Image
NERO Training Session in Pisa Social Banner
location_on
Pisa, Italy

SEMINAR

NERO Cybersecurity Trainings Session in Pisa

16 May 2025 11:30–13:30

🔐 Cybersecurity in Action — Learn, Simulate, Defend

Imagine if cybersecurity training wasn’t just something you watched—but something you lived.

On May 16th in Pisa, from 11:30 to 13:30 CEST, the partners of the NERO Project consortium invite you to an in-person training session. This isn’t just about knowing what a cyber threat is—it’s about understanding how to spot it, stop it, and stay a step ahead. The training sessions is organised as a fully hands on experience. Participants will have the opportunity to use real cybersecurity tools and solutions provided by the NERO partners free of charge which will be based on real world cybersecurity scenarios. Participants are required to bring laptop, tablet or smartphone in order to fully benefit from the hands on session.

LocationCamera di Commercio Toscana Nord Ovest (Piazza Vittorio Emanuele II, 5 - 56125 Pisa), Sala Leonardo Fibonacci, Second floor.

Note that the session will be held in English.

Because in today’s digital world, the best way to learn cybersecurity… is to live it.


Secure your spot by 6 May 2025

 

REGISTER NOW

 

Choose Your Angle, Play Your Part

This session brings together three training experiences, each with a different flavor—but all with one goal: helping you protect what matters most:

🎭 KIOKU: Decisions Under Pressure. Scenario-Based Cybersecurity Training.

With KIOKU’s scenario-based training, you’ll be dropped into realistic, high-stakes situations drawn from the healthcare, finance, and logistics sectors. Make the call, face the consequences, and get instant feedback on your actions. Whether you're a manager, techie, or new to cybersecurity, KIOKU adapts to your level and your role—because attackers don’t discriminate, and neither should training.

Benefits for the audience: Receiving training on core cybersecurity topics such as malware, phishing, and data breach/GDPR. Through the scenario-based design of the training, participants are engaged in their learning, which has the benefit that they can better relate what they have learned to their work environment. 

Tools needed: Any device that can access a browser, but preferably a bit larger (laptop or tablet). Smartphones work as well.

📡 MMT: Monitoring Made Meaningful. Advanced Network Monitoring using MMT.

Learn how to use the Montimage Monitoring Tool suite—MMT-Probe, MMT-Security, and MMT-Operator—to uncover what’s happening in your network right now. From anomaly detection to policy compliance, you’ll gain the skills to move from guessing to knowing—and from knowing to acting.

Benefits for the audience: Master advanced network traffic monitoring techniques, Learn to detect and analyze security threats using MMT-Security, Gain expertise in protocol analysis, anomaly detection, and QoS monitoring, Hands-on experience with MMT tools and real-world use cases.  

Tools needed: Minimum required is a network connectivity and a browser (Chrome recommended). Option is a virtual machines (using VitualBox) that will be shared for isolated testing; Wireshark (for additional packet analysis) and a Linux-based environment (Ubuntu recommended).

🧰 Network Security Essentials: The ABCs for SMEs.  

This course is built for small and medium-sized enterprises looking to secure their digital space without needing a degree in cryptography. Learn how to identify risks, spot red flags, and apply smart strategies to outsmart attackers. It’s cybersecurity, minus the mystery.

Benefits for the audience: Understand core network security principles and best practices, Identify common cyber threats and vulnerabilities affecting SMEs, Implement essential security measures to protect business networks, Develop a security strategy to enhance SME resilience against cyber threats. 

 

Who’s This For?

If you’re working in or with an SME—and especially if you're in healthcare, finance, or logistics—this training is for you.
Also welcome:

  • Employees, managers, and developers (no cyber background needed)
  • System administrators and network engineers
  • Researchers and students
  • Professionals in 5G, IoT, or cloud security

Got a different background? We’d still love to have you—just let us know in advance.

 

Why attend?

Because reading about a cyber threat is one thing. Responding to it in real time? That’s a whole different skillset. This session gives you the space to experiment, make mistakes, learn fast—and walk away with sharper instincts, better tools, and a clearer view of your role in keeping systems safe.

Bring laptop, tablet or smartphone and join us in Pisa!

Agenda

Timeslot (Local Time) Session Provider
11.30 - 11.40 Introduction to the day and session - the NERO partners will welcome you and introduce the session

- Trust-IT Services
- trustilio BV
- Massive Dynamic Sweden (MDS)
- OneSource (ONE)

11:40 - 12.15 Network Security Essentials Eleni Seralidou (trustilio) 
12:15 - 12:50 Scenario-Based Cybersecurity Training Ole Höfener (MDS)
12.50 - 13:25 Advanced Networking Monitoring using MMT Wissam Mallouli (MONTIMAGE)
13:25 - 13:30 Conclusion and closing session

- Trust-IT Services
- trustilio BV
- Massive Dynamic Sweden (MDS)
- OneSource (ONE)


Secure your spot by 6 May 2025

REGISTER NOW