Training Cybersecurity Roles, Processes & Operating System Security
Practical information about training
- CATEGORY: Security
- SUBCATEGORY: Technical and operational security
- TRAINING CODE: 8H111G
- DURATION: 1 day
- PRICE INFORMATION from: 2000 PLN net
- LANGUAGE OF TRAINING: polish
- FORM OF IMPLEMENTATION: stationary, online
Training description
Learn the key roles and processes involved in cyber security.
Participant profile
The course is designed for those wishing to gain basic knowledge of cyber security or as the second course in a series of courses aimed at acquiring the skills necessary to work in the field of cyber security as a junior cyber security analyst.
Benefits
In this course you will learn:
- Define IT security
- Explain the purpose of the framework, baselines and best practices for cyber security
- Discuss typical roles in the information security department
- Define the security operations center (SOC)
- Define the process in the context of business management and describe its attributes
- Describe standard process roles
- Explain what makes a process successful
- Discuss typical process performance metrics
- Summarize continuous process improvement
- Define the information technology infrastructure library (ITIL)
- Describe each phase of the ITIL life cycle
- Describe key terms and characters from Alice and Bob’s cryptography scenario
- Define confidentiality, integrity and availability in the context of cyber security and discuss their important components
- Define authenticity and accountability in the context of cyber security
- Explain identification and AAA in the context of cyber security
- Identify three types of authentication methods
- Discuss types of access control and their subcategories
- Describe common method access control
- Discuss best practices for access control
- Identify examples of physical and logical access control methods
- Discuss the types of monitoring and access control processes
- Summarize how to use the Open Web Application Security Project (OWASP) to discover the top ten web application vulnerabilities of the year and how to deal with them
- Compare and contrast the two modes of Windows: user and kernel
- Define the file system and hierarchical structure
- Compare the NTFS and FAT file systems used by Windows
- Describe the directory structure of Windows
- Summarize how Windows handles the separation of 32-bit and 64-bit applications
- Describe various useful keyboard shortcuts used in Windows
- Discuss important features of Linux
- Explain the relationship between the kernel and the Linux shell
- Describe the Linux file system and directory structure
- Explain what happens at each level of Linux startup
- Recall the basic Linux shell commands and the functions they perform
- Describe the permission structure of Linux files and directories
- Explain how to use the Linux shell to change permissions and file owner
- Install and run a Kali Linux virtual machine using VirtualBox
- Perform administrative tasks to strengthen security in Kali Linux
- Explain how to display system information, current activity and log files in macOS
- Summarize the various security settings in macOS
- Discuss the macOS recovery partition and the services it offers
- Compare virtual and traditional environments
- Describe the roles of hosts, hypervisors and virtual machines in a virtual environment
- Summarize how organizations are transitioning from virtual to cloud environments
- List the steps required to implement cloud services
- Define cloud computing
- Discuss the advantages and disadvantages of cloud computing
- Compare three cloud deployment models: public, private and hybrid
- Summarize the basic functions listed in the cloud computing reference model
- Compare three cloud service models: software as a service, platforms as a service and infrastructure as a service
- Describe the important components of cloud security
- Summarize the alignment between management, service and organization needed to achieve an effective cloud security strategy
Issues
- Module 1 – HR processes and technology
- Module 2 – Examples and Principles of CIA Triads
- Module 3 – Authentication and access control
- Module 4 – Windows operating system security basics
Do you have any questions?
Feel free to contact us.
Justyna Kalbarczyk
+48 516 098 221
justyna.kalbarczyk@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
Forms of training delivery
Stationary training
- Training at the customer's premises or at a designated location
- Training room equipped with the necessary equipment
- Training materials in electronic form
- Coffee breaks and lunch
- Direct interaction with the trainer
- Networking in a group
- Workshop exercises in teams
Remote training
- Virtual training environment
- Electronic materials
- Interactive online exercises
- Breakout rooms for group work
- Technical support during the training
- Recordings of the session (optional)
Possibility of funding
The training can be financed with public funds under:
- National Training Fund (KFS)
- Development Services Base (BUR)
- EU projects implemented by PARP
- HR Academy Program (PARP)
- Regional operational programs
If you are interested in funding, our team will help you prepare the required documentation.
