EN
0
Basket

Your basket is empty

background section

Cybersecurity: practical security for you and your business

This course will make you aware of the need to protect your information and data and will teach you to avoid potential intrusions and acts of malicious intent. No description or technical content, but an interactive course with practical applications that are simple and easy to remember for both your professional and private security.

Inschrijvingsvoorwaarden

  • Training type

    $name

  • Duration of training

    1 day

  • Available languages
    EN 
  • Training code

    1928E

What do you learn?

These days, we all have access to connected IT tools, be it at work or at home. We tend to underestimate the existence of omnipresent dangers, despite the many events reported by the press: data leakages, financial losses, identity theft, phishing, malware, ransomware, etc.

 

This training is also available in virtual classroom.

 

  • Awareness of the real dangers of digitalisation
  • Capacity to anticipate, recognise, distinguish and avoid the various risks
  • Use of good practices (browsing the Web, passwords, use of PC and smartphone, the social networks, etc.)
  • Adoption of the right reflexes and automatic reactions
  • Use of effective, fast protection and avoidance tools that are easy to deploy

Target group

Anyone who uses IT or digital tools. This course also covers security linked to personal contacts and any visitors.

Required prior knowledge

No prior knowledge is required.


To bring on the day of the training: this training will take place in a room without a PC but equipped with an Internet connection. If you have a personal laptop and/or tablet, we advise you to bring them with you. It is also important that you have your charged smartphone at your disposal.  

Overview of the programme

  • Global context
    • Terminology: malware, backdoor, phishing, ransomware, keylogger, skimming, spoofing, hoax, sniffing, trojan horse, social engineering, dark web, (s)extortion.
    • Sharing experiences with and among participants

  • The dangers
    • Data exchange (connections)
    • Data storage (types of storage)

  • Identifying the threats simply and quickly
    • Messages (emails, texts, social networks)
    • Websites
    • Dangerous files
    • Human contacts (by telephone or in person)

  • Protection settings
    • Web browsers
    • Outlook and other email clients
    • Social networks

  • Good habits and reflexes
    • Passwords
    • Other best practices