Individual profiles, documentation, and certifications.
Training through virtual reality.
Examples of various types of cyber attacks and how to defend against them.
Tips that your employees can immediately apply in practice.
We will explain the training and agree on the scope of the training together.
The actual training takes place using virtual reality.
During the training, safety tips and advice are provided.
Final evaluation of the training, including review and certification.