Cybersecurity exercise in KYPO environment

  • Target group: Veřejné organizace, Střední podniky
    Type of service: Skills and Education
    Realization: Onsite
  • ​- resolve a cybersecurity incident during a two-day exercise
  • - improve your team's coordination and communication
  • - prepare a final evaluation

No description

Two-day training on cooperation in dealing with the different phases of a cybersecurity incident. Emphasis will also be placed on learning the necessary technical, procedural and legal procedures required to successfully resolve a specific incident.

No description

What is the first step?
Use the form below to contact us. We will get back to you soon.

No description

How much time is required?
17,5 hours of practical and theoretical training.

Attackers are trying to disable IT infrastructure and in addition to this, attacks in the form of phishing, port scanning or bruteforce attacks on passwords are taking place in parallel. And it's up to your team to prevent the attack. During this two-day exercise, your team will try to successfully resolve the incident.

The exercise involves team coordination, communication between teams and information transfer, along with proactive alerting and the development of a final assessment.

Knowledge of Windows operating systems administration and computer network administration is required. Ability to resolve cyber incidents and knowledge of Linux is an asset.

Contact us if you are interested



I. What is EDIH?

• European Digital Innovation Hubs, or EDIHs, help organisations with their digital transformation.
• They are being established in all EU member states thanks to the Digital Europe programme.
• One of these hubs is CyberSecurityHubcz, which is the only hub in the Czech Republic that deals primarily with cybersecurity.

II. Who will we be working with?

• The CyberSecurityHubcz consortium consists of 9 organisations.
• While some members are engaged in expert services in cybersecurity, business development partners are dedicated to the economic development of clients and serve as intermediaries between the consortium and clients.
• The governing organization is CyberSecurityHubcz itself.

III. What services do you offer?

  • • The services fall into four categories: test before invest, education and digital skills, innovation ecosystem and networking, and support in finding investments.
    • Within these categories, there are dozens of services of various types - from consulting to penetration testing.
    • The purpose of all services is to strengthen security and resilience.

IV. How to become a client?

  • • Use the contact form, e-mail or get in touch with one of our representatives – we attend a wide range of events and conferences.
    • We will then meet in person or online for an initial meeting. After discussing your needs and other issues, we can move on to signing the contract.
    • Whichever service you choose, you'll always also receive a digital maturity assessment of your organisation from us and long-term assistance for the duration of our project – at least until the end of 2025.

V. Should we be afraid of the administrative burden?

• There are not many administrative requirements. SMEs must have a profile in the Central register of de minimis aid and have sufficient funds available in their small scale public aid account. These conditions do not apply to public organisations.
• A contract must then be signed. A new contract is then concluded whenever you request our services again in the future.
• A proactive approach is required in the planning and implementation of the agreed services.

You are running an old browser version. We recommend updating your browser to its latest version.

More info