{"id":11174,"date":"2025-06-06T15:07:38","date_gmt":"2025-06-06T13:07:38","guid":{"rendered":"https:\/\/www.investinluxembourg.be\/our-sectors\/space\/galaxia\/formations-en-cybersecurite-proposees-par-idelux-en-partenariat-avec-nexova\/"},"modified":"2026-03-27T12:15:31","modified_gmt":"2026-03-27T11:15:31","slug":"test-the-defense-of-your-organization-against-cyberattacks","status":"publish","type":"page","link":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/","title":{"rendered":"Our cybersecurity training"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^10605|url^https:\/\/www.investinluxembourg.be\/wp-content\/uploads\/2025\/05\/SIQ05494.jpg|caption^null|alt^null|title^SIQ05494|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(37,79,86,0.7)&#8221; css=&#8221;.vc_custom_1748331725467{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221; el_class=&#8221;custom-line&#8221;][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1583489198736{padding-top: 0px !important;}&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;custom-white&#8221;]<\/p>\n<h1><strong>Test the defense of your organization against cyberattacks<\/strong><\/h1>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1551953135748{padding-top: 20px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #ffffff !important;}&#8221;]<div class=\"ult-just-icon-wrapper   vc_custom_1583486116454\"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#6da4b9;font-size:50px;display:inline-block;\">\n\t<i class=\"icomoon-the7-font-the7-mail-05\"><\/i>\n<\/div><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1773051077597{margin-bottom: 25px !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Sign up for free!<\/h3>\n<pre id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiL3qvJhdSRAxXnU6QEHc8wBVQQ3ewLegQIDRAW\" aria-label=\"Texte traduit\u00a0: Discover the latest opportunities in the sector!\"><\/pre>\n<p>[\/vc_column_text]<div id=\"modal-trg-txt-wrap-3161\" class=\"ult-modal-input-wrapper ult-adjust-bottom-margin   vc_custom_1773051108294  \" data-keypress-control=\"keypress-control-enable\" data-overlay-control=\"overlay-control-enable\"><style>\n\t\t\t\t\t.btn-modal.btn-id-69eb5d53165712-20398941:hover {\n\t\t\t\t\t\tbackground-color: #a2c13c !important;\n\t\t\t\t\t}\n\t\t\t\t\t<\/style><button  data-ultimate-target='#modal-trg-txt-wrap-3161 .btn-modal'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"desktop:24px;\"}'  style=\"background:#afcc40;border-color:#afcc40;color:#ffffff; font-family:&#039;Roboto Condensed&#039;;\" data-class-id=\"content-69eb5d53165712-20398941\" class=\"btn-modal ult-responsive btn-primary btn-modal-lg overlay-show ult-align-center btn-id-69eb5d53165712-20398941\" data-overlay-class=\"overlay-fade\">CONTACT-US!<\/button><\/div>\n<div class=\"ult-overlay content-69eb5d53165712-20398941 \" data-class=\"content-69eb5d53165712-20398941\" id=\"button-click-overlay\" style=\"background:rgba(42,82,89,0.8); display:none;\">\n\t<div class=\"ult_modal ult-fade ult-small\">\n\t\t<div id=\"ult-modal-wrap-7396\" class=\"ult_modal-content ult-hide\" style=\"border-style:solid;border-width:0px;border-radius:0px;border-color:#ffffff;\">\n\t\t\t<div class=\"ult_modal-header\" style=\"background:#afcc40;color:#ffffff;font-family:&#039;Roboto Condensed&#039;;font-weight:700;border-color:#ffffff;\">\n\t\t\t\t<h3  data-ultimate-target='#ult-modal-wrap-7396 .ult_modal-title'  data-responsive-json-new='{\"font-size\":\"desktop:25px;\",\"line-height\":\"desktop:35px;\"}'  class=\"ult_modal-title ult-responsive\">D\u00e9couvrez les derni\u00e8res opportunit\u00e9s du secteur !<\/h3>\n\t\t\t<\/div>\n\t\t\t<div  data-ultimate-target='#ult-modal-wrap-7396 .ult_modal-body'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"ult_modal-body ult-responsive ult-html\" style=\"\">\n\t\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11481-o1\" lang=\"fr-BE\" dir=\"ltr\" data-wpcf7-id=\"11481\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/11174#wpcf7-f11481-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11481\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"fr_BE\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11481-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<h5>Vous souhaitez en savoir plus ?\n<\/h5>\n<p>Nous avons beaucoup \u00e0 offrir\n<\/p>\n<p><label style=\"display: none; \">Pr\u00e9nom *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"prenom\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Pr\u00e9nom *\" value=\"\" type=\"text\" name=\"prenom\" \/><\/span>\n<\/p>\n<p><label style=\"display: none; \">Nom *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"nom\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nom *\" value=\"\" type=\"text\" name=\"nom\" \/><\/span>\n<\/p>\n<p><label style=\"display: none;\">Adresse email *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Adresse email *\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n<\/p>\n<p><label style=\"display: none;\">T\u00e9l\u00e9phone\/GSM *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"telephone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"T\u00e9l\u00e9phone\/GSM *\" value=\"\" type=\"tel\" name=\"telephone\" \/><\/span>\n<\/p>\n<p><label style=\"display: none; \">Entreprise *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"entreprise\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Entreprise *\" value=\"\" type=\"text\" name=\"entreprise\" \/><\/span>\n<\/p>\n<p><label style=\"display: none; \">Fonction *<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"fonction\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Fonction *\" value=\"\" type=\"text\" name=\"fonction\" \/><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Envoyer\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n\t\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\t<div class=\"ult-overlay-close top-right\" style=\"width:30px;height:30px; \"><div class=\"ult-overlay-close-inside\">Close<\/div><\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Cybersecurity is not only a matter of technology.