Course : Cybersecurity: User Awareness

Cybersecurity: User Awareness






INTER
IN-HOUSE
CUSTOM

Synthesis course in person or remote class

Ref. SES
  1d - 7h00
Price : Contact us






Teaching objectives
At the end of the training, the participant will be able to:
Understand the types of IS security risks and their possible consequences
Identify measures to protect information and secure your workstation
Promote adherence to the company's IS security policy

Course schedule

1
Computer security: Understanding the threats and risks

  • Introduction: general framework, what is meant by IT security (threats, risks, protection)?
  • How can negligence create a disaster? Some examples. Responsibility.
  • The components of an IS and their vulnerabilities. Client and server operating systems.
  • Corporate networks (local, site-to-site, Internet access).
  • Wireless networks and mobility. Applications at risk: Web, email, etc.
  • Database and file system. Threats and risks.
  • Sociology of hackers. Underground networks. Motivations.
  • Types of risks. Cybercrime in France. Vocabulary (sniffing, spoofing, smurfing, hijacking, etc.).

2
Information protection and workstation security

  • Vocabulary. Confidentiality, signature and integrity. Constraints of encryption.
  • General overview of cryptographic elements. Windows, Linux or MAC OS: Which is the most secure?
  • Management of sensitive data. The problem of laptops.
  • What is the threat on the client workstation? What malicious code is.
  • How do you deal with security breaches? The USB port. The role of the client firewall.

3
User authentication and access from outside

  • Access controls: authentication and authorization.
  • Why is authentication important?
  • The traditional password.
  • Authentication by certificates and tokens.
  • Remote access via the Internet. Understanding VPNs.
  • The value of strong authentication.

4
How can you get involved in IS security?

  • Risk, vulnerability and threat analysis.
  • Regulatory and legal constraints.
  • Why does my organization need to meet these security requirements?
  • Key people in security: understanding the role of the CISO and the Risk Manager.
  • Acting for better security: social and legal aspects. The CNIL and legislation.
  • Cyber-surveillance and privacy protection.
  • The charter for the use of computer resources.
  • Everyday security. The right reflexes. Execution.


Customer reviews
4,5 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations

On 19 June 2025 *
FR
Remote class
Registration
On 19 June 2025
FR
Remote class
Registration
On 2 October 2025 *
FR
Remote class
Registration
On 4 December 2025
FR
Remote class
Registration