Available courses

Cyber Range is gamified security training platform to test cyber security competence across a wide range of domains, either individually or in a team against others. Silensec Cyber Range contains hundreds of pre-built scenarios, challenges and a wide range of pre-configured simulation environments.

Practical trainings designed to teach middle-level managers to make business decisions.


MISP is a threat intelligence platform, developed by Silensec, used for sharing, storing and correlating Indicators of Compromise (IoCs), threat intelligence and information

The General Data Protection Regulation is the new regulation on Privacy and Data Protection. It has been in force since May 25th, 2018. Everyone should be aware of it.

Teleworking or Telecommuting is becoming widely acceptable in organizations. A teleworker uses mobile communication technology such as Wi-Fi-equipped laptop or tablet computers and smartphones to work from coffee shops; others may use a desktop computer and a landline phone at their home.

Physical and environmental security refers to measures that are designed to prevent unauthorized physical access to facilities, equipment and resources and to protect personnel and property from damage or harm.

The concept of copyright has become very crucial in the digital era. Copyright is intended to protect the original expression of an idea in the form of creative work, but not the idea itself.

The Acceptable Use of IT course details guidelines and practices that a user must agree to in order to access an organization's resources such as email, corporate network and Internet.

Sectopia is a web-based serious game about cybersecurity. Compared to other existing games addressing phishing, the scope of our new prototype is social engineering in general.

Email is an important business tool for every organization. It is also widely used in social engineering attacks such as phishing. Research shows that 91% of attacks start with the use of email to solicit confidential information. This course describes the threats to email security and the importance of email security.

Improve your cyber security awareness by checking our threat descriptions and get an overview of the most common technology threats that have impacted the LPAs in recent years.

Practical trainings designed to teach middle-level managers to make business decisions.

Cyber Security Investigator is a team-based game that can be played by five people in an office over a period of two weeks. The team's goal is to raise awareness and uncover cyber-security issues in the office. The investigators have several tasks to achieve this goal. One player takes on the role of the chief investigator. His or her task is not to investigate, but to monitor the investigation and help colleagues with questions.

The game is designed by AIT (Austrian Institute of Technology)



Do you know GDPR? And how much do you know it?


Fordern Sie sich mit unserer individuellen Risikobewertung heraus und teilen Sie uns Ihr Wissen über Phishing mit.

Are you ready for challenging your ability to understand which email is trying to phishing you?
Play this test and see how many fishhooks you avoid

Mettiti alla prova con la nostra valutazione individuale dei rischi e facci vedere quanto ne sai sul Phishing.

Mettiti alla prova con la nostra valutazione individuale dei rischi e facci conoscere le tue conoscenze sul Phishing.

Fordern Sie sich mit unserer individuellen Risikobewertung heraus und teilen Sie uns Ihr Wissen über Phishing mit.