Win 1 year's access to Information Security E-Learning at our 50th Cyberzone(register)
FeelAgile Learning white logo

SecNumCloud training

SecNumCloud training: master the requirements, ensure your compliance

FeelAgile Learning offers training courses for you or your teams, designed by our cybersecurity project managers. E-learning or with a trainer, choose the format that suits you.

FeelAgile training courses are Qualiopi certified.

FeelAgile trainers
SecNumCloud

SecNumCloud training: all the details

This program trains IaaS, SaaS and PaaS players in cybersecurity, based on ANSSI's SecNumCloud practices and guidelines. It aims to provide an understanding of ANSSI's cybersecurity objectives, as well as knowledge of European and French security programs in the context of France's cybersecurity policies.

Understand the fundamentals of ANSSI qualification and security approvals
How to implement a system that complies with ANSSI's SecNumCloud standard
Training in cybersecurity codes of practice and the deployment of security measures

Duration: 35 days (245 hours)
Price: On request

Target audience
01
How to register
02
Teaching methods and resources
03
Teaching team
04
Evaluation of results
05
Accessibility
06
Training program

UNDERSTANDING THE FUNDAMENTALS OF ANSSI CERTIFICATION, QUALIFICATION AND SECURITY VISAS

  • Provision of SaaS, PaaS and IaaS services and responsibilities by service
  • Qualification of service providers (terms and scope)
  • Understanding safety levels

DEVELOPING AND MANAGING CERTIFICATION AND CONTROL PROJECTS - SECURITY GOVERNANCE

  • Diagnose organization and requirements
  • Diagnose the level of security implementation in line with the Code of Best Practice
  • Define the scope of application / perimeter of certification
  • Drawing up an ISSP (Information System Security Policy) and corporate information protection policy
  • Definition of roles and responsibilities - organization
  • Manage & prepare risk analysis
  • Information security policy
  • Human Resources Security

TRAINING AND AWARENESS-RAISING

  • Safety training
  • Building a safety awareness program
  • Tools and methods
  • Regulations, recruitment and safety

SMSI MANAGEMENT, KPI

  • Measuring and defining safety dimensions
  • Safety management and management review
  • Performance assessment
  • Audit and control program management

SETTING UP ADVANCED SECURITY PROCESSES

  • Implementation of security incident management
  • Building a continuity plan
  • Safety risk management

PROJECT MANAGEMENT AND CORPORATE INTEGRATION

  • How to set up an integrated management system
  • Involving managers and employees
  • Integrating behavioral aspects
  • Identify project risks and formalize alerts

ASSET, ACCESS AND INFORMATION MANAGEMENT

  • Process and policy
  • Methods and tools
  • Access controls (policies and processes)

CRYPTOLOGY

  • Encryption of stored data
  • Stream encryption
  • Password hashing
  • Non-repudiation
  • Secret management

PHYSICAL AND ENVIRONMENTAL SAFETY

  • Physical security perimeters
  • Physical access control
  • Protection against external and environmental threats
  • Working in private and sensitive areas
  • Delivery and loading zones
  • Equipment maintenance

OPERATING SAFETY

  • Change management
  • Measures against malicious code
  • Saving information
  • Event logging
  • Protection of logged information
  • Vulnerability management

COMMUNICATIONS SECURITY

  • Information system mapping
  • Network partitioning
  • Network monitoring

ACQUISITION, DEVELOPMENT AND MAINTENANCE OF INFORMATION SYSTEMS

  • Secure development policy
  • System change control procedures
  • Technical review of applications following changes to the operating platform
  • Outsourced development
  • Safety testing and system compliance
  • Test data protection

RELATIONS WITH THIRD PARTIES

  • Identifying third parties
  • Security in agreements with third parties
  • Monitoring and review of third-party services

INFORMATION SECURITY INCIDENT MANAGEMENT

  • Responsibilities and procedures
  • Information security reports
  • Information security event assessment and decision-making
  • Response to information security incidents
  • Learning from information security incidents
  • Evidence gathering

BUSINESS CONTINUITY

  • Business continuity organization
  • Implementing business continuity
  • Check, review and assess business continuity
  • Availability of information processing resources

COMPLIANCE

  • Identification of applicable legislation and contractual requirements
  • Independent review of information security
  • Compliance with safety policies and standards
  • Examination of technical compliance

The benefits of this course

Comprehensive teaching approach
Our training program combines theoretical input, analysis of concrete cases, and the provision of methods and models.
Experienced teaching approach
Our trainers are specialized in cybersecurity and have mastered the ANSSI SecNumCloud reference framework, ensuring accurate transmission of knowledge.
A pragmatic approach to the standard
Our training courses are characterized by a pragmatic approach to the SecNumCloud standard, focusing on the practical application of the requirements within your company.
In a nutshell:

This program provides cybersecurity training for IaaS, SaaS and PaaS players, based on ANSSI's SecNumCloud practices and guidelines.

Duration: 35 days (245 hours)
Price: On request

Training program
Sign up

For more information on training, our experts are at your disposal.

Contact an consultant

Frequently asked questions

Everything you need to know about SecNumCloud training can be found here.

Still have questions? Get in touch with our experts.

Contact us
How will this training really help me with my SecNumCloud project?
Does the training provide skills that can be applied immediately in the workplace?

Register now

- Qualiopi certified training
- For you or your teams

For more information, please contact us.

qualiopi certified logo