{"id":637,"date":"2025-09-28T00:23:24","date_gmt":"2025-09-28T00:23:24","guid":{"rendered":"https:\/\/dev.networks.engineering\/?page_id=637"},"modified":"2025-10-17T11:16:13","modified_gmt":"2025-10-17T11:16:13","slug":"cyber-security-training","status":"publish","type":"page","link":"https:\/\/www.networks.engineering\/index.php\/cyber-security-training\/","title":{"rendered":"Cyber Security Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"637\" class=\"elementor elementor-637\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e0f900 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"8e0f900\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e61298 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1e61298\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">\nCyber Security &amp;\nAwareness Training<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-193b7d1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"193b7d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"c-full-bleed-title module-68e8104c2676f\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e89428bff46\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><p><strong>IT security-focused user awareness training for organisations across Europe<\/strong><\/p><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a67b2a e-flex e-con-boxed e-con e-parent\" data-id=\"4a67b2a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16a16f1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"16a16f1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User Awareness Training\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4f0f75 elementor-widget elementor-widget-text-editor\" data-id=\"b4f0f75\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security concerns are ever increasing in modern organisations.\u00a0Approximately\u00a088% of cyber breaches\u00a0occur as a result of an employee mistake. So providing ongoing cyber security training to staff is key to raising awareness of evolving threats and attack vectors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d305517 elementor-widget elementor-widget-text-editor\" data-id=\"d305517\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Networks Engineering offers cyber security awareness training services to organisations across Europe. Rather than stale and forgettable seminars, our cyber security training embraces a proactive approach that tests unsuspecting users during their working hours. We then provide interactive online training to ensure that lessons are learned about cyber risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9347e1e elementor-widget elementor-widget-text-editor\" data-id=\"9347e1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><p>Networks Engineering is an expert partner for Cyber Essentials Europe and organisations trust. With in-house Cyber Essentials and Plus assessors and a team of wider cyber security consultants, we\u2019ll ensure your IT systems and processes are up to standard and protected to get you through your accreditation.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3cf416 elementor-widget elementor-widget-text-editor\" data-id=\"f3cf416\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c26fd2\"><div class=\"o-container c-text-block__container\"><p>Our training services are designed to be run throughout the year: ensuring ongoing vigilance against cyber threats within your organisation.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f6826e elementor-widget elementor-widget-text-editor\" data-id=\"2f6826e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e47cdf1ea2f\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e6409d3869b\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e8104c26fd2\"><div class=\"o-container c-text-block__container\"><div class=\"c-text-block module-68e89428c0635\"><div class=\"o-container c-text-block__container\"><p><strong>Enquire how our training can increase cyber security awareness in your organisation:<\/strong><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa55490 e-flex e-con-boxed e-con e-parent\" data-id=\"fa55490\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-899afc4 e-con-full e-flex e-con e-child\" data-id=\"899afc4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f058410 e-con-full e-transform e-flex e-con e-child\" data-id=\"f058410\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f61f391 elementor-widget elementor-widget-heading\" data-id=\"f61f391\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Schedule Cyber Security Training\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46f1e88 elementor-widget elementor-widget-text-editor\" data-id=\"46f1e88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Get in touch to arrange user awareness training for cyber security threats:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42af61e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"42af61e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22a13c8 e-con-full e-flex e-con e-parent\" data-id=\"22a13c8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-255f0f6 e-con-full e-flex e-con e-child\" data-id=\"255f0f6\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9da78b3 e-con-full e-flex e-con e-child\" data-id=\"9da78b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-001fdf7 elementor-widget elementor-widget-heading\" data-id=\"001fdf7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Cyber\nSecurity Training\nIs Essential<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24b47b7 elementor-widget elementor-widget-text-editor\" data-id=\"24b47b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Due to our reliance on IT systems and the risk associated with data breaches both financially and reputationally, cyber security training is a critical layer of defence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e6486 elementor-widget elementor-widget-text-editor\" data-id=\"10e6486\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>By equipping employees with the knowledge, skills, and awareness necessary to identify and mitigate potential risks, cyber security training plays a pivotal role in safeguarding businesses from the ever-evolving threat of cyber-attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32a0720 elementor-widget elementor-widget-text-editor\" data-id=\"32a0720\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security training empowers employees to recognise threats such as phishing emails, malware infections and social engineering attacks. Additionally, promoting regular training sessions creates a culture of cyber awareness and ingrains the mindset into your employee\u2019s every day operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-795f92b elementor-widget elementor-widget-text-editor\" data-id=\"795f92b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e6409d3bc25\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e89428c0dc2\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><div><p>As mentioned above, organisations\u2019 biggest security vulnerabilities are their people, yet for some reason many focus on safeguarding other areas and disregard this key piece of the puzzle. Employee\u2019s have a duty to protect their respective organisations, but they need to first understand that they have that role, and second understand how to do it vigilantly.