Bachelor Cybersecurity specialist
Designed to train students in technical professions and promote their professional integration, our Bachelor's degree.
A learning concept 100% cybersecurity
Based on the desire to make you operational in your future career, all the modules are composed of practical cases allowing you to practice in real working conditions. Our training has been designed by experts in cybersecurity and education to boost your employability.
Alternation
Support is offered for the search for work-study placements. The training costs amounting to €10,500 net of tax are fully covered by your future employer.
Initial
To improve the accessibility of the training, the course is also open to initial training. An alternating internship will allow you to validate your skills in a professional situation. The training costs are €7,500 net of tax. The hourly volume amounts to 490H00.
Certification
For any request regarding passing certifications, you can contact Guillaume Delorme, Educational Manager of the establishment by email guillaume.delorme@csb.school
Gateway
Our Bac+3 Cybersecurity Specialist offers gateways and equivalences to other Bac+3 level cybersecurity training courses.
100% Cybersecurity training
Our Cybersecurity Specialist course is designed to train students in the technical professions of cybersecurity. To acquire the certification, you will need to validate the 4 skill blocks. Each skill block is validated independently and can be obtained independently of the others. At the same time, you must have professional experience related to the certification of at least 600 hours.
• Secure the data and identities of an existing information system
- Strategy and IT Governance
- Cybersecurity in project design and management
- IoT: Internet of Things
- IoT: Security
- Fundamentals of Cryptography
- Data and Information Protection
- Email Security
• Conduct ethical intrusion tests
- Pentest 01: Intro Pentest / legal / etc.
- Pentest 02: Passive reconnaissance / Active reconnaissance (external)
- Pentest 03: Passive reconnaissance / Active reconnaissance (Web)
- Pentest 04: Information Leaks & User Inputs
- Pentest 05: Access Control & Authentication / Authorization
- Pentest 06: Privilege Escalations on Linux Server
- Pentest 07: Privilege Escalations on Docker
- Pentest 08: Race conditions & business logic
- Pentest 09: Exploitation of CVEs on CMS or common IT tools
- Pentest 10: Exploiting Simple CVEs with Pivot, Introduction to Linux Persistence
- Preparation and passing of CEH certification
• Configure infrastructure and network security elements
- Industrial and OT Environments
- Industrial infrastructure
- Industrial Cybersecurity: risk-based approach
- Concepts and basics of telecommunications networks
- Communication protocols and market overview
- Telecommunications Network Security
- Securing cloud infrastructures
- Cloud Service Provider Management (CSPM)
- Telecommunications Network Management
• Detect and analyze cybersecurity events
- Cyber Threat and Risk Management
- Cybersecurity of network architectures
- SOC – Issues and objectives
- Computer hardware protection
- Authentication Management
- Playbook Creation
- SOC – Level 1 Analyst
• Other modules
- English
- Cybersecurity Regulatory Compliance Fundamentals
- Public speaking & oratory: 1
• Certification
Preparation and passing of CEH certification
The CEH (Certified Ethical Hacker) certification prepares professionals to identify and exploit vulnerabilities in computer systems, with the aim of improving their security. The training covers ethical hacking techniques, such as penetration testing and vulnerability analysis. Passing the certification validates the ability to think like a hacker to better protect infrastructures.
•
Some examples of projects
Our educational model aims to enable our students to master the technical skills necessary for their integration into a company. In parallel with this approach, we focus part of our program on the human dimension. You will find some examples of projects going in this direction.
Preparation for the Certified Ethical Hacker - CEH certification
To boost your employability and enhance your skills. To learn more about how to learn, click here.
Creating and securing a computer network
Based on our infrastructure and our simulator, you will be required to deploy and secure a computer network through the installation of physical equipment and their configuration.
Use of artificial intelligence in the service of cybersecurity
Cybersecurity is evolving every day, you will learn how to protect yourself from the 6 threats to artificial intelligence and how to use them to protect yourself.
Detection of cyberattacks using a Security Operations Center
In order to prepare you for the real context of a company, you will learn how to detect and respond to cyber attacks within a scaled-up Security Operations Center (SOC).
You will work on solutions such as:
a corporate network comprising a corporate zone, an industrial zone and a demilitarized zone;
a set of firewalls (Fortinet, Stormshield, Palo Alto, etc.);
a set of EDRs (Tethris, HarFangLab, etc.);
a set of Cloud Security Posture Management (Palo Alto, Netskope, etc.);
a set of encryption solutions (BitLocker, BitDefender, etc.);
a PKI (public key infrastructure) with associated policies;
machine-learning type artificial intelligence;
industrial equipment (Schneider, Weidmueller, Siemens, Codra, Hirschmann, etc.).
Hybrid learning at the service of cybersecurity
Face-to-face
During these times, our students experiment with their know-how in rooms dedicated to practice after the speaker's explanations. The speaker is also present to answer students' questions during the hours dedicated to "educational tutoring".
E-Learning
To support learning, training hours are provided in e-learning on our Workinlive platform. This mode allows our students to consolidate their practical learning according to their needs and at their own pace. Access to the platform is available at any time
Apply for the Bachelor Cybersecurity specialist
We provide you with tools and create a place where you will enjoy living and following a demanding training. CSB.SCHOOL is committed to supporting all learners regardless of their situation. In order to benefit from the support system and specific arrangements, we invite you to bring an official document attesting to your disability situation or to take the necessary steps to obtain recognition of your disability. You have a Disability Referent within our school
Prerequisites
Candidates with:
- a professional certification/level 5 diploma or equivalent, with a specialization in IT or cybersecurity; or significant experience that has enabled the acquisition of skills in IT or cybersecurity.
- a level of English allowing for professional conversation and reading technical documentation
Students who have successfully completed the “cyberprep” course will be automatically admitted to the Cybersecurity Specialist course. Find the admission requirements for the cyberprep course here .
Selection process
- An online form to describe your academic and professional background as well as your motivations for working in the field of cybersecurity.
- An interview will be conducted with a cybersecurity expert and an admissions officer.
- If your application is accepted, a behavioral skills test will be sent to you to identify your professional strengths and help us better support you in your company placement.
We will respond to you within 48 hours maximum and will then arrange an interview to suit your schedule.
Validation of acquired experience
Without a diploma, but with extensive professional experience, consider VAE.
CSB.SCHOOL supports you in this process, all the information is available at the bottom of this page.
How much does this support cost?
- Application admissibility phase: €300 excluding tax
- Support phase: €2,500 net of tax
- Jury: €1,500 net of tax
Validation of acquired experience
Without a diploma, but with a great professional experience, consider the VAE.
The CSB.SCHOOL supports you in this process.
For more information please to contact us directly.
Apply
No need to go to the post office or to send us an email. Just click on the “Apply” icon and forward us your application file.
Consult our booklets
Our booklets are access-free. To consult them, we do not ask you for your motives, nor the training program you are interested in, nor even your email address. Just click and download the booklet you want.