Company Training Academy

<p>The most practical way to organize cybersecurity training and awareness using a company-wide training platform. With our specific programs, you can set up training for all of your employees through a couple of easy steps.</p>
Company Training Academy - Advisera
Company Training Academy - Advisera

The quickest route to a company-wide training program

<p>A set of 350+ videos that cover various cybersecurity, ISO 27001, NIS2, DORA, and GDPR topics — configure the whole training & awareness program in a couple of minutes, and enable each employee to watch videos on their devices.</p> <p>On the left-hand side, you can see one of the videos from the NIS 2 Training available in Advisera’s Company Training Academy.</p>
<h4>Lessons library</h4> <ul class="list-of-videos"> <li>What is NIS2? (6:27) <div class="video-description">The basics of EU cybersecurity directive</div> </li> <li>Basic Cyber Hygiene Practices (4:47) <div class="video-description">Essential cybersecurity measures for every user</div> </li> <li>Handling Cybersecurity Incidents (6:16) <div class="video-description">How to spot and react promptly to cybersecurity concerns</div> </li> <li>Disaster Recovery (8:38) <div class="video-description">How to recover information systems and data</div> </li> <li>Cryptography (10:39) <div class="video-description">Cryptographic concepts and their application</div> </li> <li>Access Control (6:07) <div class="video-description">Permitting appropriate access and preventing inappropriate access</div> </li> <li>Cyber Asset Management (7:22) <div class="video-description">Identifying, classifying, securing, and exploiting digital assets</div> </li> <li>Basics of Network Security (6:43) <div class="video-description">Securing digital networks and data communications</div> </li> <li>NIS 2 Certification and Standardization (7:52) <div class="video-description">Explanation of NIS 2 articles 24 and 25</div> </li> <li>NIS 2 Supply Chain Security (9:16) <div class="video-description">Management of cyber risks related to suppliers</div> </li> <li>Backup basics (4:36) <div class="video-description">Recovery from data loss</div> </li> <li>Business Continuity (9:40) <div class="video-description">Resilience and recovery arrangements</div> </li> <li>Basics of Authentication (6:05) <div class="video-description">Preventing unauthorized access to digital assets</div> </li> <li>NIS 2 Policy on Information System Security (10:01) <div class="video-description">Writing a top-level cybersecurity policy for NIS 2</div> </li> <li>Security in Acquisition, Development, and Maintenance (12:15) <div class="video-description">Cybersecurity in the IT system lifecycle</div> </li> <li>Emergency Communications (6:30) <div class="video-description">Setting up alternative communication methods</div> </li> <li>NIS 2 Authorities (6:31) <div class="video-description">8 government bodies in charge of enforcing NIS 2</div> </li> <li>Cybersecurity Training and Awareness (11:33) <div class="video-description">Creating a program for continuous training and awareness</div> </li> <li>Human Resources Security (12:57) <div class="video-description">Activities before, during, and after employment</div> </li> <li>Measuring Cybersecurity (7:59) <div class="video-description">Assessing the effectiveness of risk management</div> </li> <li>Corrective Actions (8:02) <div class="video-description">How to eliminate the cause of nonconformities</div> </li> <li>NIS 2 Applicability (6:26) <div class="video-description">Essential and important organizations that must be compliant</div> </li> <li>NIS 2 Cybersecurity Requirements (8:51) <div class="video-description">10 most important NIS 2 cybersecurity measures</div> </li> <li>Management’s Role in Cybersecurity (7:34) <div class="video-description">Tasks for senior and mid-level management</div> </li> <li>NIS 2 Incident and Crisis Management (10:28) <div class="video-description">Management of cyber risks related to suppliers</div> </li> <li>NIS 2 Reporting Obligations (8:49) <div class="video-description">How to disclose significant incidents</div> </li> <li>NIS 2 Enforcement (10:19) <div class="video-description">Key actions authorities can use to enforce compliance</div> </li> <li>Secure Communications (13:32) <div class="video-description">Securing voice, video, and text communication channels</div> </li> <li>Insider Threats (6:30) <div class="video-description">Managing insiders with access to sensitive information</div> </li> <li>Cloud Security Basics (5:38) <div class="video-description">Securing data when using cloud services</div> </li> <li>NIS 2 Implementation Steps (7:23) <div class="video-description">15 steps to achieve full cybersecurity compliance with NIS 2</div> </li> <li>Assessing Supplier Security (12:46) <div class="video-description">Supplier vulnerabilities, quality, and secure development</div> </li> <li>Computer Malware (4:58) <div class="video-description">Phishing, ransomware, and spyware</div> </li> <li>Email Security (4:08) <div class="video-description">Risks related to the usage of email</div> </li> <li>Human Error (4:33) <div class="video-description">Reducing mistakes with sensitive information</div> </li> <li>Identity Theft (4:58) <div class="video-description">How do cybercriminals steal your identity?