<\/p><\/div><\/div><\/div><\/section><section class=\"c-text-image-grid c-text-image-grid--cta-blue  c-text-image-grid--img-left module-68e89428c160c\"><div class=\"o-container c-text-image-grid__container\"><div class=\"c-text-image-grid__image-holder\"><div class=\"c-text-image-grid__image-container\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/section><div class=\"c-text-block module-68e6409d3c45e\"><div class=\"o-container c-text-block__container\">\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24775b7 e-con-full e-flex e-con e-child\" data-id=\"24775b7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-816c428 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"816c428\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2048\" height=\"1271\" src=\"https:\/\/www.networks.engineering\/wp-content\/uploads\/2025\/10\/photo_2025-10-10_10-58-32.jpg\" class=\"attachment-full size-full wp-image-1546\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3d52f6 e-flex e-con-boxed e-con e-parent\" data-id=\"a3d52f6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4934f3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c4934f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding Our Cyber Security Training\nServices\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8c7ad7 elementor-widget elementor-widget-text-editor\" data-id=\"d8c7ad7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e89428c221e\"><div class=\"o-container c-text-block__container\"><p>We appreciate organisations don\u2019t have the time for teams to sit through afternoons of training that may not even be effective for them. Our approach is more practical and ongoing, ensuring that users remain vigilant at all times:<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abde813 e-con-full e-flex e-con e-parent\" data-id=\"abde813\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-db53c64 e-con-full e-flex e-con e-child\" data-id=\"db53c64\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40a3b06 e-con-full e-flex e-con e-child\" data-id=\"40a3b06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd73168 elementor-widget elementor-widget-heading\" data-id=\"dd73168\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Cyber\nSecurity Training\nIs Essential<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ab2de6 elementor-widget elementor-widget-text-editor\" data-id=\"1ab2de6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Coordinating with your IT team or leadership, we run an AI-crafted phishing attack simulation for your unsuspecting user base, identifying those who might interact with dangerous email or online content.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6c5245 elementor-widget elementor-widget-text-editor\" data-id=\"b6c5245\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>\u00a0Leadership can then choose whether everyone or only those who fail the attack simulation move on to our user awareness training. This is then delivered as an interactive online security course that the users must engage with and complete correctly to pass. This guarantees engagement.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-235e594 elementor-widget elementor-widget-text-editor\" data-id=\"235e594\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e6409d3bc25\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e89428c0dc2\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><ul><li>Further attack simulations can then be scheduled later at a frequency of your choice (monthly, bi-monthly or quarterly) to check that knowledge has been retained and that staff remain threat-aware.<\/li><\/ul><\/div><\/div><\/section><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5220ad elementor-widget elementor-widget-text-editor\" data-id=\"e5220ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e6409d3bc25\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e89428c0dc2\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><ul><li>We can also provide an annual assessment of cyber security awareness, which can be provided to insurers to reduce rates.<\/li><\/ul><\/div><\/div><\/section><\/div><\/div><\/section><div class=\"c-text-block module-68e6409d3c45e\"><div class=\"o-container c-text-block__container\">\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73968e9 e-con-full e-flex e-con e-child\" data-id=\"73968e9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1d65f4 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"f1d65f4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/www.networks.engineering\/wp-content\/uploads\/2025\/10\/PreventingNetworkThreats_Gorodenkoff-scaled-1.jpg\" class=\"attachment-full size-full wp-image-2243\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8584afe e-flex e-con-boxed e-con e-parent\" data-id=\"8584afe\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c92c85b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c92c85b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Networks Training Advantage\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c456c2 elementor-widget elementor-widget-text-editor\" data-id=\"5c456c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e89428d4a6d\"><div class=\"o-container c-text-block__container\"><p>Unlocking the full potential of cyber security training begins with the right partner, and at Networks, we offer a distinct advantage that sets us apart from other providers.