Logo_CELTEAM-bronze.png

e-LEARNINg

courses

LEARN HOW TO SECURE YOUR DIGITAL ENVIRONMENT AND TO DISABLE THE TRAPS SET BY HACKERS

To an malicious third party, our computers, smartphones and tablets are a direct access to every last detail of our professionnal and family lives.

Are you aware of it? To this day, have you been doing enough to shield yourself from identity theft, from computer intrusion, from hacking?

 

Designed hand in hand by both Celteam and Daesign, this new course will turn your employees and colleagues (primary targets) into reliable, aware users ready to face any eventuality.

 
  • IN PARTNERSHIP WITH DAESIGN, CORPORATE TRAINING EXPERTS, AND 15 OTHER COMPANIES

  • CUSTOM MADE, FLEXIBLE COURSES THAT FIT ALL RISK PROFILES

  • FINAL ASSESSMENT AND SUCCESS CERTIFICATE

  • EMPLOYEES MONITORING AND TRACKING DATA

  • MULTILINGUAL : FRENCH, ENGLISH

  • MULTI-DEVICE / NO PLUGIN

  • DEPLOYMENT EITHER ON OUR PLATFORM OR ON YOUR LMS

  • OPTIONAL CUSTOM-MADE UNITS

  • CUSTOMIZABLE MOBILE CONTENT WITH SAVVY AUTHOR

#CUSTOM-MADE AND FLEXIBLE COURSES

A TRUE LIBRARY OF SHORT CONTENTS (1H30)

+

PROFILES MATCHING PRECISE RISK PROFILES

COMMON BASIS

30 minutes common basis course

SPECIFIC

Specific units to set up additional courses

À LA CARTE

Every company signs up its employees for the most fitting course

ADAPTABLE

A self-assessment unit alows your employees to finely customize their courses even further

# UN PARCOURS DE SENSIBILISATION    DE 30 MINUTES

Am I protected?


I assess my digital habits and risk exposure level




The main threats


Viruses, malwares, ransonwares, phishing, identity theft…




The password mystery finally solved


How do hackers do it? How to create safe and memorable passwords?




Getting online, getting around, sending e-mails... safely?


What networks are safe, what safety measures to take, what is a malicious website or e-mail?




Professional and personnal use, why segment?


Separating navigation, mailing, pro and personnal use




What do social networks know about me?


The traps of social ingeneering, what you should and should not share




Real-life immersion: how to detect breaches and act on them?


Protecting yourself from prying eyes, hands, ears and bugs, and first-aid in case of symptoms





ADDITIONAL CONTENT

An internalized recall-centered mobile unit  "Cybersécurity, a choose your own adventure story"

Audio stories

3x5mn episodes 

# Extending the training experience regarding profiles and assessed risks

  • SENSITIVE

    Holds a key position, uses data linked to intellectual property, personal or financial issues. 

    20′ additional training :
    My data is valuable, my network is valuable, phishing, identity theft, fraud.

  • NOMAD

    Moves outside of the company, travels the country or the world, works from home or from a distance.

    13′ additional training :
    Before/during/after : the 3 steps of a trip, what networks, what safety measures, how to secure your own wifi network.

  • PARTNER

    Welcomes partners and/or works on company ground, .

    8′ additional training :
    Confidentiality with and towards partners, common mistakes and how to avoid them while working with third parties.

  • ADMIN

    Has privileged rights and access on the computer system or the devices.

    8′ additional training :
    Testing my passwords,  testing my passive protections, viruses, malwares, ransomwares, phishing, identity theft.

  • Industrial

    Works in an industrial environment, with devices linked to specific networks
    (ex : SCADA system).

    5′ additional training :
    Precautionnary measures in an industrial environment, information systems air-tightness : what to and not to do ?

INTERESTED ?

Contact us !

© 2019 by CELTEAM