With telecommuting, the expansion of computerized processes, robotization and soon, artificial intelligence, the security of your computer data becomes a constant concern. Our expert trainers will be able to help you apply good computer security practices.
On this page you will find :
- all the details about our custom-made training courses on COMPUTER SECURITY
- the list of the trainer (s) specialising in this topic
- and examples of existing training courses to give you an idea of what can be done at home!
Available in French and English depending on the trainer
Who is the target audience for these tailor-made IT security training courses?
To all those who are responsible for an organization's computer data. IT specialists, network managers, business managers and anyone who works in a network environment.
Can this computer security training be adapted to my organization?
Yes, it is! This is the main goal of our tailor-made training courses. Below, you will find a list of existing courses that have been developed by our trainers on the subject.
The idea is to present you with an overview of what is feasible on this topic, so that you can determine your needs. In doing so, the chosen trainer will be able to prepare a tailor-made training course that perfectly meets your expectations.
Examples of computer security training
- Cybersecurity against all odds - By Steve Waterhouse
- Cybersecurity issues and vulnerabilities to your organization - By Steve Waterhouse
- What should we protect in our critical infrastructure? - By Steve Waterhouse
Which trainers offer computer security training?
It was during his military career with the Royal 22e Régiment that Capt(ret) Waterhouse traded in the gun for the keyboard to become one of the first cyber soldiers in the country. He first managed the computer networks of LFQAHQ, then the Metropolitan network of the Montreal base. Afterwards, he became the first Information Systems Security Officer at the Montreal base and then at the Royal Military College Saint-Jean. He continues to share his passion and experience as a lecturer with the University of Sherbrooke in the graduate microprogram in computer security - prevention component and as a consultant in consulting services.
ELIGIBILITY FOR LAW 90
Yes, we are accredited and our training courses are eligible under Bill 90, which promotes the development and recognition of workforce skills, commonly known as the Skills Act.
The choice is yours! All our tailor-made training courses can be presented in the classroom or online, live!
DURATION OF TRAINING
From 2 hours to 2 days, our trainer will adapt to your needs.
The cost of customised training varies according to several criteria, including the course chosen and the trainer who presents it, the duration, whether it is presented online or in a classroom, the location, the number of participants, etc. The easiest way is to contact us for a quote.