Cybersecurity: 5 tips for choosing the right training

Are you passionate about cybersecurity, which is a field that is currently recruiting many talents? Do you want to acquire the technical and soft skills expected by companies to pursue a career in this field, but you don’t know how to choose the right training? We interviewed Marc Benattar, director of the cybersecurity sector at the PMN School (Passerelle des Métiers du Numérique), and former manager of a consulting firm specializing in information systems security, who gives us his advice to guide you in your approach.

1. Understand the issues and know the cybersecurity professions

Cybersecurity is a discipline that is ” integrated within information systems security ,” Marc Benattar is keen to point out. It brings together a wide variety of varied and enriching professions for those who practice them. In its Panorama of cybersecurity professions published in 2020, the National Agency for Information Systems Security (ANSSI) identifies more than twenty professions around the management and steering of security projects, the design and maintenance of a secure IS, the management of security incidents and crises, or even advice, services and research in this area.

We do not train for one but hong kong whatsapp number data for all cybersecurity professions. We are here to open horizons. Even if our students will start their career in a certain function, we help them build their skills to have the ability to evolve, to broaden the scope of possibilities and to continue, in the long term, a little further in mastering the security of information systems.

whatsapp data

While the sector is currently dynamic and very promising, with many organizations looking for candidates to support them on these crucial issues, as well as attractive salaries to boot, it requires a good understanding of what IT security is all about. This will allow you to have a 360° vision of all the challenges of cybersecurity and the professions that make it up.

I insist a lot with my students by e

xplaining to them that it is essential to understand what we are talking about, what a risk is, how to identify it, how to assess its criticality, and what are the countermeasures to put in here are the rules you need to remember place to protect an information system. It is because we know the information system from A to Z that we are able to by lists measure the risks that weigh on it and to make recommendations to limit them, underlines the director of the cybersecurity sector.

Scroll to Top