</div> </li> <li>The Mind of a Hacker (5:42) <div class="video-description">3 types of hackers and how to protect yourself</div> </li> <li>Information Risk Management (8:29) <div class="video-description">Risk assessment and treatment as a foundation of cybersecurity</div> </li> <li>Passwords (5:30) <div class="video-description">Creating and keeping passwords secure</div> </li> <li>Device Physical Security (5:52) <div class="video-description">Physically securing information and devices</div> </li> <li>Privacy (4:36) <div class="video-description">8 privacy principles everyone should know</div> </li> <li>Intellectual Property (5:36) <div class="video-description">Technical, legal, and organizational methods of protecting IPR</div> </li> <li>Protecting Paperwork (6:35) <div class="video-description">Vulnerabilities of paper media, and methods of protecting it</div> </li> <li>Security of Mobile Devices (5:30) <div class="video-description">Protecting laptops, tablets, smartphones, and other devices</div> </li> <li>Social Engineering (6:02) <div class="video-description">The most common methods criminals are using to access your account</div> </li> <li>Social Media (5:24) <div class="video-description">Main cyber risks when using Facebook, X, LinkedIn, and others</div> </li> <li>Remote Work (4:37) <div class="video-description">Risks when working outside of office premises</div> </li> <li>Managing Supplier Security (6:32) <div class="video-description">Risks related to vendors and contractors, and how to handle them</div> </li> <li>Croatia’s Cybersecurity Act (5:57) <div class="video-description">Similarities and differences with NIS 2</div> </li> <li>What is ISO 27001? (1:02) <div class="video-description">Learn about the basics of the leading cybersecurity standard</div> </li> <li>The structure of ISO 27001 (2:01) <div class="video-description">ISO 27001 main clauses and their purpose</div> </li> <li>Information security principles used in ISO 27001 (2:07) <div class="video-description">An example of confidentiality, integrity, and availability in practice</div> </li> <li>ISO 27001: Introduction to the ISMS (2:22) <div class="video-description">The purpose of an Information Security Management System</div> </li> <li>Key roles in ISO 27001 implementation (1:07) <div class="video-description">Roles of the project manager, security officer, and senior management</div> </li> <li>Documenting ISO 27001 requirements (2:55) <div class="video-description">Mandatory and non-mandatory documents</div> </li> <li>Implementing ISO 27001 requirements (2:13) <div class="video-description">Using the PDCA cycle as guidance for implementation</div> </li> <li>ISO 27001 Benefits (2:02) <div class="video-description">4 key benefits: compliance, marketing, costs, and better organization</div> </li> <li>ISO 27001: Understanding your organization and its context (2:03) <div class="video-description">Analyzing internal and external issues</div> </li> <li>ISO 27001: Understanding the needs and expectations of interested parties (1:35) <div class="video-description">Who are interested parties, and what are their requirements?</div> </li> <li>ISO 27001: Determining the scope of the ISMS (1:50) <div class="video-description">What is the ISMS scope, and why is it important?</div> </li> <li>ISO 27001: Leadership and commitment (1:45) <div class="video-description">Key senior management activities that represent commitment</div> </li> <li>ISO 27001: Information Security Policy (1:13) <div class="video-description">Mandatory elements of this top-level policy</div> </li> <li>ISO 27001: Organizational roles, responsibilities, and authorities (2:14) <div class="video-description">Which roles are mandatory according to ISO 27001?</div> </li> <li>ISO 27001: Information security objectives (2:14) <div class="video-description">Why are objectives important, and how to define them?</div> </li> <li>ISO 27001: Resources (1:40) <div class="video-description">Example of resources and how to document them</div> </li> <li>ISO 27001: Competence (1:22) <div class="video-description">The options to acquire required skills and knowledge</div> </li> <li>ISO 27001: Awareness (1:23) <div class="video-description">How to organize security awareness in a company</div> </li> <li>ISO 27001: Communication (1:24) <div class="video-description">What kind of communication is required, and why is it important?</div> </li> <li>ISO 27001: Documented information (3:12) <div class="video-description">Creating, updating, and controlling policies, procedures, and records</div> </li> <li>ISO 27001: Addressing risks and opportunities (1:46) <div class="video-description">The basics of risk management</div> </li> <li>ISO 27001: Risk management process (2:15) <div class="video-description">Five key steps to assess and treat risks</div> </li> <li>ISO 27001: Information security risk assessment – Risk identification (3:03) <div class="video-description">Risk identification, risk analysis, and risk evaluation</div> </li> <li>ISO 27001: Information security risk assessment – Risk analysis and evaluation (2:40) <div class="video-description">Using scales to assess impact and likelihood</div> </li> <li>ISO 27001: Information security risk treatment (0:00) <div class="video-description">Four most common options for treating risks</div> </li> <li>ISO 27001: Statement of Applicability (1:59) <div class="video-description">The purpose and structure of the SoA</div> </li> <li>ISO 27001: Formulating the risk treatment plan (1:49) <div class="video-description">The purpose and mandatory elements of the RTP</div> </li> <li>ISO 27001: Implementing the risk treatment plan (1:15) <div class="video-description">Key elements of implementation and how to document results</div> </li> <li>ISO 27001: Operational planning and control (2:18) <div class="video-description">Key elements of the Do phase in the PDCA cycle</div> </li> <li>ISO 27001: Operating the ISMS (1:18) <div class="video-description">What does operating the ISMS mean?