CYBERWISER.eu Basic Offering Level

 

Why choose CYBERWISER.eu Basic?


CYBERWISER.eu Basic is designed for users who have already received a cybersecurity training and are familiar with basic cybersecurity threats and best practices. With CYBERWISER.eu basic, you will learn about Context estabilishment, Cyber-risk assessment and Cybersecurity and risk awareness. It is also the first offering level that allows you to try existing Cyber Range training scenarios composed by up to 10 elements (Virtual Machines/Virtual Networks). At the end of the courses, you will receive a Diploma that certifies the successful completion of the offering level and you will also automatically be included in the CYBERWISER.eu Cybersecurity professional register (CyPR).

Who is it for?

cybersecurity training students

Institutions of Higher Education and Research Centres 

 

cybersecurity training SMEs

SMEs 

 

cybersecurity training Large Enterprises

Large Enterprises 

 

cybersecurity training Public Sector

Public Sector Organisations 

 

Basic Course Description

 

Course title Learning goals

Describe target of analysis, level 1  

Learn how to describe the scope and focus of the target system under analysis based on a given context and how to document the target of analysis.

Identify and describe security assets, level 1 

Learn to analyse the target description to identify and document asset-relevant information that are to be considered in the cyber-risk assessment.

Identify and describe threat profiles and high-level risks, level 1 

Learn a structured approach to organize risk-related information based on the target description and the basic constructs of the risk modelling language CORAS.

Identify risks, level 1 

Learn the basic usage of the CORAS modelling language to identify and document cyber-risks.

Awareness of Password Weakness with hands-on training 

Learn hands-on training in demonstrating how weak passwords are exploited.

 

 

What are you going to learn?

 

  • How to deal with the most common Cybersecurity risks and threats (Phishing, Password Weakness, Ransomware, Data Leakage and Insider Threats).
  • In the context establishment section, you will learn how to identify threats’ profiles and high-level risks.
  • The Cyber-risk assessment course will address risk identification.
  • Cyber Range training scenarios composed of up to 10 elements (Virtual Machines/Virtual Networks) will allow you to try out and test scenarios. 

 

 

What they say about us

I learned about many concepts related to web application vulnerabilities, from basic to advanced, I would definitely recommend it to other people as it is a very easy user experience. The predefined path is also an added value if you're new to this. - Luca, University of Pisa Student