Cybersecurity training course

This training course will allow you to implement in your personal (in your day to day life) and/or professional (in your company) life digital skills and good cybersecurity practices. It is intended for professionals who want to further their knowledge, understand the mechanisms of approximation and/or convergence in the cybersecurity and data privacy fields, and understand the stake of a company’s digital transition and its impact on the employees.

 

TRAINING LOCATION

The training course is entirely done remotely, through Webex, a video conference tool.

FINANCING

Contact us to get a cost estimate.

Goals

1. Identify and analyse cybersecurity issues with the aim of ensuring intelligence and economic security.
2. Take into account all security aspects in an organisation.
3. Identify threats linked to the use of digital spaces and social media, a company’s private platforms and public platforms.
4. Adopt good cybersecurity practices for both companies and individuals.
5. Protect a company’s intangible property by using digital tools and inherent services.
6. Establish a management protocol for IT incidents: from detection to crisis management.

 

Specific conditions and prerequisites

Have basic knowledge of the office pack (Microsoft Office, browsers, Windows and Android operating systems).

Understand the notion of information systems and its adherences and outcomes.

Program

1. A company’s digital transition The digital transition of companies is explained through examples: vertical integration, profiling and digital marketing, digital communication, websites, the blurred lines between professional and personal life.

2. The (new) uses    
   • BYOD,

   • The right to disconnect,
   • Using one’s right regarding the GDPR. Dereferencing on the internet

3. Digital skills    
   • Password policy and password managers

   • Data back-up policy
   • The convergence of equipment: computers, smartphones and tablets
   • Messaging services and the reservation of a domain
   • Connectivities: wired vs. wireless; VPNs and secure web access
   • “Public” clouds vs. “private” clouds (NAS)
   • Profiling on the internet
   • Search engines and privacy
   • Digital identity

4. Good practices and cybersecurity    
   • Physical, logical and organisational security

   • Encryption:
      • Basic algorithmic and mathematical principles
      • Mechanisms with public keys (asymmetrical) and symmetrical
      • Decryption protocol
      • Quantum cryptography
    • Authentication and access management
    • Managing incidents

5. Security by Design    
   • Security from the designing of products, services, softwares

   • Data protection by design and by default

6. Certifications ISO 2700x, HDS, SOC1, SOC2, CFIUS

7. Attacks    
   • Social engineering, DoS

   • Botnets

8. Participants    • Bodies responsible for ensuring the security of sensitive information (ANSSI)
   • Cyberattackers
   • Data protection agencies (CNIL, ISO)
   • ENISA
   • CERT

  

Intended audience

· Jurists,
· Associates,
· Human resources and marketing managers.

Want to learn more?

To attend the training course, contact us to get a cost estimate. 

CONTACT US