For more information on accessibility, access procedures and deadlines, see our Training page.
Introduction to cybersecurity – #270
Categories :
Context
- In an increasingly connected environment, companies across all sectors are facing a surge in cyber threats. The interconnection of IT and OT systems, the digitalisation of processes, dependence on supply chains and the human element at the heart of operations make organisations particularly vulnerable to attacks.
- This introductory training course aims to provide employees with the essential knowledge to understand the risks, adopt the right reflexes, and actively contribute to the protection of industrial systems. It provides a common foundation of vocabulary, key concepts, and best practices, while raising awareness of the decisive role of the human factor in cyber security.
Objectives
At the end of the training, participants will be able to:
- Understand cybersecurity issues in an industrial and organisational context
- Acquire key cybersecurity vocabulary and concepts (IT and OT)
- Identify the main threats and types of cyber attacks
- Understand and apply cybersecurity best practices
- Understand the importance of the human factor, cognitive biases and social engineering
- Adopt the right reflexes when faced with risky situations
Recommanded for
- This training course is aimed at employees, managers, engineers, technicians, support staff and decision-makers who wish to introduce their teams to the fundamentals of cybersecurity.
Specific operating conditions for remote sessions
- Have a PC equipped with a microphone, a webcam and, if possible, a headset for greater comfort. Note: wallpapers are available on Zoom or Teams to hide the background.
- Have a good Internet connection, which should be tested before the session.
- Settle down in a quiet, isolated place; set yourself to “unavailable” status on Teams; close your email access, and mute your phone, so as not to be disturbed during the session.
- Participants from the same organisation should not be grouped together in the same room, but each at their own desk.
- This Quiz must be taken with the webcam and microphone open. We may need to check that you are alone in the room.
- Please sign in 5 minutes before the start of the session.
Prerequisites
- No technical prerequisites are required.
- A general knowledge of the industrial environment, systems or company organisation is recommended.
Pedagogy
- Theoretical presentations, interactive discussions, case studies and practical exercises.
- Alternating between theory and practice.
Evaluation mode
- Knowledge test (multiple-choice questions).
Course materials
-
Participant’s file containing the presentations delivered during the training and the exercise materials.
To go further
Consulting Services: EURO-SYMBIOSE can assist you with the practical implementation of this system in your company. Contact us for more information.
1. Introduction to cybersecurity
- What is cybersecurity?
- Differences between IT and OT
- Why cybersecurity is critical
- Examples of real incidents
2. Challenges and scope of cybersecurity in businesses
- Critical assets and business continuity
- Economic, human, regulatory and security impacts
- Individual and collective responsibilities
3. Key vocabulary and concepts
- Threat, vulnerability, risk
- Malware, ransomware, phishing, DDoS, social engineering
- Authentication, encryption, backup, update
4. Main cyber attacks
- Traditional attacks (phishing, ransomware, weak passwords, booby-trapped USB sticks)
- Attacks targeting industrial systems
- Typical chain of events in a cyber attack
5. Good cybersecurity practices
- Individual digital hygiene
- Password management
- Email, web browsing, remote working
- Expected behaviour in the event of an incident
6. The human factor in cybersecurity
- Social engineering
- Cognitive biases (urgency, authority, overconfidence, habit)
- Humans: the primary target and first line of defence
7. Summary and key messages
- Essential reflexes to remember
- Everyone’s role in corporate cyber security
Further reading: what ISO 27001 has to offer
About Instructor
Aline FÜRSTENBERGER
Partner Consultant and Trainer – Cybersecurity Expert
Training registration form
* Required fields
Responsible for the registration
Company
Information about the participants
Participant 1
List of registered participants
1 registered participant(s)
Edit
Delete
Some red input are empty
Duration
1 day (+ 0.5 days of preparation for an IN-HOUSE training course)
Formation type
Open / In-house training session
Realisation modality
Onsite (Open: lunch included) or remote sessions
Validation
Examination of training achievements and delivery of a training certificate
Number of participants
Minimum : 4
Maximum : 12
Discounts
Register several trainees for our Open training sessions and benefit from our special offers
-20%
discount for the 2nd participant
-50%
for the 3rd and each additional participant
For registrations to the same training session.
Registration training
OPEN TRAINING SESSION
IN-HOUSE TRAINING SESSION
To obtain a quote for an in-house training :