CyberSecurity Connect 2

Modern cybersecurity does not react – it prevents.

Strengthen your company’s digital resilience!

Training360’s blended learning course provides practical knowledge for planning, executing, and interpreting the business impact of automated vulnerability assessments.

We do not just teach tool usage. We show how to build a well-documented, auditable vulnerability assessment project from both technical and organizational perspectives.

Attacks are automated. Assessments must be too.

Vulnerability assessments must also be conducted professionally, in an auditable way, and in a manner that is meaningful from a business perspective.

The training helps participants to

  • Identify cybersecurity risks in time
  • Run a structured vulnerability assessment project
  • Apply an ethical hacker mindset
  • Validate findings from automated tools
  • Create clear, well-founded reports

The program complies with the requirements of EM Decree 17/2025. (VII. 24.) and is also relevant in an NIS2 audit environment.

Key topics of the training

  • System-level understanding of vulnerabilities and risks – Practical use of international standards, classifications, and databases.
  • Building vulnerability assessment projects – Defining scope, responsibilities, audit scenarios, evaluation of results, and documentation.
  • Infrastructure discovery and testing – Network and system-side assessments, OSINT basics, and the use of automated tools.
  • Validation of findings and basics of exploitation – Confirming vulnerabilities with an attacker mindset, using red and blue team thinking.
  • Reporting and executive communication – Creating transparent, business-relevant cybersecurity reports.
  • Tool-independent security mindset – Solid professional foundations that can also be applied in development, operations, and compliance environments.

What does the training provide?

  • Real, immediately applicable technical knowledge
  • A stable, tool-independent security mindset
  • An ethical hacker mindset
  • Effective validation methods
  • Audit-compatible project design practices
  • A marketable professional advantage

Vulnerability assessment is one of the most sought-after IT security skills today.

Who is it recommended for?

  • System administrators and operators
  • Junior security professionals
  • Information security leaders
  • Professionals working in GRC
  • Professionals at organizations involved in NIS2 audits
  • IT professionals looking to grow toward ethical hacker or pentester roles

Relevant in both SME and enterprise environments.

Training format

  • Online, blended learning format
  • 8 weeks (approx. net 40 hours)
  • Live online sessions (Wednesdays 17:00–20:00)
  • Recorded video modules
  • Practical assignments
  • Knowledge checks and tests
  • In your own or remotely accessible lab environment

Live sessions can be watched back later.

Training completion

The automated vulnerability assessment training concludes with a 50-question online knowledge test. Upon successful completion, we issue a certificate in accordance with the adult education law.

The training can be accounted for as cybersecurity continuing education in the areas defined in Sections 3 and 4, points a), b), e), and g) of EM Decree 17/2025. (VII. 24.).

Sándor Kiss

information security expert and trainer.

your trainer

Sándor Kiss

He has more than 20 years of experience in the online financial, automotive, and manufacturing sectors.

He provides security consulting in domestic and international projects, and in his trainings he shares practical, real-world knowledge in the fields of ethical hacking and IT infrastructures.

Why choose Training360’s training solution?

  • A curriculum aligned with the current legal and technological environment
  • An experienced trainer with strong practical expertise
  • A combined technical and organizational approach
  • Practice-oriented training with real-life examples
  • Flexible blended learning format with replayable materials

Don’t just react. Prevent it.

TRAINING PACKAGES AND PRICING
STANDARD

With your own computer and lab environment

349,000 HUF/person
STATUS ● REGISTRATION OPEN
START DATE 2026. 05. 06.
APPLICATION DEADLINE 2026. 04. 24.

Still have questions?

Our expert colleagues are happy to help you with any questions related to the training.

IT course solutions
Ferenc Simon
I have a question

Curious about the full cybersecurity picture?

Take a look at the first training in our CyberSecurity Connect series as well, which focuses on building cyber defense lines and incident management.

I'M INTERESTED