EN | PL | ES | IT | RO

TRAINING


MSME cybersecurity expert

Before you start learning, read about the MSME Cybersecurity Expert professional profile and career path.


Courses



ICT Tools to prevent and recognize Cyber Risk in the Digital World

In this module we will learn about the main cyber threats to SMEs and entrepreneurs before and during the Covid pandemic. We will also learn about tools to prevent and identify cyber attacks....

Go to course



Basics of Cybersecurity. Comprehending the Fundamental Rules of Cybersecurity

In this module we will review some of the main cyber threats to businesses. We will learn about the stages of a cyber-attack in order to be able to act in any of them. We will also learn how to protect our company from cyber attacks before, during and after they occur....

Go to course



Crisis management — they hacked me, what next?

This module will introduce you to cyber crisis management. In the first unit, you will get to know how to identify a crisis. In the second unit, you will receive a set of best practices for responding to a cyber crisis, whether you run a sole proprietorship or employ people. The third unit focuses on the recovery of your business after a cyber crisis. You'll get specific tips based on the case study. ...

Go to course



Human-centered design vs. company priorities — guidelines

This course is about human-centered design in the context of taking care of company priorities. In the first unit, you will learn what human-centered design is and how to use it in cybersecurity management. In the second unit, you will learn what bug bounty programs are. We will show you how to create and use them to build security in your company. You will also get practical tips based on the case study. ...

Go to course



Social engineering — users are the weakest link

This module is about social engineering. In the first unit, you will find a definition of the term and all the basics. In the second unit - starting from a story - we will introduce you to the techniques used by attackers. You will learn the characteristics of phishing, vishing, and baiting. In the third unit, we will summarize all the content. You will get practical tips that will help you to take care of your safety in the network. ...

Go to course



EntreComp for cyber risk-readiness

In the context of this training module, readers will be introduced to the EntreComp Framework and how it can be of relevance for cyber security and IT proficiency. Specifically, the EntreComp Framework will be our reference model to help targets in being more responsive and alert to cyber threats, enhancing their awareness of cyber-hygiene and being overall more competitive in all domains of business. ...

Go to course



Coping with uncertainty, ambiguity & risk in a cyber-environment

new agenda for risk management as a business functions that permeates transversely all task and activates while responding to the new urgent need of safeguarding businesses from cyber threats. We will do that by sharing trustworthy, robust and reliable managerial frameworks that applies traditionally to all business functions....

Go to course



The European Digital Competence Framework: DigComp 2.1

The DigComp 2.1 looks into IT skills and digital competences in high-demand not only in the labour market, but also in all domains of civil society and active citizenship. With that said, users can work on the DigComp as a reference and support tool to reignite and foster their understanding and overall proficiency with the aforementioned 21 competences while self-assessing their progress and the ones achieved by their employees/workers. DigComp e...

Go to course



European landscape for cybersecurity: policies, strategies and support resources

In the context of this module, readers have the opportunity to familiarise with sources and resources from EU institutions to remain updated on latest trends on cybersecurity, scale and scope of cyber hygiene domain in EU, training and education opportunities, evidence-based support material, new emerging dynamics on cybersecurity that are of relevance for businesses and organisations. ...

Go to course



Understand security to keep cyber threats away from your SME

In today technologically evolved business landscape, there is a drastic increase in IT security breaches worldwide. As years have passed, the level of threats has also been continuously evolving, which is making it even more difficult for enterprises and government agencies to find the right cybersecurity solutions....

Go to course



Ethical hacking - in times of cybernetic attacks and digital threats

The course introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools used by hackers and security professionals....

Go to course



Toolkit



Improve your cybersecurity management plan — best practices

This toolkit contains 15 best practices to help you improve your company's cybersecurity management plan. You will learn how to create strong passwords and whether a password is the best (and only) solution for protecting your data. You will get instructions on how to update the devices and software you use for business purposes. Finally, we will tell you what else you can do to protect yourself and your business....

Go to toolkit



How to recognize credible URLs? Guidelines

In this toolkit, you will find 5 guidelines that show you to distinguish trustworthy URLs from those that may compromise your business....

Go to toolkit



Your inventory list. Template

In this toolkit, you will find 6 templates for an inventory list in a table format. You can use each template for your company's use, either by editing it on your computer or printing and handwriting the data....

Go to toolkit



Essential router security tips. Enhance your network security with few basic steps

In this toolkit, you will find 6 simple rules to increase the security of your router — and, in addition, your entire corporate network. You don't need an expert's help to implement those tips. You can do it yourself....

Go to toolkit



Cybersecurity on a budget. How to protect your business when every cent counts

Description In this toolkit, you will find a set of tools to increase your online security, which we recommend especially for micro and small businesses with limited budgets. You can also use these tools for private purposes. We have selected all solutions considering the actual financial possibilities of micro and small companies. ...

Go to toolkit



CONSORTIUM


team img
team img
team img



team img
team img
team img
The European Commission's support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
Legal description – Creative Commons licensing:
The materials published on the CyberMSME project website are classified as Open Educational Resources' (OER) and can be freely (without permission of their creators): downloaded, used, reused, copied, adapted, and shared by users, with information about the source of their origin.