Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

Cybercrime is a growing threat to society. Cybercriminals operate from anywhere to attack critical business infrastructure. The question addressed in this course will not be whether your body will be attacked but how to respond effectively to these attacks.

Who is this training for ?

For whom ?

Business or IS managers, general management, IT departments, IS security experts, lawyers.

Prerequisites

Training objectives

  • Know the dangers and identify the sources of threats
  • Understand the risks and security issues
  • Fight and react to malicious acts
  • Know how to organize an effective, useful and graduated response
  • Training program

      • Scams against the president? FOVI (False International Transfer Order).
      • Social engineering, Spear Phishing.
      • Theft of sensitive data, network intrusion of all kinds: what's the news? The darknet, malware, bots/botnets, ransomware.
      • Bank card violations, skimming, the darknet.
      • Management of traces, evidence and recordings.
      • How to detect and then characterize
      • ).
      • Internal best practices: IDS probe, analysis and correlation of events (SIEM).
      • OCLCTIC, BEFTI, DGSI, Gendarmerie Nationale/C3N: everyone has their own skills.
      • The SDLC and cybercrime investigators (ICC).
      • Report all abnormal event: PHAROS, signal-spam, CERT.
      • LPM, Vital Importance Operators, good practices and requirements on SIIV.
      • Specialized service offers, the role of ANSSI, qualified service providers.
      • Duality of legal liability: the principles of criminal and civil liability.
      • Cybercrimes in France and internationally: what repressive mechanism? Definitions/case law on "theft" or leak of data, fraudulent attack and maintenance in an IS/Network.
      • Definitions/case law on cyber harassment, happy slapping, e-reputation, damage to image on the Web.
      • Means of investigation and control of public authorities: LCEN, LOPPSI 2, Military Programming Law.
      • Management of evidence: legality, admissibility, difference in criminal/civil procedure, collection of proof on the Web.
      • Means of cryptology: dual-use goods, legal regime.
      • Illustrations/case: hacking of a hospital's IS a defibrillator, attack on an IS by an administrator.
      • Illustrations/case: Jérôme Kerviel affair, cyberattack on Swift banking messaging.
    • 883
    • 14 h

    Submit your review

    Translated By Google Translate