Master Cybersecurity manager
This 2-year program allows you to master the fundamental skills required for the role of cybersecurity manager and promote your professional integration. Its cost of €15,000 net of tax per year is fully covered by our partner companies. CSB.SCHOOL is authorized to train and organize the assessment of the Level 7 Professional Title Expert in the development of cybersecurity solutions RNCP number 38463 under the authority of AN21.
A learning concept 100% cybersecruity
Based on the desire to make you operational in your future job, all the modules are composed of practical cases allowing you to practice in real working conditions. Our training has been designed by experts in cybersecurity and education to boost your employability.
No rating
Effective work is collaborative work rather than a race for first place. Here, there are no grades, the modules are or are not validated and cannot be compensated by obtaining an average.
Alternation
Support is offered for the search for work-study. The training costs amounting to €15,000 net of tax are fully covered by your future employer. The hourly volume amounts to 490 hours.
Certification
For any request regarding passing certifications, you can contact Guillaume Delorme, Educational Manager of the establishment by email guillaume.delorme@csb.school
Accessibility
Your tuition fees are 100% supported by your sponsor company. Your smile is all you need to join.
The program first year
The Cybersecurity Manager program offers comprehensive training in the fundamentals of IT security, risk management, and information systems protection. Students acquire advanced technical skills while preparing for a recognized certification. This certification validates your knowledge and strengthens your employability in the field.
• Ensure the operation and maintenance of cybersecurity solutions developed
-
SMSI & ISO 27001 – Design and Management
-
Management of IT Infrastructures
-
PKI – Key Management Infrastructure
-
Computer Hardware Management
-
SOC Architecture
Definition of cybersecurity measures
Assess the criticality of sites and associated industrial infrastructures
define the technical cybersecurity requirements specific to the industrial perimeter,
oversee the implementation of cybersecurity solutions in the industrial environment.
IT cybersecurity innovation
To find out about the latest technological innovations in IT cybersecurity
- Blockchain, cloud/edge/on-prem infrastructure
- Virtual/augmented reality
- Quantum Computing
• Building cybersecurity solutions using emerging technologies
- Pentest 11: Bruteforce and configuration faults
- Pentest 12: Metasploit: basic use and pivot in protected area
- Pentest 13: Passive & active reconnaissance / network listening and poisoning / attacks and use of hashes (cracking, relay, pass-the-hash)
- Pentest 14: PingCastle and Bloodhound analyzes / Quick wins Windows – Low hanging fruits
- Pentest 15: Basic physical attacks on a PC (or VM) / Internal network attacks in blackbox and greybox
- Pentest 16: ADCS attacks / Potato / Trust abuse
- Pentest 17: Analysis of an Android application (static analyses and local attacks)
- Password Management
Management of the security operations center
Define cyber event detection services and processes, in accordance with business functions and security policies, in order to determine the operational model of the SOC,
oversee the design and improvement of cyber event management scenarios.
OT cybersecurity
To discover the threats and vulnerabilities specific to this environment and master the different principles, techniques and tools to secure industrial information systems
- Threats – actors, techniques…
- Vulnerabilities of industrial systems
- Industrial systems security assessment tools
- Security architecture
- Basic security principles
- Reinforcement/Connection/Monitoring of industrial systems
- Asset inventories
- Network Security
- Managing identities and privileged accounts
- Applying security and antivirus updates
- Detection of anomalies and threats on terminals
- Integrity check
- Backup
OT governance
To discover all the themes that make up the cyber governance of an organization
- Leadership and Management
- Strategy and Roadmap
- Organization models
- Information systems security management system
- Communication
- Performance and security management
- Risk and threat analysis
- Training and awareness
- Cyber insurance
- Purchasing and partner management
- Cyber OT Program Management
OT Operations Security
To identify/implement the key points of success to secure operations on the industrial perimeter.
- Cyber OT organizations and operating models
- Training and awareness
- Cyber OT performance management
- Integration of industrial cybersecurity in projects
- Maintenance
Audit and control
Audit and control industrial cybersecurity
- Local assessment/self-assessment
- Architecture security review
- Vulnerability assessment
- Penetration testing
- OT security tools
OT Compliance and Cybersecurity
To understand the impacts of the regulatory framework on industrial cybersecurity
Norms, standards and regulations applicable to the field of industrial cybersecurity in France and internationally
Cybersecurity incident management
To learn the key factors for successful management of industrial cybersecurity incidents
- Security incident response plan
- Disaster recovery plan…
OT cybersecurity innovation
To learn about the latest technological innovations in OT cybersecurity
- Internet of Things – IoT
- Industrial Internet of Things – IIoT
- 5G
- Cloud, …
The program second year
The second-year program focuses on deepening technical and strategic skills. Students work on real-world projects and prepare for specialized certification. This final year prepares you directly to enter the workforce, as skilled professionals capable of meeting the critical cybersecurity needs of businesses.
