Objectives of the training
After completing this course, participants will be able to evaluate the potential for risk in order to protect themselves from threats inherent to computer use.Targeted audience
Computer users in a personal and professional context.Prerequisite
None.Trainers
Course architecture
-
UA 1 - Distinguish between the main cyber threats: types of cyber attacks, risks and consequences, security methods and technologies
-
UA 2 - Identify phishing and scam emails (social engineering): hacking techniques, motivations of hackers
-
UA 3 - Evaluate the risks of using social networks: identity and confidentiality, ethics and responsibilities, information vs. misinformation
-
AU 4 - Understand the causes of digital identity theft: sensitive information, passwords and authentication, data protection
-
UA 5 - Security in the cloud: assessing the risks associated with the use of cloud solutions.
Private or personalized training
Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.
Request a quotePrivate or personalized training
Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.
Request a quote