In today’s world, many businesses have begun a major digital shift. Consumers as well as businesses are moving toward e-commerce and digital platforms in droves.

To be successful, companies are implementing web technologies that collect more and more data about their customers and host it on cloud servers.

Just because your data is no longer hosted on your premises does not mean you are no longer responsible for it.

If you don’t properly secure your computer systems, it’s only a matter of time before hackers find a loophole and a major data breach occurs.

This course is for:

IT Professionals

Business managers

(who have good knowledge in the digital field)

.

Who want to learn to:

With the help of:

Jean-Philippe Racine

Jean-Philippe has been in the information technology field for 20 years, 16 of which have been dedicated exclusively to information security.

He started his career in operational mandates (server and firewall management, daily vulnerability analysis, wireless network penetration testing, etc.). Today, he carries out tactical and strategic mandates in information security.

In terms of education, Jean-Philippe holds a master’s degree in administration, with a major in IT governance, auditing and security, from the Université de Sherbrooke. He has also specialized in obtaining a fine collection of certifications, including Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP) as well as the Cloud Security Knowledge (CCSK) certificate from the Cloud Security Alliance.

Jean-Philippe is known to be a very good popularizer. He knows how to borrow the vocabulary of his interlocutors to make his audience understand cybersecurity concepts.

Jean-Philippe

By working on the subjects:

Module 1 - Cybersecurity fundamentals and challenges for today's organizations

Module 1 - Cybersecurity fundamentals and challenges for today's organizations

  • Main threats and damages of cybercrime in money value
  • Types of damage
  • Availability, integrity, confidentiality and value of information
  • How is cybersecurity managed?
  • Security measures /li>
  • The compliance vs. risk management approach
  • Risk factors

Module 2 - The obligations, opportunities and risks of Cloud

Module 2 - The obligations, opportunities and risks of Cloud

  • The basics of cloud computing (IaaS, PaaS, SaaS)
  • Legal issues in a cloud computing context
  • Opportunities and risks between the traditional model of acquiring and hosting IT products and services
  • Means of risk mitigation
  • Use of cyber risk insurance for suppliers
  • Module 3 - Safety functions present in known products on the market

    Module 3 - Safety functions present in known products on the market

  • Roles and responsibilities according to the type of cloud platform used (IaaS, PaaS, SaaS)
  • Key security features of cloud providers (MS Azure, MS365, AWS, Google Suites, OVH, QuebecCloud, etc.)
  • Security monitoring (SIEM, vulnerability management)
  • Security foundation (DDoS, FW, IDS/IPS, WAF, HSM)
  • Identity and access management (IAM, SSO, MDM, CASB)
  • Module 4 - Cloud Solution Lifecycle and Actions

    Module 4 - Cloud Solution Lifecycle and Actions

  • Integration of security throughout the lifecycle of cloud systems and applications
  • Audit authorities and how to audit a cloud system
  • Security incident management
  • Review of previous elements
  • How to subscribe?

    "*" indicates required fields

    I am interested in the following course(s):*

    How much does it cost?

    495 $ (+tax) per person
    • 7 hours of classes (2 blocks of 3.5 hours)
    • As a live webinar on a date of your choice
    • Contact us for dates