ESET® AUTHORIZED TRAINING CENTER SERVICE

The free online training platform from ESET

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Authorized Training Center

Join the ESET Authorized Training Center and improve the skill-set of your sales force and customer care representatives.


Why join ESET Authorized Training Center?

Checkmark icon

Online Training

Free of charge online training enables your staff to develop their knowledge and skills.

Checkmark icon

Certification

Upon successful completion of the training and passing the test, all participants receive certification.

Checkmark icon

Benefits

ESET certification opens the door to a range of benefits, offered by ESET partners in their respective countries.

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 milion customer base

Benefits for partners

  • Free online training developed by security experts
  • Resolve most technical issues directly and easily
  • Increase customer satisfaction
  • Respond quickly to customer demands
  • Become an expert on ESET products

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Banking Malware: Countering the threats with certified (browser) protection

Banking apps are quickly becoming the go to method of managing finances, and as a result, mobile banking malware targeting Android phones has become a serious and somewhat underestimated threat.

Malware Researcher + Threat Analyst: two perspectives on the MITRE ATT&CK™ knowledge base

ATT&CK imprints an efficient mapping and documentation process on people engaging in activities as diverse as ruleset creation and product functionality, on to descriptions of threats mapped to...

See more

We Live Security blog

Two US cities opt to pay $1m to ransomware operators

A few days apart, two cities in Florida cave in to extortionists’ demands in hopes of restoring access to municipal computer systems

Stopping stalkerware: What needs to change?

What technology makers and others can – and should – do to counter the kind of surveillance that starts at home