SAC Sensibilisation a la cybersecurite

Formations SAC Sensibilisation a la cybersecurite

OBJECTIF

This training aims to make participants aware of computer threats. The organizational aspect related to IT security within the company will be mentioned first. A presentation of the various attacks as well as practical cases will then be made, and this in order to demonstrate technically the feasibility of the attacks. Finally, a set of good security practices will be presented to help address the issues addressed.

In particular, the objectives of the training are:

  • Discover and assimilate computer security.
  • apprehend and understand the computer attacks.
  • Identify IT threats.

PREREQUISITES

• Accessible to everyone

GENERAL INFORMATION

• Code : SAC
• duration : 1 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

• Anyone wishing to understand the threats associated with computer attacks

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Days 1
  • Introduction to computer security"
  • - Actors within the company

    • Information system (SI)

    • Security of information systems (SSI)

    • Objectives of computer security

    • Vulnerabilities and cyber attacks

    • Risks and challenges for the company

    • Motivations of an attack

  • The legislative framework
  • • Security policy

    • IT charter

    • Protection of personal data

    • RGPD

    • LPM

  • Local attacks
  • • USB ports

    • high speed expansion ports (DMA)

    • Ethernet cable

    • Internal hard drive

  • Les attaques distantes
  • • Interception on the network

    • downloading

    • Wireless network

    • System not up to date

  • Social engineering
  • • messaging

    • Phone

    • Web browsing

    • Attachment

  • Example of malicious software attacks
  • • Zeus

    • Stuxnet

    • Locky

    • WannaCry

  • Passwords
  • • Role and use

    • Importance of complexity

    • Interest of double authentication

    • Secure storage utility

    • Problem with reusing passwords

  • The protections and good reflexes
  • • Communication ports (USB, Firewire, PCI Express, etc.)

    • Disk encryption

    • Locking the post

    • Updates

    • Antivirus and firewall

    • Connection on an unknown network

    •Detection and escalation

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.