</div> </li> <li>ISO 27001: Managing outsourcing of operations (1:57) <div class="video-description">Examples of security controls for outsourcing activities</div> </li> <li>ISO 27001: Controlling changes (1:58) <div class="video-description">An example of a change management procedure</div> </li> <li>ISO 27001: Risk assessment review (1:46) <div class="video-description">Why is risk review important, and how often to perform it?</div> </li> <li>ISO 27001: Monitoring, measurement, analysis, and evaluation (3:13) <div class="video-description">Key elements for evaluating the performance of the ISMS</div> </li> <li>ISO 27001: Internal audit (2:35) <div class="video-description">Key elements of an internal audit</div> </li> <li>ISO 27001: Management review (2:30) <div class="video-description">Inputs and outputs for the management review meeting</div> </li> <li>ISO 27001: Nonconformities and corrective actions (3:22) <div class="video-description">Required actions when a nonconformity occurs</div> </li> <li>ISO 27001: Continual improvement (2:19) <div class="video-description">Examples of improvement initiatives</div> </li> <li>ISO 27001: Introduction to Annex A (5:18) <div class="video-description">The purpose and structure of Annex A</div> </li> <li>ISO 27001: People controls (2:05) <div class="video-description">Overview of Annex A.6 – Controls before, during, and after employment</div> </li> <li>ISO 27001: Physical controls (3:37) <div class="video-description">Overview of Annex A.7 – Securing physical areas and equipment</div> </li> <li>ISO 27001: Technological controls – overview and new controls (4:13) <div class="video-description">Overview of Annex A section A.8 – Technological controls</div> </li> <li>ISO 27001: Technological controls – software development (2:51) <div class="video-description">Controls that cover architecture, lifecycle, testing, and coding principles</div> </li> <li>ISO 27001: Organizational controls – operational security (2:43) <div class="video-description">Controls for access control, information transfer, operating procedures, etc.</div> </li> <li>ISO 27001: Organizational controls – policies and responsibilities (3:22) <div class="video-description">Controls for roles, segregation of duties, contact with external parties, etc.</div> </li> <li>ISO 27001: Organizational controls – information and asset management (1:52) <div class="video-description">Controls for asset inventory, acceptable use, classification, etc.</div> </li> <li>ISO 27001: Technological controls – operational security (4:48) <div class="video-description">Controls that cover security in day-to-day IT activities</div> </li> <li>ISO 27001: Organizational controls – supplier security (3:14) <div class="video-description">Controls for assessing risks, contractual requirements, monitoring, etc.</div> </li> <li>ISO 27001: Organizational controls – incidents and business continuity (4:52) <div class="video-description">Controls to deal with threats, events, incidents, and larger disruptions</div> </li> <li>ISO 27001: Organizational controls - compliance, privacy, and legal aspects of security (2:49) <div class="video-description">Controls that ensure security is compliant with legal requirements</div> </li> <li>What is DORA? (3:46) <div class="video-description">EU regulation for digital resilience in financial sector</div> </li> <li>Who needs to comply with DORA? (2:41) <div class="video-description">Which financial institutions and other companies must comply?</div> </li> <li>Which IT providers need to comply with DORA and how? (3:49) <div class="video-description">Securing ICT Supply Chains for Financial Resilience</div> </li> <li>What are DORA-related regulations? RTS, CDR, and CIR (3:13) <div class="video-description">Additional Requirements Through Regulatory Technical Standards</div> </li> <li>What are the main requirements specified in DORA? (3:45) <div class="video-description">Summary of 9 Most Important Requirements</div> </li> <li>DORA implementation steps (4:54) <div class="video-description">Optimal Steps for DORA Compliance Project Implementation</div> </li> <li>Writing DORA documentation (3:30) <div class="video-description">Structure and Content of DORA Documentation</div> </li> <li>DORA: Organizing training and awareness (2:57) <div class="video-description">Key training & awareness requirements and how to comply with them</div> </li> <li>DORA: Penalties and fines (3:08) <div class="video-description">Who Enforces Them and How Do They Look Like?