trustilio BV's School logo

Main menu

Includes navigation links and user settings

trustilio BV's School logo
  • Browse products
  • Log in
© 2025 trustilio BV's School
  • Contact
  • Home
  • About Us
  • Our Services
  • Research
  • Publications
  • Careers
  • Terms of Use
  • Privacy Policy

Browse products

Product filters:
search
Product image for Artificial Intelligence: A cybersecurity challenge in the maritime operations

Artificial Intelligence: A cybersecurity challenge in the maritime operations

This course explores the unique cybersecurity challenges posed by the integration of Artificial Intelligence (AI) in maritime operations. Participants will examine how AI technologies are transforming the maritime industry, from autonomous vessels to predictive maintenance systems, while also introducing new vulnerabilities and threats. The course emphasizes understanding the risks associated with AI systems, such as data manipulation, adversarial attacks, and system breaches, and explores strategies for mitigating these risks to ensure safe and secure maritime operations. Through case studies and practical exercises, students will gain the knowledge and tools needed to address cybersecurity challenges in AI-driven maritime environments effectively.

  • Course
  • By trustilio BV
€1.750
Product image for Co-Creation Principles for Human-Centered AI Development

Co-Creation Principles for Human-Centered AI Development

This course explores the foundational principles of co-creation in designing and developing human-centered AI solutions. Participants will learn how to involve diverse stakeholders—including users, developers, and policymakers—in collaborative processes to create AI systems that prioritize ethical considerations, inclusivity, and real-world relevance. The course emphasizes practical strategies for fostering collaboration, integrating user feedback, and aligning AI technologies with human values and societal needs. Through case studies and interactive exercises, students will gain the knowledge and tools necessary to apply co-creation principles in building AI solutions that empower and benefit users.

  • Course
  • By trustilio BV
€1.650
Product image for Continuous Learning and Transferable Skills in the Cybersecurity Field

Continuous Learning and Transferable Skills in the Cybersecurity Field

This course focuses on the development of transferable skills and the importance of continuous learning in the dynamic field of cybersecurity. Participants will explore critical skills such as problem-solving, communication, adaptability, and leadership that are essential for navigating complex cybersecurity challenges across various roles and industries. The course highlights the value of staying updated with emerging technologies, evolving threats, and industry best practices through ongoing education and professional development. Through hands-on activities and real-world examples, students will learn how to apply these skills effectively and maintain their expertise in the fast-paced cybersecurity landscape.

  • Course
  • By trustilio BV
€1.800
Product image for Cybersecurity Essentials

Cybersecurity Essentials

This course offers a foundational understanding of cybersecurity, providing participants with the essential knowledge and skills needed to navigate today’s digital threats. Topics include understanding common cyber risks, such as malware, phishing, and ransomware, as well as best practices for securing systems, networks, and sensitive data. The course emphasizes practical steps to improve personal and organizational security, including strong password management, safe browsing habits, and recognizing potential cyberattacks. Designed for individuals with little to no technical background, this course equips attendees with the tools to protect themselves and their organizations in an increasingly connected world.

  • Course
  • By trustilio BV
€2.000
Product image for Cybersecurity Governance and Regulatory Compliance in the EU Energy Sector

Cybersecurity Governance and Regulatory Compliance in the EU Energy Sector

This course explores the critical aspects of cybersecurity governance and regulatory compliance within the EU energy sector. Participants will gain a deep understanding of the cybersecurity challenges unique to the energy industry and the regulatory frameworks shaping its security practices, including the NIS Directive and other EU-level policies. The course covers strategies for implementing effective governance structures, achieving compliance, and managing cyber risks across energy systems. Through real-world case studies and practical applications, students will develop the knowledge and skills necessary to navigate the complex intersection of cybersecurity and regulatory requirements in the energy sector.

  • Course
  • By trustilio BV
€1.700
Product image for Cybersecurity for Leaders and Decision Makers

Cybersecurity for Leaders and Decision Makers

This course is designed to empower leaders and decision-makers with the knowledge and strategies needed to navigate the complex world of cybersecurity. Participants will gain an understanding of key cybersecurity concepts, risk management practices, and the strategic implications of cyber threats for their organizations. The course emphasizes how to make informed decisions, allocate resources effectively, and foster a culture of cybersecurity awareness. Through real-world examples and practical discussions, leaders will learn to address vulnerabilities, implement robust security measures, and ensure their organizations remain resilient in the face of evolving cyber risks.

