Training course - Raising awareness of cybersecurity risks

Description of this training course

This course is designed to make participants aware of the risks associated with social engineering attacks - including phishing - as well as those linked to their use of the Internet and social networks. Through concrete examples, real-life cases and practical advice, participants will learn to recognize manipulation attempts, limit their online exposure, and react effectively in the event of an incident.

Training content

Teaching objectives

At the end of the course, participants will be able to :

  • Recognize the different forms of social engineering attacks (email, telephone, SMS...)
  • Understand how information shared online can be exploited by attackers
  • Identify warning signs in a suspicious message or situation
  • Understand the real risks and impacts of a successful attack
  • Adopt the right digital security reflexes on a daily basis
  • React effectively in the event of a phishing attempt or compromise
  • Apply essential preventive measures, such as two-factor authentication and incident reporting

Introduction

This first part lays the foundations for understanding the cybersecurity risks associated with social engineering and online information disclosure.

Topics covered

  • Issues, key figures, recent examples of social engineering attacks.

Use of the Internet and social networks

This section explores the risks associated with using the Internet and social networks, focusing on how information shared online can be exploited by attackers, to raise awareness of the risks associated with online exposure.

Topics covered

  • Online presence and exposure of personal data
  • Common bad practices (oversharing, geolocation, reused passwords)
  • Concrete cases of exploitation via social networks (LinkedIn, Facebook, etc.)
  • Link with OSINT and victim targeting

Phishing and social engineering

This section is the heart of the course. Participants will learn to recognize the different forms of phishing and social engineering attacks, as well as the techniques used by attackers to deceive their victims.

Topics covered

  • Phishing (email, SMS, telephone)
  • President scam
  • Malicious devices (USB booby traps, etc.)
  • OSINT & passive social engineering

Consequences of an attack

This section highlights the real risks and impacts of a successful attack, to raise awareness of the importance of vigilance and prevention.

Topics covered

  • Access to user accounts
  • Theft of sensitive information
  • Malware (Ransomware, stealer...)
  • Hacking of computer equipment

Spot an attack and protect yourself effectively

The aim of this section is to teach participants how to identify the warning signs of a phishing or social engineering attack, and how to adopt the right digital security reflexes on a daily basis.

Topics covered

  • Warning signs
  • Practical examples
  • Reflexes to adopt on a daily basis
  • MFA, reporting incidents
  • Reacting if you've been tricked

Teaching approach

The training is based on a very practical approach, with :

  • live demonstrations
  • guided exercises
  • hands-on labs
  • realistic operating scenarios

Participants will work on a deliberately vulnerable application, reproducing situations encountered during real security audits.

Requirements

This course can be run either face-to-face or remotely, depending on participants' needs and constraints. Practical exercises require the use of a virtual machine or a secure laboratory environment, which will be provided to participants.

Target audience

This course is primarily aimed at developers, system administrators, security managers/IT directors and cybersecurity consultants.

Prerequisites

Basic knowledge of web development is recommended for this course.

How to access

You can register for the course online or after an interview by videoconference.

Access time

Access to training generally takes 2 to 4 weeks, depending on participants' availability and the organization of the session.

Accessibility

As the training is mainly distance learning, it is accessible to people with reduced mobility. In the case of face-to-face training, it will take place on premises accessible to people with reduced mobility.

Supervision

Training is provided by a cybersecurity expert with almost 10 years' experience in offensive cybersecurity.

Educational follow-up

Course materials in PDF format will be provided to learners. In addition, online cybersecurity training platforms will be used.

Follow-up

Daily online registration will be carried out to track participants' attendance.

Results tracking

At the end of the course, learners will take a multiple-choice test to validate their learning.

Pricing: 300€ HT par personne sur 2 heures

Contact us

Do you have any questions or would you like to request a pentest? Please do not hesitate to contact us.

* Mandatory fields

Email us:

E-mail us if you have any general questions.

contact@secureaks.com

Call us:

Don't hesitate to call us if you have any general questions.

+33 (0)4 73 95 60 35

Meeting

Book a meeting to discuss your security needs.

calendly.com/secureaks-garcia
Matomo