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4db63d e-flex e-con-boxed e-con e-parent\" data-id=\"e4db63d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4ba094 e-con-full e-flex e-con e-child\" data-id=\"c4ba094\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb07a8a elementor-widget elementor-widget-text-editor\" data-id=\"bb07a8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Experienced Cyber Security Professionals:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f074731 elementor-widget elementor-widget-text-editor\" data-id=\"f074731\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div><p>Central to our cyber security awareness training is our team of seasoned experts, each with a wealth of experience and industry-leading certifications. Our specialists bring real-world insights and practical knowledge to every aspect of our offering, ensuring that users taking the training not only understand theoretical concepts but also gain actionable skills that they can apply immediately in their roles.<\/p><\/div><div>\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62b1102 e-con-full e-flex e-con e-child\" data-id=\"62b1102\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37acf44 elementor-widget elementor-widget-text-editor\" data-id=\"37acf44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Experienced Cyber Security Professionals:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ebe72f elementor-widget elementor-widget-text-editor\" data-id=\"2ebe72f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e89428d4e4b\"><div class=\"o-container c-text-block__container c-text-block__container--two-cols\"><div><p>We understand that every organisation is unique, with its own sets of challenges, objectives, and technological environments. As such, we tailor our training programs to meet the specific needs and requirements of each individual user with the help of AI technology. Whether you\u2019re looking to address specific vulnerabilities, comply with industry regulations, or upskill your workforce, our customised training solutions deliver maximum impact and value.<\/p><\/div><\/div><\/div><section class=\"module-68e89428d52b6\"><div class=\"c-cta-bar fade-in-up c-cta-bar--copy-white c-cta-bar--copy-center c-cta-bar--bg-blue\">\u00a0<\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-175af46 e-flex e-con-boxed e-con e-parent\" data-id=\"175af46\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-01ce35e e-con-full e-flex e-con e-child\" data-id=\"01ce35e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fede33d e-con-full e-transform e-flex e-con e-child\" data-id=\"fede33d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d557365 elementor-widget elementor-widget-heading\" data-id=\"d557365\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discuss Cyber Security Training Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8e41d0 elementor-widget elementor-widget-text-editor\" data-id=\"a8e41d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>To start a discussion about training your staff base, please, ge in touch:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13c8bcd elementor-align-center elementor-widget elementor-widget-button\" data-id=\"13c8bcd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cb8521 e-flex e-con-boxed e-con e-parent\" data-id=\"9cb8521\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3b60aca e-con-full e-flex e-con e-child\" data-id=\"3b60aca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca03bcd elementor-widget elementor-widget-heading\" data-id=\"ca03bcd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FAQs About Our Cyber Security Training\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5d1448 elementor-widget elementor-widget-n-accordion\" data-id=\"b5d1448\" data-element_type=\"widget\" data-settings=\"{&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;default_state&quot;:&quot;expanded&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1900\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1900\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What types of cyber security training do you offer? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1900\" class=\"elementor-element elementor-element-dab3b74 e-con-full e-flex e-con e-child\" data-id=\"dab3b74\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5373f1 elementor-widget elementor-widget-text-editor\" data-id=\"e5373f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-accordion active\"><div class=\"c-accordion__answer-holder\"><div><div><p>At Networks, we offer a wide range of cyber security training programs tailored to meet the diverse needs of businesses. Our offerings include but are not limited to: phishing awareness training, cyber security fundamentals, incident response training, compliance training, and more.<\/p><\/div><\/div><\/div><\/div><div class=\"c-accordion\"><div class=\"c-accordion__question-holder\">\u00a0<\/div><\/div><p>We\u2019re customer-centric in our operations, focusing on satisfaction and success for our supported organisations through our service delivery.<\/p><p>Plus, our range of managed IT services, strategic consultancy and account management ensure we have the solutions to support you at every stage of your success.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1901\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1901\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How long are your training programs? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1901\" class=\"elementor-element elementor-element-77fa929 e-con-full e-flex e-con e-child\" data-id=\"77fa929\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1da3371 elementor-widget elementor-widget-text-editor\" data-id=\"1da3371\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-accordion active\"><div class=\"c-accordion__answer-holder\"><div><div><p>The duration of our training programs varies depending on the specific topic, the depth of coverage, and the needs of your organisation. We offer both short, quicker courses and longer, more comprehensive programs to accommodate different schedules and learning objectives.<\/p><\/div><\/div><\/div><\/div><div class=\"c-accordion\"><div class=\"c-accordion__question-holder\">\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1902\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1902\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Do you offer training for employees at all levels of technical understanding? