Our training programs have the objective to help managers and employees not only understand the cyber security threats, but also their responsibility towards protecting the assets they handle. We explain how to proactively apply good cyber security practices, how to identify threats and attacks, and what to do to protect themselves and their organizations. Cyber security is a shared responsibility.</p> <br> <p class="text-left"><b>Online Training Formats</b></p> <p class="text-left">All our training programs are also offered in the formats of “Online Live Training” and “Video-Recorded Training”.</p> <br> <p class="text-left"><b>Online Live Training </b></p> <p class="text-left">The training will be delivered live through an online platform. We tailor our method of delivery (interactive, non-interactive, etc.) to the needs of our clients.</p> <br> <p class="text-left"><b>Video-Recorded Training </b></p> <p class="text-left">We tailor the training content according to the client's needs, and we record it in a professional studio. The training material (including any subsequent updates) is licensed by Cyber Risk GmbH to the client for training purposes. The client may incorporate the recorded videos to their internal learning platform and make them available on-demand.</p> <br> <p class="text-left"><b>Terms and conditions </b></p> <p class="text-left">For the terms and conditions you may visit: <a href="https://www.cyber-risk-gmbh.com/Terms.html" target="_blank">https://www.cyber-risk-gmbh.com/Terms.html</a> </p> <br> <p class="text-left"><b>Duration</b></p> <p class="text-left"> We tailor each program to the needs of the client. We can provide trainings as short as 30 minutes, but we can also deep dive into our topics for 1-2 days. The duration depends entirely on the needs, the agreed content of the program and the case studies.</p> <br> <p class="text-left"><b>Our Education Method</b> </p> <p class="text-left">In the core of our training approach is to ensure that our delivery is relatable, engaging, and interesting. We always make cyber security training an exciting adventure for our attendees. Our instructors have trained thousands of employees across the globe and have the skills and experience necessary to ensure that attendees will enjoy the process and they will learn. Our training programs can have workshop elements that get everyone involved.</p> <br> <p class="text-left"><b>Our Instructors</b> </p> <p class="text-left">They are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to the client's needs. The client will always know up front who the instructor of the training program will be.</p> <br> <hr> <br> <p class="text-left"><b>Our Training Programs:</b></p> <br> <br> <img src="1_Information_Security_Awareness_Training_B.jpg" alt="Information Security Awareness Training" class="img-responsive"> <br> <p class="text-left"><b>1. Information Security Awareness Training:</b> Managers and employees must understand the risk of cyber threats, and why cyber security is a shared responsibility. Process owners and persons having access to systems and data learn practical cyber security best practices to help protect themselves and their organization from cyber threats. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/1_Information_Security_Awareness_Training.html" target="new">https://www.cyber-risk-gmbh.com/1_Information_Security_Awareness_Training.html</a> </p> <br> <hr> <br> <img src="2_Social_Engineering_Awareness_Defense_B.jpg" alt="Social Engineering Awareness Defense" class="img-responsive"> <br> <p class="text-left"><b>2. Social Engineering, Awareness and Defense:</b> About 80% of cyber attacks are being initiated or executed through social engineering. In this course, managers and employees learn to identify social engineering attacks, recognize the red flags, and respond to psychological exploitation from threat actors. Attendees learn to better protect the systems, assets, and information they handle. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/2_Social_Engineering_Awareness_Defence.html" target="new">https://www.cyber-risk-gmbh.com/2_Social_Engineering_Awareness_Defence.html</a></p> <br> <hr> <br> <img src="3_Practical_Social_Engineering_Defense_Protection_B.jpg" alt="Practical Social Engineering" class="img-responsive"> <br> <p class="text-left"><b>3. Practical Social Engineering. Defense and Protection of Sensitive Information: </b> Sensitive or classified information is often a powerful, high-value asset that attracts many attackers. Governmental or non-governmental organizations and companies handling this information acquire the skills and knowledge necessary to identify potential threats and respond to them. They also learn to be proactive in avoiding information leaks. