[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.22.5″ bottom_divider_height=”24px” bottom_divider_flip=”vertical”][et_pb_fullwidth_slider _builder_version=”3.22.7″ height=”55vh” auto=”on”][et_pb_slide admin_title=”Slide 2″ _builder_version=”3.22.7″ background_image=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/hacker.jpg”][/et_pb_slide][/et_pb_fullwidth_slider][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” next_background_color=”#ffffff” _builder_version=”3.22.5″ background_color=”#205867″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.32)” background_color_gradient_end=”rgba(255,255,255,0)” bottom_divider_style=”arrow”][et_pb_fullwidth_header title=”Cyber Security Staff Awareness Training” text_orientation=”center” button_one_url=”#gain-new-skills” button_two_url=”#our-courses” _builder_version=”3.22.7″ background_color=”rgba(0,0,0,0)”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ custom_padding=”14px||0px|||”][et_pb_row use_custom_gutter=”on” gutter_width=”2″ custom_padding=”0px||0px|||” custom_margin=”15px||” _builder_version=”3.24.1″ background_color=”rgba(0,0,0,0)” width=”98%” min_height=”677px” z_index=”1″ custom_css_before=”background-color:transparent;” padding_right_1=”5px” padding_left_1=”5px” padding_right_2=”5px” padding_left_2=”5px”][et_pb_column type=”3_5″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” _builder_version=”3.24.1″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”center” header_3_text_color=”#ffffff” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” background_color=”#205867″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” border_radii=”on|10px|10px|10px|10px” custom_margin=”2.5%||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding=”||0px|||” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

Cyber Security Staff Awareness

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.24.1″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”0px||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

Cyber Awareness is an absolute necessity in modern society. With information acting as the lifeblood to industry. Therefore whether it is receiving emails that are attempting to use social engineering techniques or phishing threats designed to make you reveal sensitive information. One click could literally mean the difference between evading and becoming another victim of cyber criminals. Therefore spotting the threats for what they are is half the battle, so having an awareness of the nature and risk posed by such threats is critical.

We offer comprehensive security awareness training, phishing simulation and user knowledge assessment solutions designed to measure the level of human risk within your company, and hopefully protect your business from becoming another victim. We educate your employees on an ongoing basis, leading to long term behaviour change.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.24.1″ text_font=”||||||||” text_text_align=”center” text_text_color=”#ffffff” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” background_color=”#205867″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” border_radii=”on|10px|10px|10px|10px” custom_margin=”0px||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding=”|5px||5px” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop” animation_style=”flip” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

We can assist organisations and businesses, upgrade the practical skills of their clients and staff in Cybersecurity and IT.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.24.1″ text_font=”||||||||” text_text_align=”center” text_text_color=”#ffffff” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” background_color=”#205867″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” border_radii=”on|10px|10px|10px|10px” custom_margin=”0px|5px|17px|5px||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop” animation_style=”flip” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

Train staff responsible for cyber-related tasks to fulfil their roles, help executives, management and staff understand the cyber domain.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.24.1″ text_font=”||||||||” text_text_align=”center” text_text_color=”#ffffff” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” background_color=”#205867″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” border_radii=”on|10px|10px|10px|10px” custom_margin=”0px|5px|17px|5px||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop” animation_style=”flip” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

Defend and support your IT network.

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.22.5″][et_pb_code _builder_version=”3.22.7″]


[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.24.1″ custom_padding=”0px|||||”][et_pb_row custom_padding=”52px|||||” custom_margin=”0px|auto||auto||” _builder_version=”3.24.1″ min_height=”49px”][et_pb_column type=”4_4″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” module_id=”our-courses” _builder_version=”3.22.5″ text_font=”||||||||” header_font=”|700|||||||” header_text_align=”center” header_letter_spacing=”2px” header_3_font=”||||||||” header_3_line_height=”1.3em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” custom_margin=”||1px|||” custom_padding_tablet=”|2.5%||2.5%||true” custom_padding_phone=”|5%||5%||true” custom_padding_last_edited=”on|phone” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone”]

Our Partners

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0px|||||” _builder_version=”3.22.7″ width=”100%” width_phone=”80%” width_last_edited=”on|tablet” module_alignment=”center” min_height=”190px”][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/cisco-e1556326646506.png” url=”https://www.netacad.com/” url_new_window=”on” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover_enabled=”on” filter_saturate__hover=”100%” filter_opacity__hover_enabled=”on” filter_opacity__hover=”100%” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/tlm-e1556326683259.png” url=”https://thelearningmachine.co.uk/” url_new_window=”on” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/bit-defender.jpg” url=”https://www.bitdefender.com” url_new_window=”on” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/f-secure-logo.png” url=”https://www.f-secure.com” url_new_window=”on” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/nord-vpn.png” url=”https://nordvpn.com” url_new_window=”on” align=”center” align_tablet=”center” align_last_edited=”on|desktop” _builder_version=”3.23″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ background_color=”#f2f2f2″ top_divider_style=”arrow3″ top_divider_color=”#ffffff” top_divider_height=”110px” top_divider_arrangement=”above_content”][/et_pb_section]