<br \/>\nIt is a matter of preparation.<\/h3>\n<p>At the heart of the Galaxia hub in Transinne, IDELUX\u2019s cyber range enables public and private organizations to test the resilience of their infrastructures in a secure and immersive environment. A realistic replica of IT\/OT systems, credible attack scenarios, crisis management under real-life conditions: your teams train without any risk to your operational environments.<\/p>\n<p>The introduction takes place through Module 1 (Introduction to cybersecurity) and Module 2 (Cybersecurity training). Regular access to the cyber range is granted after completing the \u201cTraining the Trainers\u201d course, allowing participants to practically test their own processes.<\/p>\n<p><strong>Limited offer: access to the training courses is free until 30\/09\/2026!! Don\u2019t wait!<\/strong>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-1c3cb106eee4f97f46a1c5cfcbc15c57.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-1c3cb106eee4f97f46a1c5cfcbc15c57 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/www.idelux.be\/fr\/pierre-yves-defosse-0\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off \" id=\"default-btn-1c3cb106eee4f97f46a1c5cfcbc15c57\"><span>Sign up for free!<\/span><\/a><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; margin_bottom=&#8221;50&#8243; css=&#8221;.vc_custom_1749215810480{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221; el_id=&#8221;Module-1&#8243;][vc_column][vc_column_text css=&#8221;.vc_custom_1766504439860{margin-bottom: 0px !important;}&#8221;]<\/p>\n<h2>Module 1: <strong>Introduction to cybersecurity<\/strong><\/h2>\n<p><strong>Duration : 2 hours\u2003|\u2003Prerequisite: None<\/strong>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/5&#8243;][vc_column_text css=&#8221;&#8221;]<strong>Module presentation<\/strong><\/p>\n<p>In a time where cyberthreats are more and more present, sophisticated and targeted, this awareness session aims to give participants a clear understanding of the issues linked to cybersecurity. It provides training in the essential reflexes to adopt on a daily basis to effectively contribute to the protection of the organisation and comply with current regulations. A practical exercise in the cyber range reinforces learning through role play, based on an attack scenario.<\/p>\n<p><strong>Pedagogical objectives<\/strong><\/p>\n<p>Allow each participant to:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5967\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5967 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Understand the risks and issues relating to cybersecurity ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7621\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7621 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Identify the early signs of an attack ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7867\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7867 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Adopt the right behaviour to reinforce overall security of the organisation.<\/span><\/div><\/li><\/ul><\/div>[vc_column_text css=&#8221;&#8221;]<strong>Programme <\/strong>[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7887\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7887 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Introduction to cybersecurity: key definitions, objectives and role in the protection of digital assets ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-6769\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-6769 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Overview of current threats: typology of cyberattacks, recent and practical examples ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1874\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1874 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">The legislative framework: focus on the NIS2 European directive ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5452\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5452 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Profile of attackers (hackers, States, cybercriminals, insiders, etc.), motivations and operating methods ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3296\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3296 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Main types of attacks: phishing, ransomware, account compromise, supply chain attacks, etc ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3119\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:10px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:12px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3119 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">The essential counter measures: best security practices to apply in a professional environment, individual posture, collective vigilance.