Cette formation est proposée sous forme de formation à distance. En savoir plus

Cybersecurity Management


En collaboration avec:

Voir plus



Welcome to our Cybersecurity Management course. This comprehensive training aims to equip participants with an overall view of cybersecurity and its related challenges. By the end of the course, you'll have covered various cybersecurity areas, gained insights into user safety and basic cybersecurity concepts. You'll understand the purpose of cybersecurity, how to manage security, security controls, incident response, software security, cloud and mobile security, and more.


At the end of this course, the participants will have an overall view of Cybersecurity and the problems related to this subject, which will allow them to guide their choices and their mission taking into account the risks associated with cyber security.

To this end, by the end of the course they will have

  • covered the various areas of Cyber Security
  • obtained notions of user safety - individual behavior (passwords, email, mobility, social networks) and basic notions of Cyber Security
  • obtained answers to the following questions:
    • What is the purpose of CyberSecurity?
    • How to manage security?
    • What are the security and defense controls?
    • What are the means to respond to security incidents?
  • understood how an attack is performed
  • reviewed the context of regulation 
  • reviewed ethics and standards related to Cyber Security
  • Threats and attacks
    • What are the threats?
    • Understand how an attack occurs
    • Attacker profiles
  • Information security basics
    • What is the purpose of Cyber Security?
    • Basics: Basic triad, notions of risk, threat, vulnerability, impact
    • The return on investment of security
    • Security lines of defense
  • Information security management and governance
    • How to manage security
    • Roles and responsibilities
    • Security controls
    • Security policies
  • Audits and tests
    • Security audits
    • Security testing
    • Pen tests
  • Security incident management
    • How to manage security incidents
    • Security Operation Center (SOC) -Computer Security Incident Response Team (CSIRT)
    • Crisis management
  • Software security
    • Software development and application security
    • Software security testings, xAST
    • DevOpsSec
  • Cloud and mobile security
    • Cloud security controls – CASB
    • Mobile device security
  • Security awareness
    • User security concepts -individual behavior
    • Methods
Target Audience

IT and Security professionals (Executives and Management Levels), Risk Managers and Officers, Compliance Managers and Officers, Auditors


Course Material

Please note that for environmental reasons no paper version of the training material will be provided for your training. The course material can be downloaded free of charge via your portal before the start of the course (download the Client Portal User’s Guide here). You will be able to view it on the screen of your mobile device or print it if necessary. If your registration has been made by a training manager of your company please contact him/her so that he/she can give you access to it or send it to you.


No exam is available for this training course.

Classe virtuelle
A distance
Calculate the itinerary