HAVE A QUESTION?
Contact us for more information about our training, programs and cooperation. We will be happy to answer all your inquiries!
They trusted us
Get to know our company

Do you have any questions?
Feel free to contact us.
Justyna Kalbarczyk
+48 516 098 221
justyna.kalbarczyk@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
FAQ - Frequently Asked Questions
We offer training in a variety of tailored formats: onsite (at the client's location or our training center), live online interactive with a trainer, and in a hybrid format. Detailed information about the available delivery forms for a specific training is always included in its description on the website.
Open online trainings usually take place from 9:00 - 17:00 Polish time. In the case of closed trainings dedicated to companies, the schedule is flexible and we arrange it individually with the client to best fit the needs of the organization.
We use proven and popular video conferencing platforms, such as Microsoft Teams and Zoom, to conduct interactive online training. They provide seamless communication, the ability to work in groups and direct contact with the trainer. We provide information about the platform used in a specific training to participants before the training begins.
To comfortably participate in the online training, all you need is a standard computer (desktop or laptop) with stable internet access and an up-to-date version of a web browser installed. We recommend using headphones with a microphone for better sound quality and communication, although this is not absolutely required. Having a webcam is usually not mandatory either.
Yes, each participant receives a set of training materials prepared by our experts. We usually provide them in electronic form (e.g., PDF files) a few days before the start of the training, after confirmation of participation and payment.
Upon successful completion of most of our training courses, participants receive a named EITT Certificate of Completion, confirming the competencies gained. In addition, we offer accredited training courses (e.g., ITIL®, PRINCE2®) that prepare for official internationally recognized certification exams. Information about the type of certificate available after a specific training is always included in the detailed description of the training.
The enrollment process depends on the type of training. For open trainings (open to anyone who is interested), you can sign up directly through the application form available on the page of the particular training. If you are interested in closed training (dedicated to employees of one company), please contact us directly by email or phone - we will prepare an offer tailored to your needs.
As standard, the price of the training includes: participation in classes taught by an experienced trainer-practitioner, a set of original training materials in electronic form, and a named EITT Certificate of Completion. For accredited training courses, the price often also includes the cost of taking the official certification exam. The detailed scope of benefits for a given course is always given in its description.
The preferred form of payment for our training courses is by bank transfer, executed on the basis of an issued pro forma invoice or VAT invoice. Detailed information on payment terms and conditions is provided in the process of confirming the enrollment in the training or can be found in the regulations.
Of course! Our specialty is closed-door training, designed "tailor-made" - according to the individual needs and business objectives of a given organization. If you are interested in a topic outside of our regular offerings or would like to modify the program of an existing course, feel free to contact us. We will be happy to prepare a dedicated solution.
We are flexible and adapt to the client's needs. We can organize closed trainings even for small groups - usually the minimum number of participants is 4 people, and the cost is often calculated for the whole group. Taking care of the highest quality and comfort of learning, in case of very large groups (more than 40 people) we usually recommend dividing into smaller teams to ensure effective interaction.
Your feedback is extremely important to us, as it allows us to continuously improve our offerings. After each training session, we send participants a link to a short online evaluation survey. You can also always contact us directly by email or phone to provide your comments.
- One-pager invitation with deadlines
- Project kick-off
- Strategic leadership and thinking
- Communication and Cooperation. Conflict management
- Motivating, engaging and difficult decisions in business
- Managing Change and Innovation. Leadership in crisis
- Building the organization of the future
- Best practices workshop - retrospective; creating a coherent program for middle and lower management levels























