Bachelor Cybersecurity specialist
Designed to train students in technical professions and promote their professional integration, our Bachelor's degree, which costs €8,000 excluding tax per year, is fully paid for by our partner companies. Validation of acquired experience (VAE) is possible for this training.

A learning concept 100% cybersecurity
Based on the desire to optimize your training course, we define together the training modules to be worked on during your year using a positioning report. You validate at your own pace during 3 exam sessions per year, the defined course modules.
Jobs matching
A personalized recruitment to allow you to find your alternation. After studying your profile and assessing your knowledge, we will put you in contact with our business network.
Employability
Our training has been designed by experts in cybersecurity and education to boost your employability.
Free to choose
Cybersecurity training that fits your needs. After a positioning assessment, you choose your specialty in order to adapt your training course to your needs and expectations.
Free of charge
Your tuition fees are 100% supported by your sponsor company. Your smile is all you need to join.
2 specialisations will be followed
Designed to train students in technical professions, our Bachelor Specialist in Cybersecurity program offers 2 specializations. We offer you an overview of the modules, the complete list can be found in our program brochures.
• Information Technology (IT)
Specialty to secure all the elements impacting IT management.
History of computing and cybersecurity
To acquire a good knowledge of technological developments and their impact on security
- Panorama of the evolution of technologies
- Internet History
- History of security
IT governance
To understand and master IT governance and its various components
- Leadership and Management
- Strategy and Roadmap
- Organizational models of IT services
- Information systems architecture
- Communication and crisis management
- Business continuity and recovery
- Performance and security management
- Purchasing and partner management
IT technical environments
To understand the IT technical environments to which cybersecurity applies
- Systems Engineering
- Networks
- Software development
- Private and public cloud
IT operations
To understand the operational management of an end-to-end IT service
- Assets, data and flows
- User support, Incidents
- System modifications/evolutions supervision
- Infrastructure and application life cycle
• Operational Technology (OT)
Protection of the industrial sector.
Industrial environments and systems
To acquire basic knowledge of industrial systems, the scope of the scope, its actors and the differences/convergences with the IT environment
- Perimeter of industrial systems
- Types of processes
- Types of technical components and assets
- Main equipment suppliers and service providers
- Differences between IT and OT scopes
- Impact of new technologies
- Actors in the industrial environment
- Maintenance
OT technical environments
To learn how an industrial information system works and discover the architectures, networks & protocols used, operating systems and programming languages implemented.
- Principles and standards of architecture
- Equipment vendors and typical architecture by domain
- Industrial networks
- Operating systems
- Remote access and control
- Programming
- New technologies
OT cybersecurity
To discover the threats and vulnerabilities specific to this environment and master the different principles, techniques and tools to secure industrial information systems
- Threats – actors, techniques…
- Vulnerabilities of industrial systems
- Industrial systems security assessment tools
- Security architecture
- Basic security principles
- Reinforcement/Connection/Monitoring of industrial systems
- Asset inventories
- Network Security
- Managing identities and privileged accounts
- Applying security and antivirus updates
- Detection of anomalies and threats on terminals
- Integrity check
- Backup
•
•
Common core curriculum
If you can shape your training courses to fit your needs, some modules remain mandatory for all students, in order to ensure consistency and continuity of education.
Cybersecurity strategy and governance
To understand the geopolitical issues and the threats, the organization and the actors in cybersecurity
- Geopolitics and economic intelligence
- Threat Management, Cybersecurity and
- Strategy/Governance of Organizations
- Audit of information systems and organizations,
- Old technology…
Compliance and cybersecurity
To understand the impacts of the regulatory framework on cybersecurity
Norms, standards and regulations applicable to the field of cybersecurity in France and internationally: defense and security, export control, health and personal data, banking and finance, etc.
Organizational cybersecurity
To master the key success factors of a cybersecurity organization
- Enterprise Architecture and Business Process
- Management
- Human resources and cyber skills
- Cybersecurity investments and budgets
- Purchasing/services/outsourcing and cyber contracts
- Managing cybersecurity performance…
Information systems and cybersecurity
To integrate cybersecurity from the design stage and throughout the life cycle of information systems
- Urbanization and security of information systems
- SecOps and DevSecOps
- Big Data and cybersecurity
- Quality management
- Conduct project
SOC governance
To understand the organization and mission of the SOC
- Organizational models of the SOC
- Management of skills and resources of the SOC
- Management of relations with governmental entities/Regulations
- Cyber crisis management and associated communication
- Incident response management
The technical environment of the SOC
To master the technical components of the SOC
- Configuration and management of the Security
- Information Event Management tool – SIEM
- Event Log Provisioning and Correlation
- Asset/data/flow management in a SOC
- Vulnerability management
Personal development and communication
To communicate and act effectively, professionally and responsibly
- Communication
- Technical and Business English
- Ethics and deontology in cybersecurity
Hybrid learning at the service of cybersecurity
Face-to-face
During these moments, our students experience their know-how in rooms dedicated to practice after the explanations of the expert. The expert is also present to answer students' questions during the hours dedicated to "pedagogical tutoring".
E-Learning
To support learning, hours of training are provided in e-learning. This mode allows our students to consolidate their practical learning according to their needs and at their own pace. Access to the platform is available at any time and even after graduation.
specializations
Information Technology (IT) - Operational Technology (OT) - Crisis and Incident Management - Risk and Compliance Governance
skills sets
Threat Detection and Management, Regulation, Application Security and many more to become an expert in a field.
units
Among which, we select in consultation with the student and the educational center those constituting the training course.
hours
Courses over the school year.
Apply for the Bachelor Cybersecurity specialist
For September 2022 and February 2023 intake, only our 3rd year opens its doors. We provide you with tools and create a place where you will enjoy living and following a demanding training. CSB.SCHOOL is committed to supporting all learners regardless of their situation. In order to benefit from the support system and specific arrangements, we invite you to bring an official document attesting to your disability or to take the necessary steps to obtain recognition of your disability. You have a Disability Referent in our school
Eligibility requirements
Our Specialist Bachelor in Cybersecurity specializing in “IT Cybersecurity” and “Industrial Cybersecurity – OT” is completed in 1 year. For this year of opening, our Bachelor is accessible to students in Bac+2 or with an equivalence.
The first 2 years will open later.
Prerequisite
To be eligible, you must have a Bac+2 as well as a general culture and/or knowledge of cybersecurity. A good level of English is required to be able, without effort, to follow the various courses/modules provided.
Examination for admission
An interview based on soft skills and a skills assessment are carried out.
Validation of acquired experience
Without a diploma, but with a great professional experience, consider the VAE.
The CSB.SCHOOL supports you in this process.
For more information please to contact us directly.
Apply
No need to go to the post office or to send us an email. Just click on the “Apply” icon and forward us your application file.


Consult our booklets
Our booklets are access-free. To consult them, we do not ask you for your motives, nor the training program you are interested in, nor even your email address. Just click and download the booklet you want.