LEARNING
BEST PRACTICES IN CYBERSECURITY

Duration: 2 days

Price: €1600 excluding VAT

Learning available remotely or at your premises

The added value of this training:
Aiola Informatique has over 20 years of experience in IT security

Raising awareness and informing people about cyber risks.

All company personnel

Upon completion of the training, the trainee will be able to:
Raise awareness among other users
Pay closer attention to cybersecurity risks
Detect cybersecurity risks

A training certificate will be issued to trainees who successfully complete their multiple-choice questionnaires.

The trainee may use this certificate as proof of completion.

THE TEACHER
The trainer is currently working in the field and manages their clients’ servers. They have over 20 years of experience.

DURATION
The training is organized over two 7-hour days, totaling 14 hours.

DATES
Dates will be communicated to participants in writing.

TRAINING LOCATION
Online, using Teams software, or on-site at your premises.

FEES
The cost of the training is €1600 excluding VAT.

FUNDING
Contact us for more information.

Training Registration Process:
Pre-admission Interview: a telephone interview with the trainer to assess the applicant’s skill level and motivation, including consideration of any disabilities and potential training adaptations.
Presentation of the applicant’s challenges and definition of the training’s professional objectives.
Submission of administrative documents: training program, course description, quote, agreement or contract, and requests for supporting documents.
Receipt of the complete registration file and verification of all required documents.
Registration must be finalized, with a complete file, at least 3 days before the scheduled start of the training.

An assessment will be held at the end of the session. This will be in the form of a multiple-choice questionnaire.

A training certificate will be issued to participants who have completed the entire training program and who have achieved an average score of 12/20 on the assessment questionnaire.

Educational course
Practical exercises

Course materials
Computer
Large screen (for in-person classes)

If you require specific accommodations (physical or educational accessibility) to follow this training course, please contact us by phone or email : accessibilite@aiola.fr

At the end of each training session, you will be asked to evaluate the training you received. An overall rating is calculated based on these evaluations.
To provide you with the best possible information on the quality of the training provided, as perceived by participants, the website aiola.fr displays the results of evaluations by participants of past training sessions, provided that these sessions have been offered at least once.

The maximum number of participants is set at 8.

The minimum number of participants required for the training to take place is 1. If this minimum is not met, the date will be postponed, or the training may be cancelled. In either case, you will be informed in advance, and in the event of cancellation, you will be reimbursed for any payments made.

The conditions are specified in the training agreement or contract, and the general terms and conditions of sale are available here. 

Upcoming performance indicator

No trainees participated in this training.

% of trainees who completed the training

*** Last updated: 02/06/2025 ***

1. RAISING AWARENESS AND TRAINING
  • Train IT teams
  • Train users
  • Raise awareness of risks
  • Know how to analyze a new, unknown contact
 
2. KNOW YOUR ENVIRONMENT
  • Infrastructure
  • Diagrams
  • Equipment inventories
  • Human resources (arrivals/departures)
  • Buildings and access to premises
 
3. ACCESS MANAGEMENT
  • Assigning rights in relation to responsibilities
  • Knowing how to choose an appropriate security policy (passwords, encryption, etc.)
  • Password management
 
4. SECURE WORKSTATIONS AND MOBILE TERMINALS
  • Recommendations
  • Monitoring
  • Updates
  • Best Practices
  • General and Specific Policy Management
  • Encryption
 
5. SECURE THE NETWORK AND MEANS OF COMMUNICATION
  • Recommendations
  • Network security (including Wi-Fi)
  • Email security
  • External access security
 
6. ADMINISTRATIVE SECURITY
  • Rules and practices
  • Protecting the administration
  • Updates and obsolescence
  • Auditing and analyzing

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.