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1902\" class=\"elementor-element elementor-element-2288d75 e-con-full e-flex e-con e-child\" data-id=\"2288d75\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-789b399 elementor-widget elementor-widget-text-editor\" data-id=\"789b399\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-accordion active\"><div class=\"c-accordion__answer-holder\"><div><div><p>Yes, we cater to participants with varying levels of technical expertise, from beginners to advanced professionals. Our training programs are designed to be accessible and engaging for learners at all skill levels, ensuring that everyone can benefit from our courses regardless of their prior experience in cyber security.<\/p><\/div><\/div><\/div><\/div><div class=\"c-accordion\"><div class=\"c-accordion__question-holder\">\u00a0<\/div><\/div><div class=\"c-accordion active\"><div class=\"c-accordion__answer-holder\"><div><div><p>We also prioritise support on issue severity. So if you\u2019re issue is business critical, you\u2019ll be prioritised.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1903\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1903\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How do you measure the effectiveness of your training programs? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1903\" class=\"elementor-element elementor-element-01e182b e-flex e-con-boxed e-con e-child\" data-id=\"01e182b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce4a2f6 elementor-widget elementor-widget-text-editor\" data-id=\"ce4a2f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-accordion-group module-68e89428d5921\"><div class=\"o-container\"><div class=\"c-accordion active\"><div class=\"c-accordion__answer-holder\"><div><div><p>We employ various methods to measure the effectiveness of our training programs, including pre- and post-training assessments, participant feedback surveys and performance metrics tracking. By evaluating learner comprehension, behaviour change, and overall program satisfaction, we continuously refine and improve our training offerings to ensure maximum effectiveness.<\/p><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"c-services-grid module-68e89428d5d6b c-services-grid--bg-gray\"><div class=\"o-container c-services-grid__container\"><div class=\"c-services-grid__content\"><div class=\"c-services-grid__intro\"><div><h4>\u00a0<\/h4><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e17909 e-con-full e-flex e-con e-parent\" data-id=\"4e17909\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-924cf70 e-con-full e-flex e-con e-child\" data-id=\"924cf70\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bd1ab8c e-con-full e-flex e-con e-child\" data-id=\"bd1ab8c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-244aba1 elementor-widget elementor-widget-heading\" data-id=\"244aba1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Getting Started\nWith Cyber\nSecurity Training\nAt Networks ENGINEERING<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-376f175 elementor-widget elementor-widget-text-editor\" data-id=\"376f175\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As an expert cyber security partner to the private and public sectors, we work with organisations across the Europe to enhance their defences.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19cec81 elementor-widget elementor-widget-text-editor\" data-id=\"19cec81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>To get started with cyber security training please get in touch with a member of our team:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b32d633 elementor-widget elementor-widget-text-editor\" data-id=\"b32d633\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Call us on: 372 60 26503<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8d090 elementor-widget elementor-widget-text-editor\" data-id=\"2d8d090\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e6409d3bc25\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-right c-text-image--full-bleed module-68e89428c0dc2\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><p>Email us on:\u00a0<a href=\"mailto:info@networks.engineering\">info@networks.engineering<\/a><\/p><\/div><\/div><\/section><\/div><\/div><\/section><div class=\"c-text-block module-68e6409d3c45e\"><div class=\"o-container c-text-block__container\">\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c37b5d8 elementor-widget elementor-widget-text-editor\" data-id=\"c37b5d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Or alternatively click to complete our contact form below and one of our experts will be in touch:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-433e83b e-con-full e-flex e-con e-child\" data-id=\"433e83b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e110031 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"e110031\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/www.networks.engineering\/wp-content\/uploads\/2025\/10\/c339ab439970dd79b3fd89a347a44821-scaled.jpg\" class=\"attachment-full size-full wp-image-2244\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75a2e40 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"75a2e40\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-388bc9e elementor-widget elementor-widget-heading\" data-id=\"388bc9e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">User awareness training\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ab092a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"0ab092a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Get In Touch<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cddc496 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"cddc496\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"main-section\"><div class=\"container-main-1160\">Complete our form to hear from one of our experts:<\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0763998 elementor-widget elementor-widget-button\" data-id=\"0763998\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Form<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security &amp; Awareness Training IT security-focused user awareness training for organisations across Europe User Awareness Training Cyber security concerns [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-637","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":0,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/media?parent=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}