  • Course
  • By trustilio BV
€1.200
Product image for Cybersecurity for Micro, Small and Medium size enterprises

Cybersecurity for Micro, Small and Medium size enterprises

This course is tailored to address the unique cybersecurity challenges faced by micro, small, and medium-sized enterprises (MSMEs). Participants will learn practical strategies for protecting their businesses from cyber threats, including phishing, ransomware, and data breaches, while navigating limited resources and budgets. The course covers essential topics such as risk assessment, implementing cost-effective security measures, and fostering a culture of cybersecurity awareness among employees. Through real-world examples and actionable insights, attendees will gain the tools and confidence needed to strengthen their cybersecurity posture and safeguard their operations in an increasingly digital landscape.

  • Course
  • By trustilio BV
€1.300
Product image for Cybersecurity for non-IT professionals and policy makers

Cybersecurity for non-IT professionals and policy makers

This course is designed to equip non-IT professionals and policymakers with a foundational understanding of cybersecurity principles and practices. Participants will explore key cybersecurity concepts, including threat landscapes, risk management, and the importance of securing digital assets, all presented in an accessible and practical way. The course emphasizes the role of non-technical stakeholders in shaping cybersecurity policies, fostering organizational resilience, and making informed decisions to mitigate risks. Through real-world examples and interactive sessions, attendees will gain the knowledge and confidence to actively contribute to cybersecurity strategies within their organizations and sectors.

  • Course
  • By trustilio BV
€1.800
Product image for Cybersecurity in the Energy Sector: The Human Factor

Cybersecurity in the Energy Sector: The Human Factor

This course examines the pivotal role of human factors in the cybersecurity of the energy sector, focusing on how human behavior, decision-making, and organizational culture influence security outcomes. Participants will explore the unique cybersecurity challenges faced by the energy industry, including the protection of critical infrastructure and the mitigation of insider threats. The course emphasizes strategies for fostering a culture of cybersecurity awareness, improving training programs, and addressing human vulnerabilities to enhance resilience against cyber threats. Through case studies and practical exercises, students will develop the skills needed to integrate human-centric approaches into energy sector cybersecurity strategies effectively.

  • Course
  • By trustilio BV
€1.850
Product image for Designing User Personas: A Human-Centered Approach

Designing User Personas: A Human-Centered Approach

This course delves into the creation and application of user personas, emphasizing a human-centered approach to understanding and addressing user needs. Participants will explore the psychological, social, and behavioral factors that influence user experiences and learn how to translate these insights into detailed, actionable personas. The course covers techniques for gathering user data, identifying key patterns, and crafting personas that drive design decisions and improve product relevance. Through hands-on activities and case studies, students will develop the skills to create meaningful user personas that enhance user-centric strategies in design, marketing, and development processes.

  • Course
  • By trustilio BV
€1.550
Product image for Human Aspects of Cybersecurity

Human Aspects of Cybersecurity

This course provides a comprehensive exploration of the human factors influencing cybersecurity. Participants will delve into the psychological, behavioral, and cultural dimensions that impact cybersecurity practices and decision-making. The course highlights the importance of understanding human behavior in preventing, detecting, and responding to cyber threats.

  • Course
  • By trustilio BV
€1.650
Product image for Maritime Cybersecurity and Human Factors

Maritime Cybersecurity and Human Factors

This course explores the critical intersection of human factors and maritime cybersecurity, focusing on the role of human behavior, decision-making, and organizational culture in securing maritime operations. Participants will examine the unique cybersecurity challenges faced in the maritime sector, including threats to ships, ports, and supply chains, and how human elements contribute to both vulnerabilities and defenses. The course emphasizes the importance of fostering cybersecurity awareness, training, and resilience among maritime personnel to mitigate risks. Through real-world case studies and practical exercises, students will gain the knowledge and skills needed to address human-centric cybersecurity issues in the maritime industry effectively.

  • Course
  • By trustilio BV
€1.550
Product image for Mastering Code Audits: Tools & Techniques

Mastering Code Audits: Tools & Techniques

This course provides a comprehensive guide to mastering code audits, focusing on the tools and techniques essential for identifying and mitigating vulnerabilities in software code. Participants will explore both manual and automated auditing methods to ensure secure coding practices, detect potential security flaws, and adhere to compliance standards. The course emphasizes practical skills in using industry-leading tools and frameworks while introducing strategies for effective collaboration between developers and auditors. Through hands-on exercises and real-world examples, students will gain the expertise needed to conduct thorough and efficient code audits, enhancing the overall security and reliability of software systems.

  • Course
  • By trustilio BV
€1.900
Product image for Network Security Essentials and Penetration Testing for SMEs

Network Security Essentials and Penetration Testing for SMEs

This course provides small and medium enterprises (SMEs) with practical knowledge of network security fundamentals and penetration testing techniques. Participants will learn to identify vulnerabilities, implement security measures, and simulate real-world cyberattacks to assess and improve their organization’s defenses. Designed for non-experts, it equips businesses with essential tools to protect their networks from cyber threats.

