Empowering People to Defend Digital Frontiers
Our modern training center is located in Bucharest historical downtown next to the central bank.
Training Services
1. Cybersecurity Awareness Training
Educate staff on phishing, social engineering, password hygiene, and data protection.
Ideal for: All employees – beginner to intermediate
Includes: E-learning, live sessions, quizzes, certificates
2. Cybersecurity for Executives & Decision Makers
C-Suite oriented sessions on governance, compliance, business continuity, and risk.
Ideal for: Executives, managers, board members
Includes: Workshops, simulations, policy briefings
3. Technical Hands-on Cyber Training
Red team / blue team exercises, pentesting basics, SOC analyst skills, malware analysis.
Ideal for: IT professionals, security analysts, developers
Includes: Labs, real-world scenarios, certification prep
4. Cyber Crisis Simulation & Incident Response Drills
Role-based simulations and table-top exercises for incident preparedness.
Ideal for: Crisis teams, SOC staff, regulators
Includes: Custom threat scenarios, live response tests, debriefs
5. Compliance & Regulatory Training
ISO 27001, GDPR, NIS2, ANSSI, ENS, and sector-specific regulatory readiness.
Ideal for: Legal, risk, compliance, and IT teams
Includes: Practical application of controls, audit prep, document templates
6
Critical Infrastructure Security Training (OT/ICS/SCADA)
Training for operators managing industrial, energy, and utility systems.
Ideal for: Engineers, OT security officers, smart grid teams
Includes: Network architecture, attack surfaces, defense-in-depth
Training for operators managing industrial, energy, and utility systems.
Ideal for: Engineers, OT security officers, smart grid teams
Includes: Network architecture, attack surfaces, defense-in-depth
7
Custom Training Programs & Certifications
Tailored training tracks based on client environments or national standards.
Ideal for: Government agencies, defense contractors, large enterprises
Includes: In-house academies, certification pathways, badges
Client Advantages
Advantage |
Description |
🎯 Improved Human Firewall |
Reduce human error and insider threat risk |
🚨 Faster Incident Response |
Teams are trained to detect and respond quickly |
📜 Compliance Assurance |
Ensure audit-readiness and regulatory adherence |
📈 Stronger Cyber Culture |
Company-wide awareness and security alignment |
🧩 Customizable Content |
Programs adapted to your industry, language, and threat model |
🎓 Certified Training Paths |
Recognized certifications for career development |
🔐 Secure-by-Design Mindset |
Engineers and IT staff learn to code and build with security first |
Recognized Certificate at KeyRak Training Center
1. The Certification Objective
Clarify what the certificate validates:
- Skills gained (e.g., SOC Analyst Level 1, Industrial OT Security, etc.)
- Intended audience (e.g., IT pros, managers, field techs)
- Certification level (basic, intermediate, expert)
💡 Example: Certified OT Cyber Resilience Practitioner – KeyRak Level 2
2. Structure a Competency-Based Curriculum
Ensure the certification is based on practical, measurable outcomes:
- Include theoretical knowledge + real-world scenarios
- Use industry frameworks (e.g., NIST, ISO 27001, MITRE ATT&CK)
- Include a hands-on lab or simulation module
Modules could include:
- Threat landscape and detection techniques
- Log analysis and incident triage
- Crisis management & forensics
- Compliance standards relevant to the region
3. Design a Practical Assessment / Final Exam
This requires candidates to pass:
- A written exam (multiple choice, case studies)
- A hands-on or lab-based test (e.g., detect & respond to a simulated attack)
Pro tip: Offer proctoring, or self-paced with verification.