<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][vc_column width=&#8221;2\/5&#8243;][vc_single_image image=&#8221;10738&#8243; img_size=&#8221;600&#215;500&#8243; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/www.investinluxembourg.be\/wp-content\/uploads\/2023\/07\/guide-galaxia.pdf&#8221;][\/vc_column][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-8afc2b8fd4ce61218696c91c68a27fc6.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-8afc2b8fd4ce61218696c91c68a27fc6 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/www.idelux.be\/fr\/pierre-yves-defosse-0\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off \" target=\"_blank\" id=\"default-btn-8afc2b8fd4ce61218696c91c68a27fc6\" rel=\"noopener\"><span>Sign up for free!<\/span><\/a><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; margin_bottom=&#8221;50&#8243; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;ex-full&#8221; css=&#8221;.vc_custom_1749215827265{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221; el_id=&#8221;Module-2&#8243; bg_color_value=&#8221;#e7f0f4&#8243;][vc_column][vc_column_text css=&#8221;.vc_custom_1767883133811{margin-bottom: 0px !important;}&#8221;]<\/p>\n<h2>Module 2: <strong>Cybersecurity training<\/strong><\/h2>\n<p><strong>Duration : 6 hours \u2003| Prerequisite: MS Windows user<\/strong>[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/5&#8243;][vc_single_image image=&#8221;10741&#8243; img_size=&#8221;600&#215;500&#8243; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;3\/5&#8243;][vc_column_text css=&#8221;&#8221;]<strong>Module presentation<\/strong><\/p>\n<p>This training course offers a profound exploration of cyber concepts and threats for participants to better manage risks and reinforce their cyber resilience. Through theoretical contributions and two role play situations in the cyber range, this training course helps participants to better understand the mediums of an attack and the detection methods.<\/p>\n<p>The course emphasises the role of each employee in upholding cybersecurity and offers practical advice to identify risks, adopt the best practices and respond efficiently to an incident.<\/p>\n<p><strong>Pedagogical objectives<\/strong><\/p>\n<p>Allow each participant to:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3453\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3453 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Understand the typology of modern attacks and their impacts ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-9302\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-9302 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Identify the vulnerabilities exploited by the attackers ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1160\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1160 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Be familiar with the methods of detection and response.<\/span><\/div><\/li><\/ul><\/div>[vc_column_text css=&#8221;&#8221;]<strong>Programme<\/strong>[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1374\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1374 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Overview of the main threats and players in cyber risk ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1803\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1803 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Introduction to the regulatory framework ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-8208\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-8208 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Practical exercise 1 &#8211; Cyber range: targeted phishing scenario (30 min) ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5937\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5937 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">The main counter measures and the response to an incident ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1403\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1403 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Practical exercise 2 &#8211; Cyber range: privilege escalation attack (30 min) ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-9585\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-9585 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">The best security practices, individual posture and collective vigilance.<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-8afc2b8fd4ce61218696c91c68a27fc6.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-8afc2b8fd4ce61218696c91c68a27fc6 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/www.idelux.be\/fr\/pierre-yves-defosse-0\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off \" target=\"_blank\" id=\"default-btn-8afc2b8fd4ce61218696c91c68a27fc6\" rel=\"noopener\"><span>Sign up for free!