Publication date : 05/06/2024

Course : Introduction to computer security

Synthesis course - 1d - 7h00 - Ref. ISI
Price : 850 € E.T.

Introduction to computer security




With the evolution of the Internet, IS security is becoming increasingly important in both private and professional environments. This introduction to IS security will introduce you to the risks and threats affecting the security of information systems.


INTER
IN-HOUSE
CUSTOM

Synthesis course in person or remote class
Disponible en anglais, à la demande

Ref. ISI
  1d - 7h00
850 € E.T.




With the evolution of the Internet, IS security is becoming increasingly important in both private and professional environments. This introduction to IS security will introduce you to the risks and threats affecting the security of information systems.


Teaching objectives
At the end of the training, the participant will be able to:
Understand the risks and threats to your information system
The possible consequences of a computer attack
Identify information protection measures
Learn how to make your workstation safe
Promote the company's IS security policy

Intended audience
All users wishing to learn the basics of computer security.

Prerequisites
Be familiar with the ANSSI security hygiene guide.

Course schedule

1
Threats and risks

  • What is IT security?
  • How can negligence create catastrophe?
  • Everyone's responsibilities.
  • IS architecture and potential vulnerabilities.
  • Corporate networks (local, remote, Internet).
  • Wireless networks and mobility. Risky applications: Web, messaging...
  • Database and file system. Threats and risks.
  • The sociology of pirates. Underground networks. Motivations.

2
Workstation safety

  • Confidentiality, signature and integrity. Encryption constraints.
  • The different cryptographic elements. Windows, Linux or MAC OS: which is the most secure?
  • Managing sensitive data. Laptop issues.
  • The different threats on the client workstation ? Understanding malicious code.
  • How do you manage security vulnerabilities?
  • USB ports. The role of the client firewall.

3
The authentication process

  • Access controls: authentication and authorization.
  • The importance of authentication.
  • The traditional password.
  • Certificate and token authentication.
  • Remote connection via the Internet.
  • What is a VPN?
  • Why use strong authentication?

4
The legal framework and the right reflexes to adopt

  • What are the legal and regulatory constraints?
  • Why do we have to comply with these safety requirements?
  • Acting for better safety: social and legal aspects.
  • CNIL (Commission Nationale de l'Informatique et des Libertés) and legislation.
  • What is a risk, vulnerability and threat analysis?
  • Understand the role of the CISO and Risk Manager.
  • Cyber-surveillance and privacy.
  • The charter for the use of IT resources. Day-to-day security and good habits.


Customer reviews
4,6 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
TAYLOR D.
02/12/25
5 / 5

Formation très intéressante et complète bien que théorique, l’essentiel est abordé.
DU CORAIL FLORENCE S.
02/12/25
4 / 5

Très clairs (contenu et support) et surtout illustrations et exemples variés. Présentation dynamique tout au long de la journée.
AURÉLIE C.
24/11/25
5 / 5

full support for this introduction and a very informative and interesting trainer



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 5 Mar., 4 June, 17 Sep., 19 Nov.

PARIS LA DÉFENSE
2026 : 4 June, 17 Sep., 19 Nov.