COURSE

See below the detailed plan for the You are digital I Cybersecurity course:

Episode 1 - Political context and cybercrime industry


  • Master the basics of cybersecurity to understand the challenges relating to information systems security in companies
  • Know the geopolitical context of the cybercrime industry and the regulatory bodies
  • Understand the impacts of an attack and of digital transformation on cybersecurity
  • Episode 2 - Definition and common language of information security


  • Know the common concepts, terms and acronyms of information systems security
  • Understand hacking, the different types of hackers and ENISA's taxonomy of IT incidents and be able to link the main types of incidents to them
  • Know the norms and methods used to assess the security of information systems and the different security tools, and understand their general operation
  • Episode 3 - Different types of attack relating to information and communication networks


  • Know the different types of attack relating to information systems and their scenarios
  • Knowledge and understanding of typical attack scenarios: examples of APT and DDOS
  • Be aware of best practice and the importance of the human factor in protecting the information system
  • Episode 4 - Definition and mastery of risk management principles


  • Know the definitions associated with risk handling
  • Know how to differentiate between the different types of risk handling and be able to classify the risk according to its impact and likelihood
  • Know the tools and best practice for the implementation of a security policy adapted to organisations and employees
  • Episode 5 - Designing a security architecture


  • Know the rules for developing a security architecture
  • Master the notions of network layers and be able to identify security tools for each layer
  • Understand the scenarios of typical attacks and know which tools prevent them
  • Be able to apply best practice concerning virtualisation, partitioning, the cloud and outsourcing
  • Episode 6 - In-Service Support


  • Know the tools for auditing an organisation's IT inventory
  • Be aware of the importance of updating information systems, know the main tools for maintaining an effective technological watch and know how to anticipate obsolescence
  • Differentiate between software vulnerability and configuration breach, understand the patch management process and the principle of hardening and its different layers 0%
  • Episode 7 - Managing identity, authentication and access


  • Know how to manage identities and know the 3 main architectures of identity management
  • Know best practice in terms of authentication; be able to create a solid password and strong authentication
  • Understand the 4 fundamental pillars of access to information systems and its life cycle, the purpose of the "least privilege", how user account provisioning works and the RBAC method principle
  • Episode 8 - Issues associated with maintaining the information security of SCORM package ISs


  • Understand the challenges and best practice relating to the administration of information systems
  • Be aware of the risks involved in remote administration
  • Know the tools and best practice for the implementation of a security policy adapted to organisations and employees
  • Episode 9 - Principles of cryptography


  • Know the definition and key principles of asymmetrical encryption
  • Know how to identify the protocols used for encryption according to practices (e-mails, file loading, storage devices, etc.); be alert to the existence of breaches in protocols
  • Know best practice associated with encryption
  • Episode 10 - Security requirements for information


  • Understand the security requirements for an item of information (DICT) and the best practice relating to data protection
  • Know the key stages of the life cycle of an item of information: classification, storage, communication and destruction
  • Understand the information classification principle, the national level of classification and the regulations governing classified information
  • Episode 11 - SOC Security Operating Centre


  • Know the role, organisation and scope of the SOC
  • Identify stakeholders in information system security and their role
  • Know the technology relating to information system security and its developments
  • Episode 12 - Handling incidents


  • Master the notions of event and incident, know how to define the 4 stages of the incident management process
  • Understand the importance of the human aspect and good communication in case of crisis management, know the stakeholders involved in incident management and identify their roles
  • Know the main plans relating to crisis management and understand the importance of tests and procedure rehearsals in crisis management
  • Final assessment


    Final test to confirm what has been learnt on the course. To obtain your You Are Digital | CyberSecurity certificate, you must get a score of at least 80%.