- Tu 24 Nov '20 09:00 - 12:00
- Th 26 Nov '20 09:00 - 12:00
At your PC
- Tu 15 Dec '20 09:00 - 12:00
- Th 17 Dec '20 09:00 - 12:00
At your PC
This course will make you aware of the need to protect your information and data and will teach you to avoid potential intrusions and acts of malicious intent. No description or technical content, but an interactive course with practical applications that are simple and easy to remember for both your professional and private security.
- Training type
- Duration of training
- Available languagesEN
- Training code
These days, we all have access to connected IT tools, be it at work or at home. We tend to underestimate the existence of omnipresent dangers, despite the many events reported by the press: data leakages, financial losses, identity theft, phishing, malware, ransomware, etc.
This training is also available in a classroom setting.
- Awareness of the real dangers of digitalisation
- Capacity to anticipate, recognise, distinguish and avoid the various risks
- Use of good practices (browsing the Web, passwords, use of PC and smartphone, the social networks, etc.)
- Adoption of the right reflexes and automatic reactions
- Use of effective, fast protection and avoidance tools that are easy to deploy
Anyone who uses IT or digital tools. This course also covers security linked to personal contacts and any visitors.
No prior knowledge is required.
To prepare before the training : for this virtual class, in addition to your personal PC (laptop or desktop), also prepare your charged smartphone before the session. If you have a tablet, you will also be able to use it if you wish.
- Global context
- Terminology: malware, backdoor, phishing, ransomware, keylogger, skimming, spoofing, hoax, sniffing, trojan horse, social engineering, dark web, (s)extortion.
- Sharing experiences with and among participants
- The dangers
- Data exchange (connections)
- Data storage (types of storage)
- Identifying the threats simply and quickly
- Messages (emails, texts, social networks)
- Dangerous files
- Human contacts (by telephone or in person)
- Protection settings
- Web browsers
- Outlook and other email clients
- Social networks
- Good habits and reflexes
- Other best practices