</div> </li> <li>DORA: Governance responsibilities for senior management (2:30) <div class="video-description">Implementing Internal Governance & ICT Risk Oversight</div> </li> <li>DORA: Key elements of ICT risk management framework (3:42) <div class="video-description">Description of Overall Activities in ICT Risk Management Framework</div> </li> <li>DORA: Developing top-level information security policy (1:54) <div class="video-description">Content of the Top-level Policy</div> </li> <li>DORA: How to write Digital operational resilience strategy (3:06) <div class="video-description">Key Elements of the Strategy</div> </li> <li>DORA: Identifying ICT-supported business functions and assets (1:36) <div class="video-description">ICT Function Mapping & Asset Lifecycle Management</div> </li> <li>DORA: Performing risk assessment (2:43) <div class="video-description">Mandatory Elements of ICT Risk Assessment</div> </li> <li>DORA: Learning and evolving (2:40) <div class="video-description">Methods for Continuous Cybersecurity Evolution</div> </li> <li>DORA: Measurement, monitoring, and controlling the ICT systems (1:14) <div class="video-description">Elements of Continuous Measurement, Monitoring, and Controlling</div> </li> <li>DORA: Internal audit of ICT risk management framework (1:23) <div class="video-description">Performing Internal Audit for ICT Risk Compliance</div> </li> <li>DORA: Follow-up and corrective actions (2:16) <div class="video-description">The Purpose and Content of the Follow-up</div> </li> <li>DORA: Report on the review of ICT risk management framework (2:23) <div class="video-description">Details of the Annual Review and Reporting</div> </li> <li>DORA: Main elements of simplified ICT risk management framework (6:42) <div class="video-description">Requirements for Small Financial Entities</div> </li> <li>DORA: Policies and procedures for ICT operations security (1:40) <div class="video-description">The Content of Operational Security Documents</div> </li> <li>DORA: Capacity and performance management (1:39) <div class="video-description">Optimizing ICT Capacity and Performance for Operational Resilience</div> </li> <li>DORA: Data and system security (2:12) <div class="video-description">Comprehensive Data and System Security Procedure Requirements</div> </li> <li>DORA: Network security management (1:58) <div class="video-description">Main Methods for Ensuring Network Security</div> </li> <li>DORA: Securing information in transit (1:39) <div class="video-description">Ensuring Secure Data Transmission and Confidentiality</div> </li> <li>DORA: Encryption and cryptography (2:02) <div class="video-description">Management of Encryption and Cryptographic Keys</div> </li> <li>DORA: Human resources policy (1:31) <div class="video-description">HR's Role in Digital Operational Resilience</div> </li> <li>DORA: Identity management and authentication (1:13) <div class="video-description">Requirements for Identity Policies and Authentication Mechanisms</div> </li> <li>DORA: Access control (2:38) <div class="video-description">Regulatory Requirements and Best Practices for Access Control</div> </li> <li>DORA: Physical and environmental security (1:36) <div class="video-description">Physical and Environmental Security Policy for ICT Assets</div> </li> <li>DORA: ICT systems acquisition, development, and maintenance (2:36) <div class="video-description">ICT Systems Lifecycle Security Policy and Testing</div> </li> <li>DORA: ICT project management (1:24) <div class="video-description">Rules for Managing ICT Projects</div> </li> <li>DORA: ICT change management (2:16) <div class="video-description">Elements of Change Management for Secure ICT Systems</div> </li> <li>DORA: Logging (1:14) <div class="video-description">Logging Procedures for Recording Critical Events</div> </li> <li>DORA: Detecting anomalous activities (1:40) <div class="video-description">Elements of Collecting and Analyzing Activities</div> </li> <li>DORA: Vulnerabilities, patch management, and updates (2:11) <div class="video-description">Vulnerability Management and Patch Processes for ICT Systems</div> </li> <li>DORA: Incident management process (2:51) <div class="video-description">Systematic Incident Handling and Rapid Response</div> </li> <li>DORA: Classification of ICT incidents and threats (4:05) <div class="video-description">Detailed Classification Criteria</div> </li> <li>DORA: Reporting major incidents and cyber threats (3:05) <div class="video-description">Types of Incident Reports for Authorities</div> </li> <li>DORA: ICT business continuity policy (2:13) <div class="video-description">Elements of the Top-level Business Continuity Document</div> </li> <li>DORA: Business impact analysis, RTO, and RPO (1:44) <div class="video-description">The Purpose of RTOs and RPOs for Business Continuity</div> </li> <li>DORA: Backup and restoration of data (2:01) <div class="video-description">Detailed Rules for Setting Up Backup and Restoration</div> </li> <li>DORA: Secondary processing site (1:36) <div class="video-description">Alternative Site Requirements for Central Counterparties</div> </li> <li>DORA: ICT response and recovery plans (2:02) <div class="video-description">Requirements for the Content of the Plans</div> </li> <li>DORA: Testing business continuity and recovery plans (3:03) <div class="video-description">Detailed Requirements for Plan Testing</div> </li> <li>DORA: Crisis