Cybersecurity Fundamentals 2-day training
1 195,00 € tax excl.
Our 2-day course is divided into 3 parts, to give you a rich, interactive and practical training experience.
Theoretical concepts :
- The fundamentals of security
- Types of threats
- Securing assets
- Security operations and responses
participants respond in groups to pre-defined incident scenarios
Participants take a 60-minute MCQ to demonstrate their understanding of the concepts explained.
The course will be led by Georges Ataya, Professor and Academic Director at Solvay Brussels School, Vice-President of the Cybersecurity Coalition and Advisor at Ataya Partners.
Participants in our cybersecurity training programme will demonstrate their understanding of the basic principles that underpin and define cybersecurity, as well as the essential roles of cybersecurity professionals in protecting corporate data and infrastructure.
In addition to the theoretical knowledge acquired during the course, participants will come together to respond to pre-defined incident scenarios. This hands-on experience will enhance their ability to effectively manage cyber incidents and collaborate as a team to ensure the company's digital security.
This course is aimed at all employees of an organisation, as well as anyone who wants to learn more about cyber threats in order to strengthen their organisation's digital security.
If your organisation has several employees requiring cyber security training, our on-demand training solutions can be tailored to meet the specific needs and objectives of your team. Our instructors are practitioners with extensive industry experience, bringing their proven cybersecurity expertise to you and your colleagues.
- Understand the fundamentals of cyber security
- Raising awareness of threats and risks
- Presentation of security technologies and controls
- Ability to respond to basic security incidents
- Awareness of risk management
- Compliance and governance skills
- Improved business resilience
- Privacy awareness
- Use of best practice and security frameworks
During this course, you will discover the fundamental principles of cybersecurity and develop the essential skills to protect your organisation's data and systems.
The first part of the course is divided into four chapters.
Fundamentals of security
1.1 What is security?
1.2 Types of security
1.3 Specialised systems
1.4 Roles and responsibilities
1.5 Governance, risk management and compliance
1.6 Cyber security governance
1.8 Business continuity and disaster recovery
1.9 Business impact analysis
1.10 Recovery concepts
1.11 Information security objectives
1.13 Privacy versus security
2.1 Cyber risk
2.4 Cyber attacks
2.5 Attack attributes
2.6 Attack process
2.7 Malware and attacks
2.8 Risk assessment
2.9 Supply chain considerations
2.10 Risk management cycle
2.11 Risk management
2.12 Use of risk assessment results
3.1 Identification of industry risks, standards, frameworks and guidance
3.2 Architecture, models and frameworks
3.3 Security controls
Security operations and response
4.1 Security operations
4.2 Tools and technologies
4.3 Incident management
The second part of the course will test participants with predefined scenarios. Based on different incidents, participants will have to formulate an appropriate response to preserve the organisation's systems.
Finally, participants will take a quiz at the end of the day to ensure that all the concepts have been correctly assimilated.
Who should attend?
- Co-workers who are not familiar with cyber security
- Students and recent graduates
- Organisational teams
- IT professionals
There are no prerequisites for this course.
The course presentation will be distributed to all course participants in paper and digital format.
During the course, participants will receive a series of readings to help them understand the concepts presented during the course.
Test at the end of the course
A quiz in MCQ format will be distributed at the end of the course.
Participants will have 60 minutes to answer the quiz, and will be given the notes and training materials that have been distributed.
Questions / Answers
Be the first to ask a question about Cybersecurity Fundamentals
|IT Security, Audit & Governance