  • Course
  • By trustilio BV
€1.700
Product image for Penetration Testing

Penetration Testing

This course provides a comprehensive introduction to penetration testing, equipping participants with the skills and techniques needed to assess the security of systems, networks, and applications. Participants will learn how to simulate real-world cyberattacks to identify vulnerabilities and evaluate the effectiveness of existing defenses. The course covers the entire penetration testing lifecycle, including reconnaissance, exploitation, and reporting, while emphasizing ethical practices and compliance standards. Through hands-on labs and practical exercises, attendees will gain the tools to conduct effective penetration tests and strengthen the overall security posture of their organizations.

  • Course
  • By trustilio BV
€1.500
Product image for Risk Assessment & Management

Risk Assessment & Management

This course provides a comprehensive understanding of risk assessment and management principles, focusing on identifying, analyzing, and mitigating risks in organizational and technological contexts. Participants will explore key methodologies and frameworks for assessing risks, including qualitative and quantitative approaches, and learn to develop effective risk management strategies. The course emphasizes proactive planning to minimize potential threats and enhance resilience. Through practical exercises, real-world case studies, and collaborative projects, students will gain the skills to evaluate risk scenarios, prioritize mitigation efforts, and implement risk management plans to support organizational objectives and compliance requirements.

  • Course
  • By trustilio BV
€1.650
Product image for Social Engineering Techniques in Cybersecurity

Social Engineering Techniques in Cybersecurity

This course delves into the role of social engineering in cybersecurity, focusing on the psychological and behavioral tactics used by attackers to exploit human vulnerabilities. Participants will explore various social engineering techniques, such as phishing, pretexting, and baiting, and learn how these methods are employed to manipulate individuals and breach security systems. The course emphasizes identifying and mitigating social engineering threats through awareness, education, and robust security practices. Real-world examples and case studies will provide a practical understanding of how to recognize and defend against these increasingly sophisticated attacks.

  • Course
  • By trustilio BV
€1.500
Product image for Strategic Communication in Managing Cybersecurity Incidents

Strategic Communication in Managing Cybersecurity Incidents

Communication in Cyber Incident Response is a specialized course designed to equip participants with the essential communication strategies and skills required during cyber incident response scenarios. The course emphasizes the importance of clear, concise, and effective communication among technical teams, management, and external stakeholders during high-pressure situations. Participants will learn to navigate complex incident timelines, coordinate cross-functional efforts, and deliver timely updates while managing sensitive information. Real-world case studies, role-playing exercises, and best practices are used to simulate incident scenarios, enabling learners to develop confidence in handling press inquiries, regulatory reporting, and stakeholder engagement during cyber crises.

  • Course
  • By trustilio BV
€1.850
Product image for Supply Chains Security

Supply Chains Security

This course provides a comprehensive overview of supply chain security, focusing on the risks and challenges associated with securing global supply chains in an increasingly digital and interconnected world. Participants will explore threats such as cyberattacks, data breaches, and physical vulnerabilities that can disrupt operations and compromise sensitive information. The course emphasizes best practices for identifying and mitigating risks, implementing secure processes, and ensuring the resilience of supply chains. Through case studies and practical exercises, students will gain the skills needed to develop robust security strategies that protect supply chains from end to end.

  • Course
  • By trustilio BV
€1.400
Product image for Trustworthiness Risks in AI: Addressing Psychosocial Threats

Trustworthiness Risks in AI: Addressing Psychosocial Threats

This course examines the impact of psychosocial (PS) threats on the trustworthiness of AI systems, focusing on the interactions between humans and AI participants. Participants will explore how factors such as bias, manipulation, and psychological influence can undermine trust in AI technologies. The course emphasizes strategies for identifying and mitigating these risks through ethical design, transparent communication, and user-centric approaches. Through case studies and practical exercises, students will gain the skills to assess and address psychosocial threats, fostering more reliable and trustworthy AI systems in diverse applications.

  • Course
  • By trustilio BV
€1.600
Product image for Understanding the Human Element in Cybersecurity: A professional seminar in cyberpsychology

Understanding the Human Element in Cybersecurity: A professional seminar in cyberpsychology

This professional seminar delves into the human element in cybersecurity, offering a deep dive into the field of cyberpsychology. Participants will explore how human behavior, decision-making, and cognitive biases influence cybersecurity practices and outcomes. The seminar highlights the psychological tactics used by attackers, such as social engineering, and examines how individual and organizational behavior can both enhance and undermine security. Through interactive discussions and case studies, attendees will gain insights into fostering a security-conscious culture, improving user awareness, and addressing human vulnerabilities to build more resilient cybersecurity frameworks.

  • Course
  • By trustilio BV
€1.800
21 products found