management and communication (1:33) <div class="video-description">Elements of Handling Crisis</div> </li> <li>DORA: Main elements of digital operational resilience testing (2:07) <div class="video-description">Comprehensive Testing Program for ICT Risk Resilience</div> </li> <li>DORA: Resilience testing of ICT tools and systems (1:31) <div class="video-description">Types of Resilience Tests</div> </li> <li>DORA: Threat-Led Penetration Testing TLPT (3:15) <div class="video-description">Requirements for TLPT and for Testers</div> </li> <li>DORA: Key elements ICT third-party risk management (4:30) <div class="video-description">Governance, Assessment, Contracts, and Exit Strategies</div> </li> <li>DORA: Selecting critical ICT service providers (3:29) <div class="video-description">Critical ICT Provider Designation and Oversight Framework</div> </li> <li>DORA: Risk assessment of ICT service providers (3:02) <div class="video-description">Assessing Suppliers Before Signing Contracts</div> </li> <li>DORA: Contracts with ICT service providers (4:32) <div class="video-description">Standardized Security Clauses for Protection of ICT Services</div> </li> <li>DORA: Register of information (3:43) <div class="video-description">Standardized Register for ICT Contractual Oversight</div> </li> <li>DORA: Monitoring, inspection, and audit of ICT service providers (2:17) <div class="video-description">Independent Review and Ongoing Monitoring</div> </li> <li>DORA: Exit strategies for ICT services (3:48) <div class="video-description">Enabling a Smooth Transition Away From a Service Provider</div> </li> <li>DORA: Government oversight of critical ICT service providers (2:56) <div class="video-description">The Tasks and Powers of the Lead Overseer</div> </li> <li>What is EU GDPR and where does it apply? (1:35) <div class="video-description">EU GDPR: Protecting data rights and setting global standards for personal data processing.</div> </li> <li>Which frameworks are related to GDPR? (1:33) <div class="video-description">Leveraging ISO standards (27701, 27001, 29100) and OECD guidelines to reinforce GDPR best practices.</div> </li> <li>Key terms in GDPR (6:34) <div class="video-description">Essential GDPR vocabulary covering personal data, processing, roles, and data protection techniques.</div> </li> <li>Key roles according to GDPR (2:07) <div class="video-description">Key GDPR roles: Controllers, processors, DPOs, and supervisory authorities shape compliance responsibilities.</div> </li> <li>Business activities that are impacted the most by GDPR (1:53) <div class="video-description">Discover how GDPR affects diverse business functions, from Marketing and IT to HR and beyond.</div> </li> <li>Six legitimate purposes of processing personal data according to GDPR (3:58) <div class="video-description">Six legitimate processing purposes under GDPR: from contracts to consent</div> </li> <li>What are the main GDPR principles? (2:58) <div class="video-description">GDPR principles: lawfulness, fairness, transparency, purpose limitation, minimisation, accuracy, security, and storage limits.</div> </li> <li>Real-world example for understanding main GDPR principles (4:10) <div class="video-description">How GDPR’s principles—transparency, minimisation, consent, and timely deletion—apply in practice.</div> </li> <li>The basics of Privacy Notices according to GDPR (2:31) <div class="video-description">Clear disclosures on data processing to ensure transparency under GDPR.</div> </li> <li>Contents of a Privacy Notice according to GDPR (2:04) <div class="video-description">Clear, plain disclosures on data collection, processing, rights, contacts, and safeguards</div> </li> <li>What is GDPR Inventory of Processing Activities (4:58) <div class="video-description">How to build and maintain an Inventory of Processing Activities to meet GDPR requirements.</div> </li> <li>What is GDPR personal data retention (2:05) <div class="video-description">What does data retention mean, and how to ensure compliance with GDPR requirements.</div> </li> <li>Responsibilities for fulfilling GDPR requirements for inventory and retention (3:01) <div class="video-description">How to define clear roles and processes for maintaining GDPR inventories and retention schedules.</div> </li> <li>The content of GDPR Inventory of Processing Activities for controllers (1:19) <div class="video-description">Inventory for controllers: DPO, processing purposes, data categories, recipients, transfers, retention limits, and safeguards.</div> </li> <li>The content of GDPR Inventory of Processing Activities for processors (1:17) <div class="video-description">Essential details on sub-processors, controllers, processing categories, and data transfers.</div> </li> <li>GDPR Consent – The basics (2:42) <div class="video-description">What is GDPR consent is, and what its key requirements are?</div> </li> <li>How and when to ask for GDPR consent (1:49) <div class="video-description">Learn how and when to request consent under GDPR, ensuring transparency and user choice.</div> </li> <li>Data subject rights according to GDPR (3:24) <div class="video-description">Learn how data subject rights empower individuals to control their personal data under GDPR.</div> </li> <li>Basic GDPR rules for data subject access rights (2:01) <div class="video-description">DSAR basics, from valid request formats to response timelines.