Home / Training / Cybersecurity Awareness

SAC Cybersecurity Awareness

Understanding computer threats and adopting good security reflexes.

Objectives

This training aims to raise awareness among participants about computer threats. The organizational aspects related to computer security within the company will first be discussed. A presentation of different types of attacks along with practical cases will then be conducted, with the objective of demonstrating the technical feasibility of these attacks. Finally, a set of good security practices will be presented to address the issues covered.

Specific objectives:

  • Discover and understand computer security.
  • Apprehend and understand computer attacks.
  • Identify computer threats.

Prerequisites

  • Accessible to everyone

General Information

  • Code: SAC
  • Duration: 1 day
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, Centre Urbain Nord, Tunis

Target Audience

  • Anyone who wants to understand threats related to computer attacks

Resources

  • Training materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Introduction to computer security
    • Actors within the company
    • Information System (IS)
    • Information System Security (ISS)
    • Objectives of computer security
    • Vulnerabilities and computer attacks
    • Risks and stakes for the company
    • Motivations behind an attack
    • The legal framework
    • Security policy
    • Computer charter
    • Personal data protection
    • GDPR
    • LPM
    • Local attacks
    • USB ports
    • High-speed extension ports (DMA)
    • Ethernet cable
    • Internal hard drive
    • Remote attacks
    • Interception on the network
    • Download
    • Wireless network
    • Outdated system
    • Social engineering
    • Messaging
    • Phone
    • Web navigation
    • Attachment
    • Examples of malicious software attacks
    • Zeus
    • Stuxnet
    • Locky
    • WannaCry
    • Passwords
    • Role and usage
    • Importance of complexity
    • Interest of two-factor authentication
    • Utility of secure storage
    • Problem related to password reuse
    • Protection and good practices
    • Communication ports (USB, Firewire, PCI Express, etc.)
    • Disk encryption
    • Workstation locking
    • Updates
    • Antivirus and firewall
    • Connection to an unknown network
    • Detection and alert reporting

Do not hesitate to contact our experts for any additional information, free analysis and cost calculation for an audit service.

Information security is essential for any company that needs to protect and improve its information assets.

Contact Us