Information Security Training

Our information security training equips your team with practical skills to recognise threats, handle data safely, and stay compliant.
Gabrielius Vinciūnas
Head of Information Security
Vitalis Kavaliauskas
Chief Technology Officer

Our Information Security Training Offers

Employee awareness training

Practical training, designed to build everyday security awareness and reduce human-related risks across the organisation.
Safe internet usage.
Email and messaging security.
Password hygiene.
Malware and phishing awareness.
Secure remote work.
Device security.
Deliverables:
Improved employee understanding of security and social engineering threats, safer data handling practices, and access to learning material.
Penetration-testing

Management-level security training

Strategic training for leaders to strengthen security decision-making, incident response, and regulatory awareness.
NIS2 and other EU regulatory requirements.
Managing incidents and escalations.
Department-level security responsibilities.
Business continuity and crisis planning.
Risk handling within the organisation.
Deliverables:
Enhanced escalation of readiness, clearer communication with security teams, and improved organisational risk management.

How Our Information Security Training Works

01

Training scope evaluation

We assess employee knowledge levels, identify existing risks, and establish a clear security awareness baseline.
02

Custom programme design

We design a tailored training programme aligned with your industry and regulatory requirements.
03

Training delivery (online or onsite)

We deliver interactive sessions using real-world examples, quizzes, and scenario-based learning in Lithuanian or English.

04

Reinforcement & follow-up

We reinforce learning through tests, recordings, and practical materials shared after the training.

05

Reporting & certification

We provide information security training and participation reports, including certificates if required.

Why Baltic Amadeus

Certified cyber security specialists.

Option to add tailored training topics.

Can be combined with phishing attack simulation.

Certifications

CISA Certified Information Systems Auditor logo with a red circular design.
CISA
CISSP certification badge with white text on a green rounded square background.
CISSP
CEH Certified Ethical Hacker Master logo with bold text in black and red.
CEH
Certification mark for TÜV Thüringen with a red checkmark and a red mask symbol.
ISO 27001

FAQ

Is training available online or on-site?

Training can be delivered online or onsite, depending on your preference and location.

Do employees receive certificates?

Certificates of attendance are provided upon request.

How long does the training take, and how many employees can join?

Training sessions usually last between 2 and 3 hours. The duration can be extended if additional or specific topics are requested. Group size is flexible and tailored to your organisation.

Case Studies

Related Services

Let’s talk about your project

Starting something new or need support for an existing project? Reach out, and our experts will get back to you within one business day.

Start the conversation

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.