Course : Cybersecurity: User Awareness

Cybersecurity: User Awareness

Download in PDF format Share this course by email 2


This course will teach you the risks and consequences of a user action that affects the security of the information system, enable you to explain and justify the constraints imposed by the security policy, and help you understand the main countermeasures in place within the company.


Inter
In-house
Custom

Synthesis course in person or remote class

Ref. SES
Price : 950 € E.T.
  1d - 7h00




This course will teach you the risks and consequences of a user action that affects the security of the information system, enable you to explain and justify the constraints imposed by the security policy, and help you understand the main countermeasures in place within the company.

Teaching objectives
At the end of the training, the participant will be able to:
  • Understand the types of IS security risks and their possible consequences
  • Identify measures to protect information and secure your workstation
  • Promote adherence to the company's IS security policy

Intended audience
All users with access to the Information System via a computer workstation.

Prerequisites
No particular knowledge.

Course schedule

Computer security: Understanding the threats and risks

  • Introduction: general framework, what is meant by IT security (threats, risks, protection)?
  • How can negligence create a disaster? Some examples. Responsibility.
  • The components of an IS and their vulnerabilities. Client and server operating systems.
  • Corporate networks (local, site-to-site, Internet access).
  • Wireless networks and mobility. Applications at risk: Web, email, etc.
  • Database and file system. Threats and risks.
  • Sociology of hackers. Underground networks. Motivations.
  • Types of risks. Cybercrime in France. Vocabulary (sniffing, spoofing, smurfing, hijacking, etc.).

Information protection and workstation security

  • Vocabulary. Confidentiality, signature and integrity. Constraints of encryption.
  • General overview of cryptographic elements. Windows, Linux or MAC OS: Which is the most secure?
  • Management of sensitive data. The problem of laptops.
  • What is the threat on the client workstation? What malicious code is.
  • How do you deal with security breaches? The USB port. The role of the client firewall.

User authentication and access from outside

  • Access controls: authentication and authorization.
  • Why is authentication important?
  • The traditional password.
  • Authentication by certificates and tokens.
  • Remote access via the Internet. Understanding VPNs.
  • The value of strong authentication.

How can you get involved in IS security?

  • Risk, vulnerability and threat analysis.
  • Regulatory and legal constraints.
  • Why does my organization need to meet these security requirements?
  • Key people in security: understanding the role of the CISO and the Risk Manager.
  • Acting for better security: social and legal aspects. The CNIL and legislation.
  • Cyber-surveillance and privacy protection.
  • The charter for the use of computer resources.
  • Everyday security. The right reflexes. Execution.


Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class