Cybersecurity - Trends, threats and vulnerabilities

Understand the cybersecurity world with this course. Discover the trends, threats and the most exploited vulnerabilities

Upcoming sessions

Guaranteed to run

No date suits you?

Notify me when a session is added.

  • Duration: 1 day
  • Regular price: $750
  • Preferential price: $650

Course outline

Duration : 1 day

With this training, participants will acquire awareness and qualification on the cybersecurity world including: the trends, threats and the most exploited vulnerabilities. This session is helpful for any organization concerned about cyber threats. It is now crucial for managers and security professionals to develop knowledge and expertise in this field.

Audience

This training is for managers, IT specialists and information security professionals.

Prerequisites

None

Objectives

After this training, participants will be able :

  • To know and understand the cybersecurity issues.
  • To be aware of the cybersecurity trends and the cyber threats for the upcoming years.
  • To know the major threats (cyber threats) being the triggers for cybersecurity. In other words, who benefits from them.
  • To know which vulnerabilities are mostly exploited by cyber threats.
  • To summarily assess if their organization should be concerned about cybersecurity and if it is a cyber-threats’ target

Contents

What is the cybersecurity - Introduction

  • Why the term “cybersecurity”
  • What cybersecurity is made of
  • The Internet Black Market
  • Which are the different kinds of cybersecurity crimes
  • The main actors
  • Their motivation and goals
  • Their main targets

Cybersecurity trends

  • Cybersecurity historic
  • What are the cybersecurity trends
  • What will be the future for cybersecurity

Cyber threats

  • What is a cyber threat
  • Who are the main actors representing “cyber threats”
  • The opportunists
  • The targeted attacks

The most exploited vulnerabilities

  • What are the main attack vectors used
  • What are the most exploited vulnerabilities
  • Overview on: How not to be an “easy target”

Surround yourself with the best

Carl M. Gilbert
Carl M. Gilbert
Expert Leader
Carl M. Gilbert is a coach, mentor and project manager with more than 25 years of experience in project management, mainly in information technology. He has trained more than 25,000 people in project management (in traditional, agile or hybrid mode) all around the world. Carl M. Gilbert is an engineer and also holds a master's degree in project management from with a specialization in international project management. For 25 years, he has specialized in strategic consulting in project management, program management and portfolio management.
Catherine Edgar
Catherine Edgar
Senior Project Director and Project Management Trainer
Catherine Edgar is a senior project director with more than 25 years of IT experience at large firms. Over the course of her career, Catherine has developed management expertise with a focus on the human impact brought about by change. She has excellent problem-solving, training, coaching and interpersonal relation skills. Catherine holds a bachelor’s degree in management information technology, as well as a certification as a project management professional (PMP) from the Project Management Institute (PMI).
Jean Falardeau
Jean Falardeau
Trainer
With a Masters degree in Science and a bachelor in information systems, Jean Falardeau has been in the business for more than 35 years. He works in business architecture and analysis, strategic consulting, change management, enterprise architecture, business process reengineering and AgilityFor nearly 7 years, Jean trained more than 400 people showing them best practices in architecture and business analysis. His work was based on guides such as BABOK and BIZBOK.
Michel Drolet
Michel Drolet
Executive VP and Strategic Management Advisor
Backed by solid experience in industry, Michel is what you would call a high-level strategic consultant.