With the evolution of the Internet, IS security is becoming increasingly important in both private and professional environments. This introduction to IS security will introduce you to the risks and threats affecting the security of information systems.
INTER
IN-HOUSE
CUSTOM
Synthesis course in person or remote class
Available in English on request
With the evolution of the Internet, IS security is becoming increasingly important in both private and professional environments. This introduction to IS security will introduce you to the risks and threats affecting the security of information systems.
At the end of the training, the participant will be able to:
Understand the risks and threats to your information system
The possible consequences of a computer attack
Identify information protection measures
Learn how to make your workstation safe
Promote the company's IS security policy
Intended audience
All users wishing to learn the basics of computer security.
Prerequisites
Be familiar with the ANSSI security hygiene guide.
Course schedule
1
Threats and risks
What is IT security?
How can negligence create catastrophe?
Everyone's responsibilities.
IS architecture and potential vulnerabilities.
Corporate networks (local, remote, Internet).
Wireless networks and mobility. Risky applications: Web, messaging...
Database and file system. Threats and risks.
The sociology of pirates. Underground networks. Motivations.
2
Workstation safety
Confidentiality, signature and integrity. Encryption constraints.
The different cryptographic elements. Windows, Linux or MAC OS: which is the most secure?
Managing sensitive data. Laptop issues.
The different threats on the client workstation ? Understanding malicious code.
How do you manage security vulnerabilities?
USB ports. The role of the client firewall.
3
The authentication process
Access controls: authentication and authorization.
The importance of authentication.
The traditional password.
Certificate and token authentication.
Remote connection via the Internet.
What is a VPN?
Why use strong authentication?
4
The legal framework and the right reflexes to adopt
What are the legal and regulatory constraints?
Why do we have to comply with these safety requirements?
Acting for better safety: social and legal aspects.
CNIL (Commission Nationale de l'Informatique et des Libertés) and legislation.
What is a risk, vulnerability and threat analysis?
Understand the role of the CISO and Risk Manager.
Cyber-surveillance and privacy.
The charter for the use of IT resources. Day-to-day security and good habits.
Customer reviews
4,6 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
TAYLOR D.
02/12/25
5 / 5
A very interesting and comprehensive course, albeit theoretical; the essentials are covered.
DU CORAIL FLORENCE S.
02/12/25
4 / 5
Very clear (content and support) and above all varied illustrations and examples. Dynamic presentation throughout the day.
AURÉLIE C.
24/11/25
5 / 5
full support for this introduction and a very informative and interesting trainer
TEDDY C.
24/11/25
4 / 5
Great for an introduction
CHRISTOPHE W.
22/09/25
5 / 5
Good introduction to cyber, trainer listens well
CHRISTOPHE L.
22/09/25
5 / 5
Perfect.
NICOLAS M.
22/09/25
4 / 5
Expert and very interesting trainerVibrant presentationVery interesting contentA minimum 2-day course
LAËTITIA P.
22/09/25
5 / 5
A highly educational trainer who makes the concepts easy to understand for the uninitiated.
JÉRÔME V.
22/09/25
5 / 5
The trainer was highly competent and extremely educational, knowing how to make his subject lively and attractive.
FREDDY M.
22/09/25
4 / 5
The pedagogical approach we adopted ensured that we were able to understand what was going on thanks to the concrete and appropriate explanations.
PIERRE R.
02/06/25
3 / 5
The trainer was great, but the content was very basic.
NADINE C.
02/06/25
5 / 5
super trainer and training thank you
ARNAUD B.
18/03/25
4 / 5
Very interestingHaving already done the ANSSI Mooc, there are quite a few concepts that I had already seen.
FRÉDÉRIC G.
18/03/25
5 / 5
Very interesting. Here are a few videos giving concrete examples of the importance of cybersecurity
DAVID R.
18/03/25
5 / 5
It was an introduction, so I was already familiar with the subjects covered.
ROMAIN A.
18/03/25
5 / 5
Everything was well explained and clear, the trainer explained certain points in simple terms and went into more detail on the points I felt were most important. He answered all questions.
STEVEN G.
18/03/25
4 / 5
I'm not the type of person to spend all day on slides. Some people love it, others hate it...
PATRICE A.
18/03/25
5 / 5
The content was very practical and clear, particularly with the testimonial videos and the trainer's sharing of experience.
ANNE D.
18/03/25
4 / 5
A course that's neither too long nor too short for an introduction to IT security
PARTICIPANTS
All users wishing to learn the basics of computer security.
PREREQUISITES
Be familiar with the ANSSI security hygiene guide.
TRAINER QUALIFICATIONS
The experts leading the training are specialists in the covered subjects. They have been approved by our instructional teams for both their professional knowledge and their teaching ability, for each course they teach. They have at least five to ten years of experience in their field and hold (or have held) decision-making positions in companies.
ASSESSMENT TERMS
The trainer evaluates each participant’s academic progress throughout the training using multiple choice, scenarios, hands-on work and more.
Participants also complete a placement test before and after the course to measure the skills they’ve developed.
TEACHING AIDS AND TECHNICAL RESOURCES • The main teaching aids and instructional methods used in the training are audiovisual aids, documentation and course material, hands-on application exercises and corrected exercises for practical training courses, case studies and coverage of real cases for training seminars.
• At the end of each course or seminar, ORSYS provides participants with a course evaluation questionnaire that is analysed by our instructional teams.
• A check-in sheet for each half-day of attendance is provided at the end of the training, along with a course completion certificate if the trainee attended the entire session.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you need special accessibility accommodations? Contact Mrs. Fosse, Disability Manager, at psh-accueil@orsys.fr to review your request and its feasibility.
Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class
Dernières places
Date garantie en présentiel ou à distance
Session garantie
No session at the moment, we invite you to consult the schedule of distance classes.