fbpx

Bienvenue à {TC}²

Information security awareness for computer users

Description

Our information security awareness training course addresses the subject from two aspects: technical and organizational. The technical aspect remains at the level of the presentation of risks and threats for the company on a daily basis and the organizational aspect focuses on giving participants good reflexes and good practices in parallel with the technical elements presented. Our information security awareness training course involve the participants in the security of the information system by being actors and not mere spectators.
Concretely for the participants it will be a question of :

Be made aware in an interactive and creative way of the IT threats they may be directly confronted with in their professional and private activities.

  • Understand the issues related to IT security
  • Understanding why prevention is necessary
  • Become aware of the role they have to play
  • Adopting the right attitudes and reflexes
  • To be a driving force to participate in the implementation of the exposed solutions and to ensure their application (or to implement them according to the technical level of the participants).

It is essentially interactive and practical training that avoids scrolling slides so as not to lose the audience in theoretical and technical explanations that do not directly serve the objectives to be achieved. Theoretical bases will only be given insofar as they allow you to touch an important concept, a risk, or simply a better understanding of the general procedures recommended in a company charter. The aim is to show through examples or living anecdotes (virus spread in different ways, various attacks, screen saver and password, bad password strategy, etc.) the legitimacy of the security precautions to be taken, while having the technical bases to understand the entry points of potential security breaches. The examples are concrete and realistic enough to capture the audience’s attention and, above all, to convey the message ” it doesn’t just happen to others “.

Finally, in order to take a dynamic rather than a passive approach, for each example the conclusion will be ” what should have been done to avoid it? “. The profile of the speaker lends itself particularly well to this approach because he has a high level of technical expertise, but he has also been heavily involved in the drafting of safety charters or standards for operators, thus mastering the “why” of the recommendations.

1 Day

Computer users who use the Internet and www to work, study and play.

  • To be aware in an interactive and creative way to the computer threats they may be directly confronted with in their professional and private activities.
  • Understand the issues related to IT security.
  • Understand why prevention is necessary.
  • Become aware of the role they have to play.
  • Adopt the right attitudes and reflexes .
  • To be able to make proposals to participate in the implementation of the solutions exposed and to ensure their application (or to implement them according to the technical level of the participants).
  1. Introduction to computer security
  2. Malware and antivirus software
  3. Security on social networks
  4. Data security

Prochaines sessions

0/5 (0 Reviews)
0/5 (0 Reviews)
X
X
X