Courses & Training
At Recab we recognize and cherish the possibility to provide our customers more than solely products through several types of services. One of our services is to offer our customers training within our specialist areas. We acknowledge this as a way for our customers to invest in their staff to ensure a high knowledge level of operation, service and support and there-through achieve a wider rage of accessibility in their processes.
Today we offer our customers training within industrial networks, Cyber security and IloT. These sessions are both theoretical and practical to ensure that the knowledge we teach is valuable and functional to the working methods of our customers. We also have the opportunity to give our customers access to webinars, both live broadcast and pre-filmed from us and our suppliers.
Our courses are held as open groups with participants from companies within the targeted field of work, as well as the opportunity to custom the education for a specific customer and their company.
Read more about the course and make a booking here
Basic course in Industrial Networks, Cyber security and Remote control
Continuous and advanced course in Remote control with ICOM OS
This education is aimed towards people who have undergone the base course in Remote control with us at Recab or possess equivalent knowledge about Ethernet and Remote control.
The course covers ICOM OS – basic configuration, security, VPN and firewalls, as well as mobile connetion (2G/3G/4G/5G), WAN/WWAN and repetition of IP-addresses and routing, with a focus on hands-on training with ICOM OS from Insys.
Digital Security 3 – 5 – 10: Technology – Processes – Identify – Protect – Detect – Recover
Educate yourself in Cyber Security, ask questions to leading experts with experience – Then be a star and strengthen your organization! This course is designed to train participants in ‘Digital Security 3 –5 –10’.
At the conclusion of this course, the participant will be able to: – Describe how digital security is as much about people and processes as it is about technology – Describe functional areas of a digital security framework – Identify several Digital Security mitigating actions.