</div> </li> <li>Handling DSAR requests according to GDPR (1:20) <div class="video-description">DSAR best practices, response timelines, and identity verifications under GDPR.</div> </li> <li>DSAR exemptions and rejections according to GDPR (2:31) <div class="video-description">How to handle DSAR queries, typical exemptions, and valid grounds for rejections.</div> </li> <li>What is Data Protection Impact Assessment (DPIA) according to GDPR? (2:05) <div class="video-description">How DPIAs help identify and mitigate risks in data processing.</div> </li> <li>DPIA Step 1 according to GDPR: Listing and grouping data processing activities (1:04) <div class="video-description">How to identify and group data processes for assessment.</div> </li> <li>DPIA Steps 2 and 3 according to GDPR: The threshold questionnaire & determining if DPIA is needed (1:45) <div class="video-description">How high-risk processing is identified accurately with a threshold questionnaire.</div> </li> <li>DPIA Steps 4, 5 and 6 according to GDPR: Answer the DPIA questionnaire, identify and list key security risks (2:40) <div class="video-description">What is needed for DPIA steps and how to address key security risks</div> </li> <li>Step 7 DPIA according to GDPR: Recording the implementation; maintenance (1:02) <div class="video-description">Regular DPIA reviews keep safeguards updated and documented for compliance.</div> </li> <li>What is Data Protection by Design and by Default according to GDPR? (2:00) <div class="video-description">Data Protection by design and by Default concepts for building data protection into processes and systems</div> </li> <li>GDPR policies to be implemented to ensure security of personal data (5:26) <div class="video-description">Key policies that support secure data practices and mitigate privacy risks.</div> </li> <li>Best practices to implement GDPR Data Protection by Design and by Default policies (2:16) <div class="video-description">Key steps for defining and maintaining GDPR Data Protection by Design and by Default policies.</div> </li> <li>Introduction to GDPR data transfers (2:06) <div class="video-description">Managing personal data transfers, adequacy measures, and GDPR compliance.</div> </li> <li>How can GDPR data transfers be enabled? (2:55) <div class="video-description">How to choose suitable mechanisms for lawful international data transfers</div> </li> <li>Managing third parties according to GDPR (1:57) <div class="video-description">How to ensure GDPR compliance when engaging third-party processors and service providers</div> </li> <li>GDPR basic rules for data breaches (3:40) <div class="video-description">When personal data is exposed or stolen: rules for compliance and best practices.</div> </li> <li>Data breach response according to GDPR (1:14) <div class="video-description">Swift actions and logging procedures to address data breaches.</div> </li> <li>GDPR data breach notifications (1:29) <div class="video-description">Essential guidelines for data breach notifications under GDPR.</div> </li> <li>What to do after a data breach according to GDPR (1:04) <div class="video-description">How to evaluate data breaches, contain damage, and prevent future risks.</div> </li> <li>Why does a company need a DPO? (2:18) <div class="video-description">Key details about the DPO’s role, appointment, and responsibilities.</div> </li> <li>The responsibilities of the DPO (4:16) <div class="video-description">Detailed obligations, tasks, and best practices for a DPO under GDPR</div> </li> <li>Responsibilities towards the DPO (1:09) <div class="video-description">Ensuring DPO independence, resources, and timely involvement.</div> </li> <li>Define a GDPR Personal Data Protection Policy (3:57) <div class="video-description">How to define a personal data protection policy for clear GDPR alignment.</div> </li> <li>Setting up privacy governance for GDPR (1:36) <div class="video-description">Arranging departmental champions, boards, and consistent reviews for privacy compliance</div> </li> <li>Key steps in your GDPR project (2:55) <div class="video-description">Key steps to launch or refine GDPR compliance within an organization.</div> </li> <li>Conducting a GDPR Gap Analysis (2:47) <div class="video-description">Identify, assess, and address key GDPR requirements through a gap analysis.</div> </li> <li>GDPR Awareness and Training (4:38) <div class="video-description">How to plan effective GDPR awareness and training across teams and tasks.</div> </li> <li>Methods for sustaining and improving GDPR compliance (1:34) <div class="video-description">How to sustain and improve GDPR compliance in a changing environment.</div> </li> <li>Handling existing contracts with third parties to comply with GDPR (3:00) <div class="video-description">How to align third-party agreements with GDPR requirements.</div> </li> <li>Handling new contracts with third parties according to GDPR (3:30) <div class="video-description">Ensuring robust selection, contractual terms, and ongoing reviews under GDPR.</div> </li> <li>Regular GDPR reviews and improvement actions (2:41) <div class="video-description">Regular checks on DPIAs, DSAR handling, and staff training to keep compliance alive.</div> </li> </ul>

