shape
shape

cybersecurity for Yaoundé architecture IT technicians level 1

 

 

TITLE : cybersecurity for Yaoundé architecture IT technicians level 1

DATES : November 11 to 15, 2024.

COURSE DURATION : 5 days

PLACE : Dakar, Senegal

 

COURSE CONTENT
In general, the course will cover the following points:
– Hardware
– System administration
– Computer networks
– Computer security

INTERNSHIP OBJECTIVES

General objective

The main aim of this training course is to protect critical infrastructures in the maritime sector.
In particular, it aims to strengthen the skills of computer technicians in the installation, management and administration of computer systems, with particular emphasis on cybersecurity resources.

Specific objectives

Specifically, the course aims to:- Teach the motivations and need for information systems (IS) security;
– Introduce the definitions and typology of threats.
– Introduce networking principles and proactive defense strategies to protect against potential cyber threats.
– Explore common cyber-attacks, identify threats and vulnerabilities, and understand the architecture required for robust security.
– Disclose the many facets of security within an organization;
– Inculcate computer hygiene reflexes (securing internal information systems);
– Teach techniques for securing a partially or fully outsourced IS.

TARGET AUDIENCE

This training course is organized for computer technicians working in the monitoring centers
YAOUNDE Architecture (CIC-CRESM. -CMC-COM-MRCC).
A total of 16 participants are expected to attend.

TEACHING METHOD

The pedagogical approach adopted for this course is based on two pillars: lectures and workshops.
– Lectures. The pedagogical approach adopted consists of lectures by the teacher on the session’s theme. These presentations are designed tò introduce participants to the main concepts and theoretical elements relevant to the session theme. Powerpoint slideshows prepared by the teacher are made available.
– Workshops. These “workshops” consist of sessions based, among other things, on the use of digital tools.

 

REGISTRATION PROCEDURES

Designation by eligible Ports via AGPAOC