This training course provides a structured overview of the risks associated with information systems and the measures to be adopted to protect them effectively. It is aimed at IT, management and project professionals - as well as those retraining in the field of cybersecurity.
You'll explore the main types of threat, defense-in-depth principles, securing access (VPN, two-factor authentication), and protecting networks, workstations, applications, data and connected objects. Emphasis is placed on recognized standards (ISO 2700x, CIS Controls), risk analysis, incident management, and the central role of users in security strategy.
The course also covers the challenges of outsourcing and cloud security, offering current practices and standardized approaches to building a more resilient digital environment.
Duration
1 day
Schedule
See training dates for details
Regular fee
$625
Preferential fee A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
$560
Objectives of the training
To provide the knowledge and skills required to evaluate security risks inherent in information systems (workstations, servers, LAN, WAN, intranets, extranets and the Internet), and to identify the measures and policies to be implemented.
Targeted audience
Those in network positions, IT management positions, project management positions, management positions and those seeking vocational retraining.
Managing authentication (password management and two-factor authentication)
Security of applications, Web sites, application servers and databases, workstations, mobile devices and connected objects
Better practices/critical security controls according to CIS; Standardized approach: ISO 2700x standards
Risk analysis, security methods, the role of audits and implementation
Putting people at the heart of security: organizing the security channel; awareness
Managing security incidents: preventive action plan and proper responses
Security and outsourcing
Security and Cloud Computing.
See more
Training Notes
Note: ISO 27001, 27002 and 27005 norms are covered in detail in Course RE201 (27001/27002).
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Preferential fee A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
$560
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
By checking this box, I confirm that I have read and agree toTechnologia’s Privacy Policywhich provides information on how my personal information will be used following collection. In the event that you do not consent to the terms of the concerned Privacy Policy, Technologia will not have the information to assess your request, contact you to follow up on your request or provide you with the services.
I would like Technologia to send me commercial communications.
Learn more >
By checking this box, I agree that Technologia may use my personal information to send me commercial communications. I understand that I can withdraw my consent at any time by clicking on the unsubscribe link included in each communication. To learn more about how we manage your personal information, please consult our
Technologia’s Privacy Policy.