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/3_Practical_Social_Engineering.html" target="new">https://www.cyber-risk-gmbh.com/3_Practical_Social_Engineering.html</a></p> <br> <hr> <br> <img src="4_Insider_Threats_Awareness_Training_B.jpg" alt="Insider Threats Awareness Training" class="img-responsive"> <br> <p class="text-left"><b>4. Insider Threats Awareness Training: </b> When insiders blend illicit activities with licit business and harm their own organization, other employees often become silent witnesses of this activity. We help employees understand the insider threat, recognize the red flags of insider threat activity, respond to it by informing their organization, and more. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/4_Insider_Threats_Awareness_Training.html" target="new">https://www.cyber-risk-gmbh.com/4_Insider_Threats_Awareness_Training.html</a> </p> <br> <hr> <br> <img src="5_The_target_is_the_bank_B.jpg" alt="Cybersecurity training for banks" class="img-responsive"> <br> <p class="text-left"><b>5. The target is the bank. From hacking to cybercrime to cyberespionage:</b> The number of cyber-attacks directed at financial institutions of all sizes is growing. Cyber risks, like reputational and financial risks, affect a bank’s bottom line. We help key people in financial institutions understand how cyber-criminals operate, the exploitation of IT vulnerabilities or the use of deceptive or manipulative attacks on people to gain access to facilities, systems, and the critical infrastructure. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/5_The_Target_Is_The_Bank.html" target="new">https://www.cyber-risk-gmbh.com/5_The_Target_Is_The_Bank.html</a> </p> <br> <hr> <br> <img src="6_Cybersecurity_training_hospitality_B.jpg" alt="Cybersecurity training for the hospitality industry" class="img-responsive"><br> <p class="text-left"><b>6. Cybersecurity training for managers and employees working in the hospitality industry: </b> For decades, when we were using the words “hotel security”, we were usually referring to “physical security”. It was all about guest protection, locks, safes, and surveillance. Guests and hotel employees today expect that the same level of protection extends to the digital assets that reside not only on their laptops and smartphones, but also on the hotel’s systems. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/6_Cybersecurity_Training_Hospitality_Industry.html" target="new">https://www.cyber-risk-gmbh.com/6_Cybersecurity_Training_Hospitality_Industry.html</a> </p> <br> <hr> <br> <img src="7_Cybersecurity_training_aviation_B.jpg" alt="Cybersecurity training for the aviation industry" class="img-responsive"><br> <p class="text-left"><b>7. Cybersecurity training for managers and employees working in the commercial and private aviation industry: </b> The commercial and private aviation must comply with cyber security and privacy laws and regulations and must follow international standards and best practices that protect their customers and employees. Aircraft cybersecurity involves the policies, procedures, awareness and training for the prevention, detection, and response to deliberate malicious acts that target systems, persons (via social engineering) and data, to compromise an aircraft's systems and staff. </p> <p class="text-left"> You may visit: <a href="https://www.cyber-risk-gmbh.com/7_Cybersecurity_Training_Aviation_Industry.html" target="new">https://www.cyber-risk-gmbh.com/7_Cybersecurity_Training_Aviation_Industry.html</a> </p> <br> <hr> <br> <img src="8_Cybersecurity_training_healthcare_B.jpg" alt="Cybersecurity training for the healthcare industry" class="img-responsive"><br> <p class="text-left"> <b>8. Cybersecurity training for managers and employees working in the healthcare industry: </b> In 2020, hospitals, healthcare providers and medical facilities were struggling to handle not only the influx of patients suffering from Covid-19, but also a surge of ransomware attacks, as criminals (including state-sponsored groups) exploited the crisis to hit the sector. Month after month, there are many successful cyberattacks on the healthcare industry. Cybersecurity breaches that expose sensitive data from thousands of people are especially important, as the privacy rules have become a nightmare for healthcare providers.</p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/8_Cybersecurity_Training_Healthcare_Industry.html" target="new">https://www.cyber-risk-gmbh.com/8_Cybersecurity_Training_Healthcare_Industry.html</a> </p> <br> <hr> <br> <img src="9_GDPR_B.jpg" alt="General Data Protection Regulation (GDPR) Training" class="img-responsive"><br> <p class="text-left"> <b>9. The General Data Protection Regulation (GDPR) for EU and non-EU based companies. The new privacy and security requirements: </b> The GDPR is applicable for EU and non-EU companies that are offering goods or services to identified or identifiable EU natural persons ("data subjects"), organizations processing personal data of EU data subjects, or organizations that monitor the online behaviour of EU data subjects. Non-EU companies that have no local presence in the EU are also in the scope of the GDPR legislation. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/9_GDPR.html" target="new">https://www.cyber-risk-gmbh.com/9_GDPR.html</a> </p> <br> <hr> <br> <img src="10_GDPR_Board_B.jpg" alt="The General Data Protection Regulation (GDPR) Board Training" class="img-responsive"><br> <p class="text-left"><b> 10. The General Data Protection Regulation (GDPR) for the Board of Directors and the CEO of EU and non-EU based companies:</b> The CEO and the Board must understand the new obligations, must be able to support their organization, and ensure the consistent application of the regulation. </p> <p class="text-left">You may visit: <a href="https://www.cyber-risk-gmbh.com/10_GDPR_Board.html" target="new">https://www.cyber-risk-gmbh.com/10_GDPR_Board.html</a> </p> <br> <hr> <br> <img src="11_Your_Program_B.jpg" alt="Cybersecurity Training" class="img-responsive"><br> <p class="text-left"><b>11. Your program: </b> Let us know what you have in mind. We can develop and tailor a program to meet your requirements. You may contact us to discuss your needs. </p> <br> <p class="text-left">You may also read:</p> <p class="text-left"> <a href="https://www.cyber-risk-gmbh.com/How_Psychology_and_Behavioural_Science_Can_Help_You_Build_Your_Cybersecurity_Culture.html" target="_blank">https://www.cyber-risk-gmbh.com/How_Psychology_and_Behavioural_Science_Can_Help_You_Build_Your_Cybersecurity_Culture.html</a></p> <p class="text-left"> <a href="https://www.cyber-risk-gmbh.com/Wie_Psychologie_und_Verhaltenswissenschaft_ihnen_beim_Aufbau_ihrer_Cybersecurity_Kultur_helfen_k%C3%B6nnen.html" target="_blank">https://www.cyber-risk-gmbh.com/Wie_Psychologie_und_Verhaltenswissenschaft_ihnen_beim_Aufbau_ihrer_Cybersecurity_Kultur_helfen_k%C3%B6nnen.html</a></p> <br> <hr> <br> <br> <br> <h3>Cyber Security Training</h3> <p>Cyber security is ofter boring for employees. We can make it exciting.</p> </div> <br> <div class="projects-row"> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/1a.png" alt="Online Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Online Training </h3> <p class="col-md-10 text-left">Recorded on-demand training and live webinars.</p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Online_Training.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/2a.png" alt="In-house Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">In-house Training </h3> <p class="col-md-10 text-left">Engaging training classes and workshops. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/In_House_Training.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/3a.png" alt="Social Engineering Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Social Engineering</h3> <p class="col-md-10 text-left">Developing the human perimeter to deal with cyber threats. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Social_Engineering.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/4a.png" alt="For the Board Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">For the Board</h3> <p class="col-md-10 text-left">Short and comprehensive briefings for the board of directors. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Board.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/5a.png" alt="Cybersecurity Assessment" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Assessments</h3> <p class="col-md-10 text-left">Open source intelligence (OSINT) reports and recommendations. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Assessment.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/6a.png" alt="High Value Targets Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">High Value Targets</h3> <p class="col-md-10 text-left">They have the most skilled adversaries. We can help. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/High_Value_Targets.html">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> </div> </div> </div> </div> <br> <br> <br> <br> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Which is the next step?</h3> </div> <div class="countdown-row"> <div class="countdown-block"> <h2>1</h2> <strong>You contact us</strong> </div> <div class="countdown-block"> <h2>2</h2> <strong>We discuss</strong> </div> <div class="countdown-block"> <h2>3</h2> <strong>Our proposal</strong> </div> <div class="countdown-block"> <h2>4</h2> <strong>Changes and approval</strong> </div> <div class="countdown-block"> <h2>5</h2> <strong>We deliver</strong> </div> </div> </div> </div> </div> <br> <br> <br> <br> <br> <br> <br> <br> <br> <img src="https://www.cyber-risk-gmbh.com/Epilogue3.jpg" alt="Cyber Risk GmbH, Cyber Risk Awareness and Training" class="img-responsive"> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>