Find out more about the 3 cybersecurity training courses offered by IDELUX in partnership with Nexova

Discover the latest opportunities in the sector!



		

Module 1: Introduction to cybersecurity

Duration : 2 hours | Prerequisite: None

Module presentation

In a time where cyberthreats are more and more present, sophisticated and targeted, this awareness session aims to give participants a clear understanding of the issues linked to cybersecurity. It provides training in the essential reflexes to adopt on a daily basis to effectively contribute to the protection of the organisation and comply with current regulations. A practical exercise in the cyber range reinforces learning through role play, based on an attack scenario.

Pedagogical objectives

Allow each participant to:

  • Understand the risks and issues relating to cybersecurity ;
  • Identify the early signs of an attack ;
  • Adopt the right behaviour to reinforce overall security of the organisation.

Programme

  • Introduction to cybersecurity: key definitions, objectives and role in the protection of digital assets ;
  • Overview of current threats: typology of cyberattacks, recent and practical examples ;
  • The legislative framework: focus on the NIS2 European directive ;
  • Profile of attackers (hackers, States, cybercriminals, insiders, etc.), motivations and operating methods ;
  • Main types of attacks: phishing, ransomware, account compromise, supply chain attacks, etc ;
  • The essential counter measures: best security practices to apply in a professional environment, individual posture, collective vigilance.
SIQ05698

Module 2: Cybersecurity training

Duration : 6 hours  | Prerequisite: MS Windows user

SIQ05734

Module presentation

This training course offers a profound exploration of cyber concepts and threats for participants to better manage risks and reinforce their cyber resilience. Through theoretical contributions and two role play situations in the cyber range, this training course helps participants to better understand the mediums of an attack and the detection methods.

The course emphasises the role of each employee in upholding cybersecurity and offers practical advice to identify risks, adopt the best practices and respond efficiently to an incident.

Pedagogical objectives

Allow each participant to:

  • Understand the typology of modern attacks and their impacts ;
  • Identify the vulnerabilities exploited by the attackers ;
  • Be familiar with the methods of detection and response.

Programme

  • Overview of the main threats and players in cyber risk ;
  • Introduction to the regulatory framework ;
  • Practical exercise 1 – Cyber range: targeted phishing scenario (30 min) ;
  • The main counter measures and the response to an incident ;
  • Practical exercise 2 – Cyber range: privilege escalation attack (30 min) ;
  • The best security practices, individual posture and collective vigilance.

Module 3: Training the trainers

Duration : 2 days | Prerequisite: The participants must:

  • have a personal work station for practical sessions ;
  • be able to install software, including Visual Studio Code and MobaXterm on their device ;
  • have a good command of Unix/Windows systems ;
  • know how to debug logs and understand the basics of networks.

Module presentation

This training the trainers programme has been created to transfer the skills and knowledge required for the pedagogical use of the CITEF cyber range.

This training alternates between theory and role play to explore the architecture of the platform, its administration and the management of pedagogical contents. The participants will learn how to create, construct and deploy realistic cyber scenarios using tools such as Ansible and IaaS technologies. The training ends with a laboratory session where each participant will develop and execute their own scenario, ready to be used in future training sessions.

Pedagogical objectives

Train future trainers and scenario developers on the professional use of the CITEF IDELUX platform.

Programme

  • Introduction and methodology of the training ;
  • High level architecture of the CITEF cyber range ;
  • Administration, organisation and digital library ;
  • Practical work: introduction to the development of scenarios.
SIQ05717