Training adjustable for different audiences

<p>Instead of showing the same videos to everyone, you can configure the system so that senior management will see only the videos appropriate for them, IT employees will see different videos, the rest of the employees something else, etc.</p> <p>Advisera’s Company Training Academy will suggest the most appropriate videos for different audiences, but you’re in control — you define who gets to see what.</p>
Company Training Academy - Advisera
Company Training Academy - Advisera

Automate training delivery and tracking

<p>You don’t have to torture yourself with organizing a live security training session that lasts longer than anyone wants to attend. Instead, use Advisera’s Company Training Academy to define how often employees need to watch videos, automatically send email invitations to watch them, track who watched each video, send reminders, and create attendance reports for audit purposes.</p>

Made for easy learning

<p>Let’s face it — people don’t have time for cybersecurity training & awareness, and most have a hard time understanding techy or lawyer language.</p> <p>This is why our videos are between 5 and 10 minutes long, and our cybersecurity experts explain the topics using easy-to-understand language.</p>
Company Training Academy - Advisera
Company Training Academy - Advisera

Several languages available

<p>We’re translating the videos into all major languages so that any employee in your company can easily understand them.</p>

Country-specific videos

<p>Each EU country must publish its own cybersecurity laws and regulations based on NIS 2 and other cybersecurity regulations — we will create videos for those specific requirements so that your employees learn what is required in your country.</p>
<h4>Belgium [in French]</h4> <ul class="list-of-videos"> <li>What is NIS2? (6:27) <div class="video-description">The basics of EU cybersecurity directive</div> </li> <li>NIS 2 Policy on Information System Security (10:01) <div class="video-description">Writing a top-level cybersecurity policy for NIS 2</div> </li> <li>NIS 2 Implementation Steps (7:23) <div class="video-description">15 steps to achieve full cybersecurity compliance with NIS 2</div> </li> <li>NIS 2 Authorities (6:31) <div class="video-description">8 government bodies in charge of enforcing NIS 2</div> </li> </ul> <h4>Belgium [in Dutch]</h4> <ul class="list-of-videos"> <li>What is NIS2? (6:27) <div class="video-description">The basics of EU cybersecurity directive</div> </li> <li>NIS 2 Policy on Information System Security (10:01) <div class="video-description">Writing a top-level cybersecurity policy for NIS 2</div> </li> <li>NIS 2 Implementation Steps (7:23) <div class="video-description">15 steps to achieve full cybersecurity compliance with NIS 2</div> </li> <li>NIS 2 Authorities (6:31) <div class="video-description">8 government bodies in charge of enforcing NIS 2</div> </li> </ul> <h4>Croatia [in Croatian]</h4> <ul class="list-of-videos"> <li>Croatia’s Cybersecurity Act (5:57) <div class="video-description">Similarities and differences with NIS 2</div> </li> </ul>
Company Training Academy - Advisera
Company Training Academy - Advisera

Custom-made videos

<p>Do you have specific cybersecurity policies or procedures that you’d like to present in a video? No problem! As part of selected plans, we can create custom videos exclusively for your company — personalization has never been easier.</p> <p>You can also upload the videos you created to complement Advisera’s training videos.</p>

For all use cases

<p>Do you want to organize initial cybersecurity training for your project team? Or do you want regular, continuous training for your whole workforce? Or perhaps onboarding for new employees?</p> <p>With the Company Training Academy, you can cover all of these cases by setting up separate training programs.</p>
Company Training Academy - Advisera
Company Training Academy - Advisera

SCORM compatibility for your LMS

<p>Use our training videos in your own learning management system (LMS) — all lessons are available as SCORM packages, including videos, quizzes, and progress tracking. Stay in control while delivering content through your existing platform.</p>

White-label platform for consultants

<p>Grow your business by offering branded cybersecurity and compliance training to your clients. With Advisera’s platform, you can set up and manage training programs for multiple clients — all from one dashboard.</p>
Company Training Academy - Advisera
Select the number of users for which you want to set up training
Monthly plan

10 users included

€14 / month

Unlimited access to all videos

Access to any training and awareness video about cybersecurity, ISO 27001, NIS2, DORA, or GDPR, in any language, for any of your employees

Access to translated videos

Currently, all NIS2 and cybersecurity videos are translated and available in Croatian, French, Dutch, German, Italian, and Spanish.

Country-specific videos

When a particular EU country publishes its own laws and regulations based on, e.g., NIS 2, we will create videos that address those additional requirements.

Adapt training for audiences

Create separate training programs for senior management, mid-level management, IT employees, all other employees, etc. so that each group watches only the videos relevant to them.

Set training schedule

Choose daily, weekly, monthly, or other frequencies of watching training videos.

Automatic notifications

Configure automatic email notifications sent to employees about upcoming and overdue training videos.

Track employees’ progress

See exactly who has attended which training video, who is late, and testing results; download reports in PDF.

Quizzes and tests

Decide for each training program how you want to test the attendees.

Upload your own materials

Upload your own videos and documents, and add them to existing training programs.

Custom-made videos

Based on your script, we will produce training videos (up to 10 minutes per video) that you can use within the Company Training Academy.
(available in yearly plans with 100 or more users)

In-house live online training

Customized interactive webinar delivered by our expert for your company – up to 1 hour, up to 500 attendees.
(available in yearly plans with 500 or more users)

SCORM packages

Get SCORM versions of our training programs to run them in your own LMS. All content — videos, quizzes, and progress tracking — included and ready for integration.
(available only in custom plan)
Yearly plan

10 users included

€154 / year

Unlimited access to all videos

Access to any training and awareness video about cybersecurity, ISO 27001, NIS2, DORA, or GDPR, in any language, for any of your employees

Access to translated videos

Currently, all NIS2 and cybersecurity videos are translated and available in Croatian, French, Dutch, German, Italian, and Spanish.

