This certificate aims to provide the professionals who are at the beginning of their cybersecurity journey or a non-cybersecurity manager or leader seeking to bolster their foundational knowledge of cybersecurity concepts and strategies. Whether organisations want to upskilltheirprofessionals to become a cybersecurity expert or simplywish to enhancetheir digital securityawareness, this training isdesigned to meettheseneeds. It is accessible to a broad audience, from tech enthusiastslooking to understandcybersecurityfundamentals to professionals in variousfieldswhowant to protecttheirpersonal and organizational data. This course serves as an excellent starting point for those interested in building a career in cybersecurity or organisations that need to raise the awareness of their different staff to better protect themselves and their organizations from the ever-evolving landscape of cyber threats.
The training is offered in different formats ranging from 1-2 days tailored to the organisational and participants' needs. The certificate covers most needed concepts to understand the foundations of Cyber Security and protections of data within different devices. Participants will additionally gain insight into the hacker's behaviour through learning about the defense techniques and strategies from the most common type of attacks.
Introduction to Cybersecurity
Cybersecurity aspects
Cybersecurity threats
Most common cyber attacks
Cyber-attacks Management
Fundamentals of data protection
Defense strategies and needed tools
At the end of the training, the participants will receive a participation certificate which makes them eligible to participate to the other certificates of the program.
This course serves as an excellent starting point for those interested in building a career in cybersecurity.
It is also beneficial for organizations that need to raise awareness among their staff to better protect themselves and their organizations from the ever-evolving landscape of cyber threats.
It is accessible to a broad audience, from tech enthusiastslooking to understandcybersecurityfundamentals to professionals in variousfieldswhowant to protecttheirpersonal and organizational data.
Resources
sliders
Blog
BIM to CIM: from Building Performance to Territorial Management
The Executive Master's program "BIM to CIM" offered by the School of Architecture, Planning and Design (SAP+D) in collaboration with the Executive Education S&T at UM6P, operates in a context marked by di ...