Your basket is empty

background section

Online classroom: Cybersecurity - practical security for you and your business

This course will make you aware of the need to protect your information and data and will teach you to avoid potential intrusions and acts of malicious intent. No description or technical content, but an interactive course with practical applications that are simple and easy to remember for both your professional and private security.

  • Training type

    Virtual Classroom

  • Duration of training

    1 day

  • Available languages
  • Training code


What do you learn?

These days, we all have access to connected IT tools, be it at work or at home. We tend to underestimate the existence of omnipresent dangers, despite the many events reported by the press: data leakages, financial losses, identity theft, phishing, malware, ransomware, etc.


This training is also available in a classroom setting.


  • Awareness of the real dangers of digitalisation
  • Capacity to anticipate, recognise, distinguish and avoid the various risks
  • Use of good practices (browsing the Web, passwords, use of PC and smartphone, the social networks, etc.)
  • Adoption of the right reflexes and automatic reactions
  • Use of effective, fast protection and avoidance tools that are easy to deploy

Target group

Anyone who uses IT or digital tools. This course also covers security linked to personal contacts and any visitors.

Required prior knowledge

No prior knowledge is required.


To prepare before the training : for this online classroom, in addition to your personal PC (laptop or desktop), also prepare your charged smartphone before the session. If you have a tablet, you will also be able to use it if you wish.

Overview of the programme

  • Global context
    • Terminology: malware, backdoor, phishing, ransomware, keylogger, skimming, spoofing, hoax, sniffing, trojan horse, social engineering, dark web, (s)extortion.
    • Sharing experiences with and among participants

  • The dangers
    • Data exchange (connections)
    • Data storage (types of storage)

  • Identifying the threats simply and quickly
    • Messages (emails, texts, social networks)
    • Websites
    • Dangerous files
    • Human contacts (by telephone or in person)

  • Protection settings
    • Web browsers
    • Outlook and other email clients
    • Social networks

  • Good habits and reflexes
    • Passwords
    • Other best practices