Ensure the operation and maintenance of developed cybersecurity solutions
- Security Insurance Plan
- Cyber Insurance
- Business Continuity Plan and Business Recovery Plan
- Design of a Security Incident Response Plan (SIR)
Building cybersecurity solutions using emerging technologies
- Blockchain Security
- Design of a Security Incident Response Plan (SIR)
- Security Insurance Plan
- Cyber Insurance
- Pentest 18: Recovery of vulnerable firmware and analysis of a CVE
- Pentest 19: Operating a website with cloud bounce, basic cloud pentest
- Pentest 20: Creation of booby-trapped USB keys (classic USB with fake doc and payload and “bad USB” device that executes a script)
- Pentest 21: Phishing mail – without using ready-made tools
- Pentest 22: Basic Stack/Heap overflow and Format String attacks and protections
- Pentest 23: Kubernetes Challenge
- Pentest 24: Introduction to bug bounty and application of acquired knowledge on real perimeters
Integrating cybersecurity solutions into the information system
- CERT Report Analysis
Wallix “PROFESSIONAL PAM BASTION” certification. The Wallix “Professional PAM Bastion” certification attests to advanced skills in the implementation and management of the Wallix Bastion privileged access management (PAM) solution. It validates mastery of securing access to critical systems and managing administrator rights. This certification is essential to ensure the compliance and security of IT infrastructures in organizations.
Implement a cybersecurity strategy in a solution development process
- Securing an industrial project
- Drafting of Information Systems Security Policy
- Architecture 0 Trust
Implement the organizational and human resources necessary to improve the organization's cybersecurity posture
Design of an operational and organizational cybersecurity model
- conduct an organizational diagnosis,
- federate the organization’s stakeholders around the achievement of a defined level of cybersecurity maturity.
Raising employee awareness of good cybersecurity practices
- assess the level of maturity of staff in cybersecurity,
- conduct awareness-raising actions with privileged access users.
Security and compliance audit of information systems
- coordinate technical security audits,
- conduct a compliance audit.
Ensure the operation and maintenance of developed cybersecurity solutions
- Business Continuity Plan and Business Recovery Plan
- Design of a Security Incident Response Plan (SIR)
- Security Insurance Plan
- Cyber Insurance
- CLOUD 5A
Lead and supervise a team on a daily basis and in project mode
SOC Level 3 – Administration of a SOC
Other modules
- Vendor Management
- Regulations for the protection of personal data in cybersecurity GDPR
- Forensics
- Privacy in the world
- Health Data Cybersecurity Regulations: HDS, HIPAA
- Evidence Management in Cybersecurity – Forensic
- English
CISSP Preparation: The Certified Information Systems Security Professional (CISSP) certification is a global benchmark that attests to advanced expertise in information systems security. It covers eight key areas, including risk management, cryptography and network security.
Certification
Preparation and passing of ISO 27001 Implementer certification.
The ISO 27001 Implementer certification prepares professionals to design, implement, and maintain an Information Security Management System (ISMS) that complies with the ISO 27001 standard. The training covers key steps, such as risk analysis, implementing security policies, and evaluating control measures. Candidates learn to adapt these processes to the specific needs of their organization. Passing the certification validates their ability to manage and audit an ISMS, thus ensuring compliance and the protection of sensitive data.
Hybrid learning at the service of cybersecurity
Face-to-face
During these times, our students experiment with their know-how in rooms dedicated to practice after the speaker's explanations. The speaker is also present to answer students' questions during the hours dedicated to "educational tutoring".
E-Learning
To support learning, training hours are provided in e-learning on our Workinlive platform. This mode allows our students to consolidate their practical learning according to their needs and at their own pace. Access to the platform is available at any time
Access to the Master Cybersecurity manager
CSB.SCHOOL is committed to supporting all learners regardless of their situation. In order to benefit from the support system and specific arrangements, we invite you to bring an official document attesting to your disability situation or to take the necessary steps to obtain recognition of your disability. You have a Disability Referent within our school
Training sanction
The Cybersecurity Manager course prepares for the level 7 professional certification Expert in the development of cybersecurity solutions RNCP38463 under the authority of AN21
Prerequisites
The certification is aimed at candidates holding a level 6 in the field of IT, engineering sciences and/or who provide proof of at least three years of professional experience in the field of the targeted certification.
By way of exception, applications may be considered admissible if they do not meet the formal criteria above but appear exceptional in light of the file. These exceptions are intended in particular to authorize the admission of people who have worked for several years in positions related to high-level IT activities and whose employer is proposing a change of activity, and/or people undergoing professional retraining, or validation of acquired experience.
Candidates submitting a file that meets the criteria set out above will be invited for an interview, in person or remotely depending on the situation, by the Educational Manager. The purpose of the individual interview is to understand the candidate’s motivation and validate the interest of the certification in their professional project. It completes the application file and validates the candidate’s objectives.
Selection process
-
- An online form to describe your academic and professional background as well as your motivations for working in the field of cybersecurity.
- An interview will be conducted with a cybersecurity expert and an admissions officer.
- If your application is accepted, a behavioral skills test will be sent to you to identify your professional strengths and help us better support you in your company placement.
We will respond to you within 48 hours maximum and will then arrange an interview to suit your schedule.
Validation of acquired experience
Without a diploma, but with a great professional experience, consider the VAE.
The CSB.SCHOOL supports you in this process.
Please contact us for more information.
Apply
No need to go to the post office or to send us an email. Just click on the “Apply” icon and forward us your application file.
Consult our booklets
Our booklets are access-free. To consult them, we do not ask you for your motives, nor the training program you are interested in, nor even your email address. Just click and download the booklet you want.