Description of this training course
This course is designed to make participants aware of the risks associated with social engineering attacks - including phishing - as well as those linked to their use of the Internet and social networks. Through concrete examples, real-life cases and practical advice, participants will learn to recognize manipulation attempts, limit their online exposure, and react effectively in the event of an incident.
Training content
Teaching objectives
At the end of the course, participants will be able to :
- Recognize the different forms of social engineering attacks (email, telephone, SMS...)
- Understand how information shared online can be exploited by attackers
- Identify warning signs in a suspicious message or situation
- Understand the real risks and impacts of a successful attack
- Adopt the right digital security reflexes on a daily basis
- React effectively in the event of a phishing attempt or compromise
- Apply essential preventive measures, such as two-factor authentication and incident reporting
Introduction
This first part lays the foundations for understanding the cybersecurity risks associated with social engineering and online information disclosure.
Topics covered
- Issues, key figures, recent examples of social engineering attacks.
Use of the Internet and social networks
This section explores the risks associated with using the Internet and social networks, focusing on how information shared online can be exploited by attackers, to raise awareness of the risks associated with online exposure.
Topics covered
- Online presence and exposure of personal data
- Common bad practices (oversharing, geolocation, reused passwords)
- Concrete cases of exploitation via social networks (LinkedIn, Facebook, etc.)
- Link with OSINT and victim targeting
Phishing and social engineering
This section is the heart of the course. Participants will learn to recognize the different forms of phishing and social engineering attacks, as well as the techniques used by attackers to deceive their victims.
Topics covered
- Phishing (email, SMS, telephone)
- President scam
- Malicious devices (USB booby traps, etc.)
- OSINT & passive social engineering
Consequences of an attack
This section highlights the real risks and impacts of a successful attack, to raise awareness of the importance of vigilance and prevention.
Topics covered
- Access to user accounts
- Theft of sensitive information
- Malware (Ransomware, stealer...)
- Hacking of computer equipment
Spot an attack and protect yourself effectively
The aim of this section is to teach participants how to identify the warning signs of a phishing or social engineering attack, and how to adopt the right digital security reflexes on a daily basis.
Topics covered
- Warning signs
- Practical examples
- Reflexes to adopt on a daily basis
- MFA, reporting incidents
- Reacting if you've been tricked
Teaching approach
The training is based on a very practical approach, with :
- live demonstrations
- guided exercises
- hands-on labs
- realistic operating scenarios
Participants will work on a deliberately vulnerable application, reproducing situations encountered during real security audits.
Requirements
This course can be run either face-to-face or remotely, depending on participants' needs and constraints. Practical exercises require the use of a virtual machine or a secure laboratory environment, which will be provided to participants.
Target audience
This course is primarily aimed at developers, system administrators, security managers/IT directors and cybersecurity consultants.
Prerequisites
Basic knowledge of web development is recommended for this course.
How to access
You can register for the course online or after an interview by videoconference.
Access time
Access to training generally takes 2 to 4 weeks, depending on participants' availability and the organization of the session.
Accessibility
As the training is mainly distance learning, it is accessible to people with reduced mobility. In the case of face-to-face training, it will take place on premises accessible to people with reduced mobility.
Supervision
Training is provided by a cybersecurity expert with almost 10 years' experience in offensive cybersecurity.
Educational follow-up
Course materials in PDF format will be provided to learners. In addition, online cybersecurity training platforms will be used.
Follow-up
Daily online registration will be carried out to track participants' attendance.
Results tracking
At the end of the course, learners will take a multiple-choice test to validate their learning.