Data centre
Cyber Security
Audits and training
Telco

A wide range of audit tests and training opportunities for your employees.




Team of experienced auditors


Effective auditing methods


Audit findings in the form of reports


Trainers with extensive experience


Over 1000 people trained
Audits

Types of audits:

  • Vulnerability Management (VM) Vulnerability scans.
  • Profiled penetration tests.
  • Penetration tests in the model: Black Box, Grey Box, White Box.
  • Performance tests.
  • Security audits of infrastructure components.
  • Security audit of configuration.
  • Analysis and audits of application code.
  • Hardening of operating systems, network devices, databases, application servers.
  • Threat modelling.
  • Audit of compliance with specific elements of ISO/IEC 27001.
  • Audit of compliance with specific elements of the National Interoperability Framework.
  • Audit of policies, procedures and internal documentation related to IT.
Training

Security Awareness. Safe worker online
Scope of topics:

  • Threats in cyberspace to the employee and the organisation's resources - current trends.
  • Sociotechnical mechanisms of cybercriminals.
  • Best practices for protecting yourself from specific threats, including building effective passwords, creating backups.
  • Modes of malware and other attacks on banks and how to respond to emerging threats.
  • Discussion of the duty to protect information and secure the working environment emphasises individual responsibility for maintaining information security and the institution's reputation and customer confidence.
  • Consequences of an attack on the institution.
  • Examples of tools to help defend against attacks.
  • The transfer of threats between private and business areas.
  • Prevention of safe use of the Internet and LAN.
Data centre
Cyber Security
Audits and training
Audits

Types of audits:

  • Vulnerability Management (VM) Vulnerability scans.
  • Profiled penetration tests.
  • Penetration tests in the model: Black Box, Grey Box, White Box.
  • Performance tests.
  • Security audits of infrastructure components.
  • Security audit of configuration.
  • Analysis and audits of application code.
  • Hardening of operating systems, network devices, databases, application servers.
  • Threat modelling.
  • Audit of compliance with specific elements of ISO/IEC 27001.
  • Audit of compliance with specific elements of the National Interoperability Framework.
  • Audit of policies, procedures and internal documentation related to IT.
Training

Security Awareness. Safe worker online
Scope of topics:

  • Threats in cyberspace to the employee and the organisation's resources - current trends.
  • Sociotechnical mechanisms of cybercriminals.
  • Best practices for protecting yourself from specific threats, including building effective passwords, creating backups.
  • Modes of malware and other attacks on banks and how to respond to emerging threats.
  • Discussion of the duty to protect information and secure the working environment emphasises individual responsibility for maintaining information security and the institution's reputation and customer confidence.
  • Consequences of an attack on the institution.
  • Examples of tools to help defend against attacks.
  • The transfer of threats between private and business areas.
  • Prevention of safe use of the Internet and LAN.
Telco
Innovations
Zapraszamy do kontaktu

005-secure-shield nask logo
Witaj, strona NASK SA wykorzystuje pliki cookies do analityki (google analytics, facebook) na zasadach określonych w polityce prywatności.
Jeżeli nie wyrażasz na to zgody, prosimy Cię o wyłączenie obsługi cookies w przeglądarce lub opuszczenie strony.