<\/span><\/a><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; margin_bottom=&#8221;50&#8243; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;ex-full&#8221; css=&#8221;.vc_custom_1749215841463{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221; bg_color_value=&#8221;#00000000&#8243; el_id=&#8221;Module-3&#8243;][vc_column][vc_column_text css=&#8221;.vc_custom_1767883144636{margin-bottom: 0px !important;}&#8221;]<\/p>\n<h2>Module 3: <strong>Training the trainers<\/strong><\/h2>\n<p><strong>Duration : 2 days | <\/strong><strong>Prerequisite:\u00a0<\/strong>The participants must:<\/p>\n<ul>\n<li>have a personal work station for practical sessions ;<\/li>\n<li>be able to install software, including Visual Studio Code and MobaXterm on their device ;<\/li>\n<li>have a good command of Unix\/Windows systems ;<\/li>\n<li>know how to debug logs and understand the basics of networks.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/5&#8243;][vc_column_text css=&#8221;&#8221;]<strong>Module presentation<\/strong><\/p>\n<p>This training the trainers programme has been created to transfer the skills and knowledge required for the pedagogical use of the CITEF cyber range.<\/p>\n<p>This training alternates between theory and role play to explore the architecture of the platform, its administration and the management of pedagogical contents. The participants will learn how to create, construct and deploy realistic cyber scenarios using tools such as Ansible and IaaS technologies. The training ends with a laboratory session where each participant will develop and execute their own scenario, ready to be used in future training sessions.<\/p>\n<p><strong>Pedagogical objectives<\/strong><\/p>\n<p>Train future trainers and scenario developers on the professional use of the CITEF IDELUX platform.<\/p>\n<p><strong>Programme<\/strong>[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-4548\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-4548 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Introduction and methodology of the training ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-4834\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-4834 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">High level architecture of the CITEF cyber range ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5644\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5644 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Administration, organisation and digital library ;<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-2380\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:12px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon advanced \"  style=\"color:#6EA4B9;background:#FFFFFF00;border-style:solid;border-color:#6EA4B9;border-width:1px;width:25px;height:25px;line-height:25px;border-radius:500px;font-size:10px;display:inline-block;\">\n\t<i class=\"Defaults-check\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-2380 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Practical work: introduction to the development of scenarios.<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][vc_column width=&#8221;2\/5&#8243;][vc_single_image image=&#8221;10744&#8243; img_size=&#8221;600&#215;500&#8243; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row link=&#8221;url:https%3A%2F%2Finvestinluxembourg.be%2Fcontact%2F|title:Contact&#8221; smooth_scroll=&#8221;n&#8221; size=&#8221;big&#8221; btn_width=&#8221;btn_auto_width&#8221; custom_btn_width=&#8221;200&#8243; button_alignment=&#8221;btn_center&#8221; font_size=&#8221;14px&#8221; button_padding=&#8221;12px 18px 12px 18px&#8221; border_width=&#8221;0px&#8221; border_radius=&#8221;1px&#8221; btn_decoration=&#8221;none&#8221; text_color=&#8221;&#8221; default_btn_border=&#8221;y&#8221; default_btn_border_color=&#8221;&#8221; default_btn_bg=&#8221;y&#8221; default_btn_bg_color=&#8221;&#8221; default_btn_hover=&#8221;y&#8221; text_hover_color=&#8221;&#8221; default_btn_border_hover=&#8221;y&#8221; default_btn_border_hover_color=&#8221;&#8221; default_btn_bg_hover=&#8221;y&#8221; bg_hover_color=&#8221;&#8221; link_font_size=&#8221;14px&#8221; link_font_style=&#8221;:bold:&#8221; link_icon_size=&#8221;12px&#8221; link_padding=&#8221;4px 0px 4px 0px&#8221; link_text_color=&#8221;&#8221; link_hover=&#8221;n&#8221; link_text_hover_color=&#8221;&#8221; link_decoration=&#8221;upwards&#8221; link_border_width=&#8221;2px&#8221; link_border_color=&#8221;&#8221; icon_picker=&#8221;&#8221; icon_gap=&#8221;8px&#8221; icon_align=&#8221;left&#8221; general_settings=&#8221;&#8221; normal_settings=&#8221;&#8221; hover_settings=&#8221;&#8221; link_general_settings=&#8221;&#8221; link_normal_settings=&#8221;&#8221; link_hover_settings=&#8221;&#8221; link_underline_settings=&#8221;&#8221;][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-33bf09d73cf16a5013178bfb7b136c6c.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-33bf09d73cf16a5013178bfb7b136c6c > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/www.idelux.be\/fr\/pierre-yves-defosse-0\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off \" target=\"_blank\" id=\"default-btn-33bf09d73cf16a5013178bfb7b136c6c\" title=\"Contact\" rel=\"noopener\"><span>Sign up for free!