A learning concept 100% cybersecruity
Based on the desire to make you operational in your future job, all the modules are composed of practical cases allowing you to practice in real working conditions. Our training has been designed by experts in cybersecurity and education to boost your employability.
A personalized recruitment to allow you to find your alternation. After studying your profile and assessing your knowledge, we will put you in contact with our business network.
Our training has been designed by experts in cybersecurity and education to boost your employability.
Free to choose
Cybersecurity training that fits your needs. After a positioning assessment, you choose your specialty in order to adapt your training course to your needs and expectations.
Free of charge
Your tuition fees are 100% supported by your sponsor company. Your smile is all you need to join.
The choice between to choose from
Designed for students wishing to eventually supervise multidisciplinary teams, this 2-year program allows you to master the basic skills necessary for your position. Our Responsible Master in Cybersecurity program offers 3 specializations. We offer you an overview of the modules, the complete list can be found in our program brochures.
• Industrial Cybersecurity
Design and maintain the cybersecurity of an industrial environment based on the objectives and risks of the organization.
Definition of cybersecurity measures
Assess the criticality of sites and associated industrial infrastructures
define the technical cybersecurity requirements specific to the industrial perimeter,
oversee the implementation of cybersecurity solutions in the industrial environment.
• Operational Security
Design and implement means of detecting cybersecurity events that could lead to an incident (security operations center)
Management of the security operations center
Define cyber event detection services and processes, in accordance with business functions and security policies, in order to determine the operational model of the SOC,
oversee the design and improvement of cyber event management scenarios.
• Risk Management and Compliance
Guarantee the adequacy between compliance requirements (regulatory and normative) and cybersecurity measures
Management of the impacts of compliance requirements on cybersecurity management
Define the legal corpus applicable to the organization, in collaboration with the business and support functions,
conduct a compliance diagnosis, (interview, documentary review, applicable regulatory requirements, etc.) measuring the organization’s deviation from the applicable regulatory and normative requirements,
monitor the evolution of regulatory and normative requirements having an impact on the management of data and information systems.
The common trunk curriculum
If you can shape your course in your image, certain modules remain compulsory for all students, in order to ensure consistency and educational continuity.
Cybersecurity strategy and governance
Assess the organization’s cybersecurity risk exposure
Identification and analysis of threats and vulnerabilities impacting the organization
- assess the vulnerabilities of the organization’s assets,
- analyze cyber risks,
- identify critical supply chain activities.
Design and implement an information security management system (ISMS)
- Discover the assets of the organization using questionnaires and passive or active scanning solutions,
- Determine the necessary and legitimate profiles and roles of identities.
Development of security measures that constitute the information security management system (ISMS)
- determine the expected levels of cybersecurity and the associated measures,
- define access control rules,
- determine the data protection measures,
- analyze the documentary corpus.
Respond to a cybersecurity incident
Design and deployment of the Security Incident Response Plan (PRIS)
- determine the human, material and functional needs of the organization to deal with a cyber incident,
- develop the incident response communication plan in collaboration with internal teams,
- conduct different types of cyber incident simulation exercises (walkthrough, table-top, functional, full-scale),
- analyze the root cause analysis of a cybersecurity incident.
Ensuring organizational resilience during a cybersecurity incident
Design of Business Continuity and Recovery Plans (PCA/PRA)
- determine the maximum allowable interruption time,
- determine the essential and critical activities of the organization.
Communication and deployment of Business Continuity and Recovery Plans (PCA/PRA)
- communicate the schedule and progress of the business resumption plan,
- assess the effectiveness of Business Continuity and Resumption Plans (PCA/PRA).
Implement the organizational and human resources necessary to improve the organization's cybersecurity posture
Design of an operational and organizational cybersecurity model
- conduct an organizational diagnosis,
- federate the organization’s stakeholders around the achievement of a defined level of cybersecurity maturity.
Raising employee awareness of good cybersecurity practices
- assess the level of maturity of staff in cybersecurity,
- conduct awareness-raising actions with privileged access users.
Security and compliance audit of information systems
- coordinate technical security audits,
- conduct a compliance audit.
Hybrid learning at the service of cybersecurity
During these moments, our students experience their know-how in rooms dedicated to practice after the explanations of the expert. The expert is also present to answer students' questions during the hours dedicated to "pedagogical tutoring".
To support learning, hours of training are provided in e-learning. This mode allows our students to consolidate their practical learning according to their needs and at their own pace. Access to the platform is available at any time and even after graduation.
Information Technology (IT) - Operational Technology (OT) - Crisis and Incident Management - Risk and Compliance Governance
Threat Detection and Management, Regulation, Application Security and many more to become an expert in a field.
Among which, we select in consultation with the student and the educational center those constituting the training course.
Courses over the school year.
Access to the Master Cybersecurity manager
CSB.SCHOOL is committed to supporting all learners regardless of their situation. In order to benefit from the support system and specific arrangements, we invite you to bring an official document attesting to your disability or to take the necessary steps to obtain recognition of your disability. You have a Disability Referent in our school
The Cybersecurity Manager Master has 3 specializations “Industrial Cybersecurity – OT” and “Crisis and Incident Management – SOC” and “Governance, Risks and Compliance – GRC”
The Masters is accessible to anyone with basic skills in IT or cybersecurity.
For people without significant experience in the field, it is recommended to have a professional certification or a level 6 diploma in computer science or cybersecurity.
To be eligible, you must demonstrate as well as a general culture and/or knowledge of cybersecurity/computer science. A good level of English and french is required to be able, without effort, to follow the various courses/modules provided.
Examination for admission
For the selection of applications, we rely on various criteria such as your vision of cybersecurity, your professional projection, your interpersonal skills and your level of English and french.
An interview based on soft skills, an interview and a skills assessment are to be carried out.
Validation of acquired experience
Without a diploma, but with a great professional experience, consider the VAE.
The CSB.SCHOOL supports you in this process.
Please contact us for more information.
No need to go to the post office or to send us an email. Just click on the “Apply” icon and forward us your application file.
Consult our booklets
Our booklets are access-free. To consult them, we do not ask you for your motives, nor the training program you are interested in, nor even your email address. Just click and download the booklet you want.