Cybersecurity Management (virtual classroom)

  • Icon Sur demande
  • Icon 4 h
  • icon Formation à distance
  • Icon English
  • Icon BQ163CJ
160,00 EUR

*

(+3% TVA)

   Cette formation est proposée sous forme de formation à distance. En savoir plus

Objectives


At the end of this course, the participants will have an overall view of Cybersecurity and the problems related to this subject, which will allow them to guide their choices and their mission taking into account the risks associated with cyber security.


To this end, by the end of the course they will have

  • covered the various areas of Cyber Security

  • obtained notions of user safety - individual behavior (passwords, email, mobility, social networks) and basic notions of Cyber Security

  • obtained answers to the following questions:

    • What is the purpose of CyberSecurity?

    • How to manage security?

    • What are the security and defense controls?

    • What are the means to respond to security incidents?

  • understood how an attack is performed

  • reviewed the context of regulation 

  • reviewed ethics and standards related to Cyber Security

Programme


  • Threats and attacks

    • What are the threats?

    • Understand how an attack occurs

    • Attacker profiles

  • Information security basics

    • What is the purpose of Cyber Security?

    • Basics: Basic triad, notions of risk, threat, vulnerability, impact

    • The return on investment of security

    • Security lines of defense

  • Information security management and governance

    • How to manage security

    • Roles and responsibilities

    • Security controls

    • Security policies

  • Audits and tests

    • Security audits

    • Security testing

    • Pen tests

  • Security incident management

    • How to manage security incidents

    • Security Operation Center (SOC) -Computer Security Incident Response Team (CSIRT)

    • Crisis management

  • Software security

    • Software development and application security

    • Software security testings, xAST

    • DevOpsSec

  • Cloud and mobile security

    • Cloud security controls – CASB

    • Mobile device security

  • Security awareness

    • User security concepts -individual behavior

    • Methods

Target Audience


IT and Security professionals (Executives and Management Levels), Risk Managers and Officers, Compliance Managers and Officers, Auditors

Lieu

Vous souhaitez rester à jour sur notre offre de formation ?

Vous avez une question ?
Nous avons des réponses !