- Connecting to the service
- User training and testing with various traps and templates used in real attacks on the following topics:
- Secure Internet and Email,
- Physical Security,
- Mobile Security
- Program interface for managing and viewing the service's statistics