LEARNING
CYBER SECURITY
Duration: 4 days
Price: €3200 excluding VAT
Online or on-site training
The added value of this training:
Aiola Informatique has over 20 years of experience in IT security
Improve your skills in relation to cyber risk.
Network Administrator, Director of Information Services, Technician applying for administrator position
Upon completion of the training, the trainee will be able to:
Detect a security risk
Inform their company’s staff
Remedy security vulnerabilities
Improve their company’s security
A training certificate will be issued to trainees who successfully complete their multiple-choice questionnaires.
The trainee may use this certificate as proof of completion.
THE TEACHER
The trainer is currently working in the field and manages their clients’ servers. They have over 20 years of experience.
DURATION
The training is organized over 4 days of 7 hours each, totaling 28 hours.
DATES
Dates will be communicated to participants in writing.
TRAINING LOCATION
Online, using Teams software, or on-site at your premises.
FEES
The cost of the training is €3,200 excluding VAT.
FUNDING
Contact us for more information.
You must have a server and an internet connection. You must have a Windows Server license.
You must have at least 3 years of experience in managing a computer network.
You must hold a minimum of a Level III diploma (BTS, DEUG, DUT, etc.).
Training Registration Process:
Pre-admission Interview: a telephone interview with the trainer to assess the applicant’s skill level and motivation, including consideration of any disabilities and potential training adaptations.
Presentation of the applicant’s challenges and definition of the training’s professional objectives.
Submission of administrative documents: training program, course description, quote, agreement or contract, and requests for supporting documents.
Receipt of the complete registration file and verification of all required documents.
Registration must be finalized, with a complete file, at least 3 days before the scheduled start of the training.
An assessment will be held at the end of the session. This will be in the form of a multiple-choice questionnaire.
A training certificate will be issued to participants who have completed the entire training program and who have achieved an average score of 12/20 on the assessment questionnaire.
Educational course
Practical exercises
A Windows PC
Course materials
Internet connection
Analysis software
Security software
If you require specific accommodations (physical or educational accessibility) to follow this training course, please contact us by phone or email : accessibilite@aiola.fr
At the end of each training session, you will be asked to evaluate the training you received. An overall rating is calculated based on these evaluations.
To provide you with the best possible information on the quality of the training provided, as perceived by participants, the website aiola.fr displays the results of evaluations by participants of past training sessions, provided that these sessions have been offered at least once.
The maximum number of participants is set at 4.
The minimum number of participants required for the training to take place is 1. If this minimum is not met, the date will be postponed, or the training may be cancelled. In either case, you will be informed in advance, and in the event of cancellation, you will be reimbursed for any payments made.
The conditions are specified in the training agreement or contract, and the general terms and conditions of sale are available here.
Upcoming performance indicator
No trainees participated in this training.
% of trainees who have completed the training
*** Last updated: 02/06/2025 ***
- Concept of risk
- Basic rules
- Access control
- User management
- Privilege
- Management
- Understanding
- Targets and issues
- GDPR concepts,
- personal data
- Encryption
- Hashing,
- Signatures,
- Protocols
- TLS, IPSec, SSH
- Certificates
- Cryptography and Certificate Authorities
- Attack vectors
- Port analysis
- Network access control
- Network segmentation, isolation, and separation
- Firewalls, switches, and VLANs
- Proxies
- Wireless networks
- Cloud security
- External access
- management
- Mobile devices and fleet security
- Understanding software security
- levels Browser protections
- Managing cookies and browsing history
- Password storage and management
- Software and browser patches
- Server security management and analysis
- Workstation security management and analysis
- Administrator management
- Knowing how to identify and mitigate security risks
- Evidence collection and isolation Remediation
- Inform and train staff on cyber risks
- Train and maintain staff at a sufficient level of vigilance
- Analyze risky behaviors
- Prevent human risk
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.