<\/span><\/a><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^10605|url^https:\/\/www.investinluxembourg.be\/wp-content\/uploads\/2025\/05\/SIQ05494.jpg|caption^null|alt^null|title^SIQ05494|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(37,79,86,0.7)&#8221; css=&#8221;.vc_custom_1748331725467{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221; el_class=&#8221;custom-line&#8221;][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1583489198736{padding-top: 0px !important;}&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;custom-white&#8221;] Test the defense of your organization against cyberattacks [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1551953135748{padding-top: 20px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1773051077597{margin-bottom: 25px !important;}&#8221;] Sign up for free! [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Cybersecurity is&hellip;<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":4724,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11174","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova<\/title>\n<meta name=\"description\" content=\"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova\" \/>\n<meta property=\"og:description\" content=\"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Idelux\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T11:15:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/test-the-defense-of-your-organization-against-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/test-the-defense-of-your-organization-against-cyberattacks\\\/\",\"name\":\"Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.investinluxembourg.be\\\/#website\"},\"datePublished\":\"2025-06-06T13:07:38+00:00\",\"dateModified\":\"2026-03-27T11:15:31+00:00\",\"description\":\"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/test-the-defense-of-your-organization-against-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/test-the-defense-of-your-organization-against-cyberattacks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/test-the-defense-of-your-organization-against-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our sectors\",\"item\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Space &#8211; Cybersecurity\",\"item\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"GALAXIA\",\"item\":\"https:\\\/\\\/www.investinluxembourg.be\\\/en\\\/our-sectors\\\/space\\\/galaxia\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Our cybersecurity training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.investinluxembourg.be\\\/#website\",\"url\":\"https:\\\/\\\/www.investinluxembourg.be\\\/\",\"name\":\"Idelux\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.investinluxembourg.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova","description":"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova","og_description":"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.","og_url":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/","og_site_name":"Idelux","article_modified_time":"2026-03-27T11:15:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/","url":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/","name":"Galaxia | Formations en cybers\u00e9curit\u00e9 propos\u00e9es par IDELUX en partenariat avec Nexova","isPartOf":{"@id":"https:\/\/www.investinluxembourg.be\/#website"},"datePublished":"2025-06-06T13:07:38+00:00","dateModified":"2026-03-27T11:15:31+00:00","description":"IDELUX, en partenariat avec Nexova, propose un parcours de formations innovant et concret pour sensibiliser et former \u00e0 la cybers\u00e9curit\u00e9. Le Centre de Cybers\u00e9curit\u00e9 comprenant un cyber range et un simulateur de crises, con\u00e7us et op\u00e9r\u00e9s par Nexova, permet de recr\u00e9er les conditions d\u2019une crise cyber pour aider les organisations \u00e0 mieux appr\u00e9hender la menace et leur capacit\u00e9 \u00e0 r\u00e9pondre aux attaques.","breadcrumb":{"@id":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/test-the-defense-of-your-organization-against-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.investinluxembourg.be\/en\/"},{"@type":"ListItem","position":2,"name":"Our sectors","item":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/"},{"@type":"ListItem","position":3,"name":"Space &#8211; Cybersecurity","item":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/"},{"@type":"ListItem","position":4,"name":"GALAXIA","item":"https:\/\/www.investinluxembourg.be\/en\/our-sectors\/space\/galaxia\/"},{"@type":"ListItem","position":5,"name":"Our cybersecurity training"}]},{"@type":"WebSite","@id":"https:\/\/www.investinluxembourg.be\/#website","url":"https:\/\/www.investinluxembourg.be\/","name":"Idelux","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.investinluxembourg.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/pages\/11174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/comments?post=11174"}],"version-history":[{"count":10,"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/pages\/11174\/revisions"}],"predecessor-version":[{"id":11818,"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/pages\/11174\/revisions\/11818"}],"up":[{"embeddable":true,"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/pages\/4724"}],"wp:attachment":[{"href":"https:\/\/www.investinluxembourg.be\/en\/wp-json\/wp\/v2\/media?parent=11174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}