Skip to main content

Description

The cyberthreat landscape encompasses a wide range of risks and dangers related to information systems security and cybercrime. Common threats include viruses, malware, phishing attacks, ransomware, distributed denial of service (DDoS) attacks, identity theft and various online scams. With the rapid evolution of technology and the emergence of new tactics used by cybercriminals, this landscape is constantly changing.
This training course will immerse you in the world of cyber threats. You'll learn to identify the types of attacks that compromise the security of computer networks, as well as the different profiles of malicious individuals responsible for these attacks. What's more, you'll discover the best practices for protecting your computer network and ensuring your own security.
Aimed primarily at cybersecurity beginners, these courses will also give you access to the new Fortinet Certified Fundamentals Cybersecurity (FCF) certification, which replaces the former NSE 1 and NSE 2 certifications.
Training details
Threat Identification: You will learn to recognize the different forms of cyber threats and understand how they work. This includes an in-depth analysis of the methods used by cybercriminals to infiltrate systems.
Types of attack: Training will cover in detail specific attacks such as phishing, where sensitive information is obtained under false pretences, as well as ransomware, which encrypts critical data to demand a ransom.
Cybercriminal Profiling: You'll explore the motivations and methods of malicious individuals, enabling you to better anticipate their actions.
Best Security Practices: You'll discover effective strategies for securing your network, including the use of firewalls, the implementation of encryption protocols and raising user awareness of cybersecurity risks.
Access to Certification: By completing this training, you will be prepared to obtain FCF certification, a valuable asset for anyone wishing to pursue a career in cybersecurity.
All in all, this course is an essential step for anyone wishing to acquire a solid grounding in cybersecurity and prepare for a constantly evolving professional environment in the face of digital threats.

Day 1: Cybersecurity fundamentals and threat landscape


Cybersecurity is an essential area that aims to protect information systems, networks and data against a variety of threats. The fundamental principles of cybersecurity are based on three key concepts: confidentiality, integrity and availability.
 

  • Confidentiality: This involves ensuring that only authorised persons have access to sensitive information.
  • Integrity: This principle guarantees that data is not altered in an unauthorised way, thereby preserving its reliability.
  • Availability: This guarantees that authorised users can access information and resources when required.
    The cyber security threat landscape is constantly evolving and includes a variety of attacks, such as :
  • Viruses: Malicious programs that can infect and damage systems.
    Ransomware: Software that encrypts a user's data and demands a ransom for its decryption.
    Phishing: Techniques used to trick users into revealing personal information.
    DDoS (Distributed Denial of Service) attacks: flooding a system with large numbers of requests to make it unavailable.
    These threats can have devastating consequences for businesses and individuals.

Social engineering is a technique used by cybercriminals to manipulate individuals into divulging sensitive information. This method is often based on deception and can take several forms, including :
 

  • Phishing: Sending fraudulent e-mails urging recipients to provide personal information.
  • Pretexting: Creating a false identity to obtain information.
  • Baiting: Offering bait, such as free software, to entice users to download malware.
    These techniques often exploit human trust, making user awareness and training crucial to preventing these attacks.

This course is aimed at the following audiences:

  • anyone wishing to familiarise themselves with the cyber threat landscape.

There are no pre-requisites for this course.

At the end of this course, you will have acquired the following skills:

  • Understanding Cybersecurity: You will be able to explain what cybersecurity is and the fundamental principles of information security. This includes data protection, risk management and the importance of confidentiality, integrity and availability of information.
  • Identifying Malicious Hackers: You will learn to recognise the different types of malicious hackers, as well as their methods of attack. You will also discover the strategies and tools used to defend against these threats, enabling you to develop effective preventive measures.
  • Social Engineering Techniques: You will be able to list and explain the various social engineering techniques used by cybercriminals to manipulate individuals into divulging sensitive information. This includes methods such as phishing, pretexting and baiting.
  • Malware Knowledge: You will gain an in-depth understanding of the different types of malicious software (malware), such as viruses, worms, Trojan horses and ransomware. You will also learn how such software spreads through systems, whether via infected attachments, malicious downloads or vulnerabilities in the software.

Translated with DeepL.com (free version)

We design, build and support digital products for clients who want to make a positive impact in their industry. Creative with technology, we develop great solutions to help our clients grow and especially by strengthening our relationships based on continuous improvement, maintenance, support and hosting services.

Follow us