background section

Cybersecurity: practical security for you and your business

This course will make you aware of the need to protect your information and data and will teach you to avoid potential intrusions and acts of malicious intent. No description or technical content, but an interactive course with practical applications that are simple and easy to remember for both your professional and private security.

Aucune session

Aucune session n'est prévue pour le moment.

  • Type de formation

    Formation en présentiel

  • Durée de la formation

    1 jour

  • Langues disponibles
    EN, FR, NL 
  • Code de formation


Résultats à l’issue de cette formation

These days, we all have access to connected IT tools, be it at work or at home. We tend to underestimate the existence of omnipresent dangers, despite the many events reported by the press: data leakages, financial losses, identity theft, phishing, malware, ransomware, etc.


This training is also available in  online classroom.


  • Awareness of the real dangers of digitalisation
  • Capacity to anticipate, recognise, distinguish and avoid the various risks
  • Use of good practices (browsing the Web, passwords, use of PC and smartphone, the social networks, etc.)
  • Adoption of the right reflexes and automatic reactions
  • Use of effective, fast protection and avoidance tools that are easy to deploy

Public cible

Anyone who uses IT or digital tools. This course also covers security linked to personal contacts and any visitors.


Les formations en présentiel sont nos « formations standard ». Elles ont lieu dans toute la Belgique et sont organisées en groupe de 6 à 15 participants. Comme vous êtes physiquement présent, ces formations sont très interactives.

Attention : Vu les circonstances actuelles, nous convertissons le plus grand nombre possible de nos formations en présentiel en classes en ligne. Parce que votre santé et votre sécurité sont primordiales. Faites votre choix entre nos classes en ligne !

Connaissances préalables requises

No prior knowledge is required.

To bring on the day of the training: this training will take place in a room without a PC but equipped with an Internet connection. If you have a personal laptop and/or tablet, we advise you to bring them with you. It is also important that you have your charged smartphone at your disposal.  

Aperçu du programme

  • Global context
    • Terminology: malware, backdoor, phishing, ransomware, keylogger, skimming, spoofing, hoax, sniffing, trojan horse, social engineering, dark web, (s)extortion.
    • Sharing experiences with and among participants

  • The dangers
    • Data exchange (connections)
    • Data storage (types of storage)

  • Identifying the threats simply and quickly
    • Messages (emails, texts, social networks)
    • Websites
    • Dangerous files
    • Human contacts (by telephone or in person)

  • Protection settings
    • Web browsers
    • Outlook and other email clients
    • Social networks

  • Good habits and reflexes
    • Passwords
    • Other best practices