Demystifying Cybersecurity (The Top 10 Risks And Threats)

by ETS Formation Claim Listing

Become familiar with the threats and risks that are at our doors from the moment we are connected to a network, on the Web or in connection with social networks.

$577

Contact the Institutes

Fill this form

Advertisement

ETS Formation Logo

img Duration

1 Day

Course Details

Become familiar with the threats and risks that are at our doors from the moment we are connected to a network, on the Web or in connection with social networks.

 

Educational Goals:

  • Effectively manage the security associated with the organization's information assets;
  • Recognize the dangers and contexts of use of services and networks;
  • Identify the types of risks and threats;
  • Explain the link with the ISO 27001 and ISO 27002 standard to protect organizations;
  • Ensure management regarding the conformity of ways of doing things.
     

Methodology:

  • Several learning methods and didactic tools allowing you to measure your progress and your integration of concepts by participants are used throughout the training.
  • Exposed
  • Demonstration
  • Teamwork
  • Discussion group
     

Target Customers:

  • Managers, security officers, security specialists, auditors and analysts who participate in information security management and users who have fixed, portable and mobile workstations in their possession.

 

Content:

  • The reference framework supporting the concepts of information security management;
  • Review of the main threats and vulnerabilities as well as information security players;
  • The top 10 risks;
  • The presentation of the ISO 27001 and 27002 standards;
  • The impact on ways of doing things;
  • The action plan and best practices to help organizations protect themselves.


 

  • Montreal Branch

    1220 Notre-Dame Street, Montreal

Check out more Cybersecurity courses in Canada

Wilfrid Laurier University Logo

Cybercrime (An Introduction)

This course is designed to provide you with an overview of criminal activity perpetrated using computers, the internet, and other network-connected digital devices.

by Wilfrid Laurier University [Claim Listing ]
Ammolite Analytx Logo

Cybersecurity Professional Fast Track

In collaboration with the employer community, we rapidly train essential skill sets required to secure high-paying entry-level information security jobs.

by Ammolite Analytx [Claim Listing ]
  • Price
  • Start Date
  • Duration
CC Cyber Security Logo

CCCS Certified Information Systems Security Professional (CISSP)

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticate...

by CC Cyber Security [Claim Listing ]
Digital Boundary Group Logo

Advanced Exploitation Security Training

DBG's instructor-led course will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by DBG testers everyday.

by Digital Boundary Group [Claim Listing ]
Ferro Technics Inc. Logo

Certified in Risk and Information Systems Control (CRISC)

The CRISC Exam Preparation course is an intensive, four-day review program to prepare individuals who are planning to sit for the Certified in Risk and Information System ControlsTM (CRISC) exam.

by Ferro Technics Inc. [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy