Objectives of the training
After completing this course, participants will be able to evaluate the potential for risk in order to protect themselves from threats inherent to computer use.Targeted audience
Computer users in a personal and professional context.Prerequisite
None.Trainers
Course architecture
-
UA 1 - Distinguish between the main cyber threats: types of cyber attacks, risks and consequences, security methods and technologies
-
UA 2 - Identify phishing and scam emails (social engineering): hacking techniques, motivations of hackers
-
UA 3 - Evaluate the risks of using social networks: identity and confidentiality, ethics and responsibilities, information vs. misinformation
-
AU 4 - Understand the causes of digital identity theft: sensitive information, passwords and authentication, data protection
-
UA 5 - Security in the cloud: assessing the risks associated with the use of cloud solutions.
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote