Leader in the cybersecurity training sector.

Cybersecurity for everyone : Best practice and digital hygiene

Catégorie
Satisfaction rate
4.5
Success rate
4.7

The target audience for training

Anyone wishing to learn about best practice in cybersecurity.

What you will learn

At the end of the course, trainees will be able to use digital tools responsibly and securely.

Training programme

Day 1

Day 1 - Morning: Understanding the issues and identifying the threats

  • Introduction to cyber security and its importance for individuals and businesses.
  • Statistics and concrete examples of recent attacks.
  • Threat overview: phishing, ransomware, malware, social engineering.
  • Risky behaviour: reuse of passwords, insecure browsing, removable devices.
  • Case study: analysis of a phishing e-mail.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt

 

Day 1 - Afternoon: Adopting good practice and applying digital hygiene

  • Hygie provides day-to-day support: strong passwords, MFA, updates, backups.
  • Secure Internet browsing and communications.
  • Security for mobile devices and at work.
  • Best practice in a professional setting (e-mail, collaborative tools, Wi-Fi networks).
  • Cybersecurity culture: individual and collective vigilance.
  • Case study: simulation of a phishing incident .
  • Quiz to validate prior learning.
  • Closing and final assessment.
  • Participants receive their certificates of attendance and a course evaluation.
    • Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt

Trainer profile

Expert consultant-trainer in cybersecurity, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.

Teaching methods

  • The training is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its rational application:
  • Structured theoretical input, illustrated by practical examples and adapted to the participants' professional context.
  • Practical exercises at each e-tap to help you assimilate the knowledge.
  • A case study linking the different skill blocks.
  • Strong interaction between the trainers and the trainees, making the echanges more concrete and in correlation with the trainees' expectations.
  • Completed educational documentation, supplied in digital format.
  • Course evaluation questionnaire at the end of the course, analysed by our teaching team.
  • Certificate of acquired skills sent to the trainee at the end of the course.
  • End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming the trainee's full participation in the session.

Training objectives

  • Understand the challenges of cybersecurity in a professional context.
  • Identify the main IT threats and behaviours at risk.
  • Adopting good practice to ensure effective digital hygiene on a daily basis.

Assessment procedures

  • Practical exercises at each stage of the course.
  • A case study linking the different skill blocks.
  • Quiz at the end of each day's training.
  • Self-evaluation of knowledge acquired by the trainee via a questionnaire.

Training prerequisites

  • There are no pre-requisites for this course.
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.