Country-specific videos

When a particular EU country publishes its own laws and regulations based on, e.g., NIS 2, we will create videos that address those additional requirements.

Adapt training for audiences

Create separate training programs for senior management, mid-level management, IT employees, all other employees, etc. so that each group watches only the videos relevant to them.

Set training schedule

Choose daily, weekly, monthly, or other frequencies of watching training videos.

Automatic notifications

Configure automatic email notifications sent to employees about upcoming and overdue training videos.

Track employees’ progress

See exactly who has attended which training video, who is late, and the testing results; download reports in PDF.

Quizzes and tests

Decide for each training program how you want to test the attendees.

Upload your own materials

Upload your own videos and documents, and add them to existing training programs.

Custom-made videos

Based on your script, we will produce training videos (up to 10 minutes per video) that you can use within the Company Training Academy.
(available in yearly plans with 100 or more users)

In-house live online training

Customized interactive webinar delivered by our expert for your company – up to 1 hour, up to 500 attendees.
(available in yearly plans with 500 or more users)

SCORM packages

Get SCORM versions of our training programs to run them in your own LMS. All content — videos, quizzes, and progress tracking — included and ready for integration.
(available only in custom plan)

For all company sizes, all industries

All videos are created to be <strong style="color: #28c7c0;">relevant for small, medium, and large companies, and also for all industries</strong> — no matter if your company is a small SaaS provider or a large water utility, your employees will find these videos very appropriate.

Frequently Asked Questions

What is the Company Training Academy?

The Company Training Academy is a company-wide cybersecurity training platform that enables you to configure various training and awareness programs for your entire workforce for, e.g., NIS2, DORA, ISO 27001, GDPR, security awareness, etc.

How long does it take to set up company-wide training and awareness?

Opening a client account takes less than a minute. The wizard will then guide you through the process of setting up your first training and awareness program, which usually takes 5–10 minutes.

How does the free trial work?

During the 14-day free trial, you will get access to all training & awareness videos, but you will be limited to 10 users. Some more advanced features will be accessible when you upgrade your account. No credit card required.

What forms of payment do you accept?

We accept payment via any major credit or debit card; for a larger number of users, you can pay via wire transfer from your bank account.

How does the Company Training Academy compare to Advisera’s courses?

Advisera’s courses are intended for individuals who want to get in-depth knowledge about a particular framework, while the Company Training Academy is intended for companies that want to automate training and awareness for all of their employees, and track their progress.

Which standards and regulations are covered in the Company Training Academy videos?

Currently, the videos cover NIS2, DORA, ISO 27001, GDPR, and cybersecurity awareness training.

We’re working on adding videos for other standards and regulations.

Are videos available in languages other than English?

NIS2 and cybersecurity awareness videos are also available in French, Dutch, Croatian, German, Italian, and Spanish. We are working on adding more languages – contact us to learn about available languages.

Can we use these videos in our own Learning Management System (LMS)?

Yes. Our training is available as SCORM packages, including videos, quizzes, and progress tracking, for easy integration into your Learning Management System (LMS) – contact us to request the SCORM packages.

Is there a time limit for attending the training?

No, your users can spend as much time as they like attending the lessons, as long as your subscription is active.

What will the users need to access the lessons?

Your users can access the lessons using PC, Mac, or mobile devices, using any major browser (e.g., Chrome, Mozilla, Edge, Safari); a broadband Internet link will also be needed.

What is the format of the training, and how long does it take?

The lessons are a combination of video lectures, quizzes, and test questions. The average time needed per lesson is between 5 and 10 minutes. You can configure your training program to include only a couple of lessons, or several dozen lessons.

What prior knowledge is needed to attend the training?

None. The lessons are created in such a way that a beginner can easily understand them. They are very easy to follow for any type of employees — senior or mid-level management, non-IT employees, tech people, etc.

How can I upgrade my account if I need more users?

Simply click the purchase button for the required number of users in the pricing table, and, after the payment is processed, your Company Training Academy will be upgraded automatically.

Please make sure you use the same email address that you use for your existing account, because it is the only way this process can be done automatically. If you decide to make the purchase with a different email address, make sure you contact our support at support@advisera.com so we can upgrade your account manually.

Is it necessary to purchase training and awareness certificates?

No — you can use a Company Training Academy without purchasing certificates.

There are so many videos — how will I find what is the most appropriate for us?

The Company Training Academy will suggest the most appropriate videos based on the framework you’re interested in (e.g., NIS2), and based on your audience (e.g., senior management).

Further, you can filter all the videos in the Library by country, language, relevant clauses and articles of the framework, and other criteria.

Schedule a Demo

<p>Want our expert to walk you through the product? Schedule a short call. We respond quickly.</p>