Cybersecurity Basics – Safe Digital Behavior for Employees (ZKB1A)

Cybersecurity, ICT Security

This one-day course shows that internet security is not just about passwords but about building correct digital habits, recognizing common cyber threats, and understanding basic organizational rules. The course explains NIS2-related requirements in plain, practical terms.

Participants will learn key routines to prevent incidents, from managing credentials and spotting phishing to using cloud services safely and handling suspected incidents. The session is hands-on and focused on clear steps and NIS2-compliant measures.

Location, current course term



Brno + online (volitelně)
2/13/2026 - 2/13/2026 CZECH
Order
2/27/2026 - 2/27/2026 CZECH
Order
4/24/2026 - 4/24/2026 CZECH
Order
Praha + online (volitelně)
2/13/2026 - 2/13/2026 CZECH
Order
2/27/2026 - 2/27/2026 CZECH
Order
4/24/2026 - 4/24/2026 CZECH
Order
Custom Customized Training (date, location, content, duration)

The course:

Hide detail
  • Basics of digital security and employee responsibility
    1. Current cyber threats and why they matter to every employee
    2. Digital hygiene at work and at home
    3. The employee's role in protecting the organization (human factor)
    4. Why cybersecurity is addressed from the NIS2 perspective
  • Credentials, identity and secure login
    1. Creating and using strong passwords
    2. Password management and risks of reuse
    3. Multi-factor authentication (MFA) – when and why
    4. Secure logins to company systems and services
  • Phishing, fraudulent messages and dangerous attachments
    1. Phishing, smishing and vishing – common scenarios
    2. Practical examples of fraudulent emails and websites
    3. Risks of attachments and documents (macros, archives, PDFs)
    4. How to respond to a suspicious message
  • Cloud, data sharing and working with documents
    1. Risks of sharing data in cloud services
    2. Correct settings for access and permissions
    3. Difference between synchronization and backup
    4. What ordinary users can and cannot control
  • Devices, USB and working outside the office
    1. Risks of unknown USB drives and external devices
    2. Clickless attacks and hidden threats from physical media
    3. Security for laptops, mobile phones and work accounts
    4. Working from home, public Wi‑Fi and basic safe habits
  • Backups and data recovery – the user's role
    1. Why backups are key during cyber incidents
    2. What a backup is not (cloud ≠ backup)
    3. How users should act when data is lost or damaged
  • Updates and device security
    1. Why updates are critical for security
    2. Risks of postponing updates and restarts
    3. User responsibility versus IT department
  • Cyber incident handling and reporting
    1. What is a cyber incident and how to recognize it
    2. Immediate steps when an incident is suspected
    3. Incident reporting – who, how and why
    4. What not to do during an incident (deleting emails, hiding, "fixing")
    5. Impact of an incident on the organization and individuals
  • Practical model situations
    1. Identifying threats in everyday work
    2. Model scenarios (phishing, USB, lost or stolen device)
    3. Principles of personal safe behaviour
Assumed knowledge:
Basic computer skills.
Schedule:
1 day (9:00 AM - 5:00 PM )
Course price:
196.00 € ( 237.16 € incl. 21% VAT)
Language: