[fusion_builder_container background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”0px” padding_bottom=”95px” padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”3_5″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”right bottom” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_text]
SICUREZZA INFORMATICA
[/fusion_text][fusion_separator style_type=”single solid” top_margin=”0″ bottom_margin=”20″ sep_color=”#cbaa5c” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”50px” alignment=”left” class=”” id=””/][fusion_text]
Obiettivo
- Illustrare come si è evoluto il cybercrime: l’hacker è stato sostituito da vere e proprie organizzazioni criminali dotate di grandi mezzi ed in grado di portare attacchi a chiunque. Non è un problema di sapere “se verremo attaccati” ma solo “quando saremo attaccati”
- Spiegare l’importanza del il fattore “H”: il punto debole è sempre l’essere umano
- Fare un uso sicuro delle password, che sono una delle principali cause (63%) della violazione dei nostri dati.
- Illustrare i sistemi più avanzati per proteggere i dati aziendali: dall’analisi comportamentale alle verifiche periodiche di sicurezza
- Fornire strumenti e strategie per la sicurezza informatica in azienda e nella pratica di ogni giorno
Programma
- Evoluzione del crimine informatico nell’Italia e nel mondo: le tecniche di cyber attacco più diffuse
- Il Phishing, i Ransomware ed il Social Engineering: come ci attaccano e come proteggersi
- Le regole per una Password sicura e gli errori da evitare. I Password Manager e l’autenticazione a due fattori
- Mettere in pratica la Cyber Security: la ISO/IEC 27001, i sistemi di protezione avanzata (User Behavior Analytics) e la Backup Strategy
- La Sicurezza Informatica come “Gioco di squadra”
[/fusion_text][/fusion_builder_column][fusion_builder_column type=”2_5″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#f4f6f8″ background_image=”” background_repeat=”no-repeat” background_position=”right bottom” hover_type=”none” link=”” border_position=”all” border_size=”1px” border_color=”#ebeef1″ border_style=”solid” padding=”45px” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”up” animation_speed=”1″ animation_offset=”” class=”” id=””][fusion_text]
TI INTERESSA IL CORSO?
Contattaci
[/fusion_text][fusion_separator style_type=”single solid” top_margin=”0″ bottom_margin=”30″ sep_color=”#cbaa5c” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_text]Chiamaci allo 02.67739025 o compila il seguente modulo:[/fusion_text][fusion_text][contact-form-7 id=”1860″ title=”form singolo corso”][/fusion_text][fusion_separator style_type=”none” top_margin=”-20″ bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#404242″ background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”center top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”0px” padding_bottom=”80px” padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”hidethis” id=””][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_separator style_type=”none” top_margin=”25″ bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”” class=”” id=””/][fusion_text]
SICUREZZA INFORMATICA
Contenuti del corso
[/fusion_text][fusion_separator style_type=”single solid” top_margin=”0″ bottom_margin=”60″ sep_color=”#cbaa5c” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”50px” alignment=”” class=”” id=””/][/fusion_builder_column][fusion_builder_column type=”1_4″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”0 0 0 40px” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_checklist icon=”fa-check-circle-o” iconcolor=”#cbaa5c” circle=”no” circlecolor=”” size=”14px” class=”” id=””][fusion_li_item icon=””]Contenuto 1[/fusion_li_item][fusion_li_item icon=””]Contenuto 2[/fusion_li_item][fusion_li_item icon=””]Contenuto 3[/fusion_li_item][/fusion_checklist][/fusion_builder_column][fusion_builder_column type=”1_4″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_checklist icon=”fa-check-circle-o” iconcolor=”#cbaa5c” circle=”no” circlecolor=”” size=”14px” class=”” id=””][fusion_li_item icon=””]Contenuto 4[/fusion_li_item][fusion_li_item icon=””]Contenuto 5[/fusion_li_item][fusion_li_item icon=””]Contenuto 6[/fusion_li_item][/fusion_checklist][/fusion_builder_column][fusion_builder_column type=”1_4″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_checklist icon=”fa-check-circle-o” iconcolor=”#cbaa5c” circle=”no” circlecolor=”” size=”14px” class=”” id=””][fusion_li_item icon=””]Contenuto 7[/fusion_li_item][fusion_li_item icon=””]Contenuto 8[/fusion_li_item][fusion_li_item icon=””]Contenuto 9[/fusion_li_item][/fusion_checklist][/fusion_builder_column][fusion_builder_column type=”1_4″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_checklist icon=”fa-check-circle-o” iconcolor=”#cbaa5c” circle=”no” circlecolor=”” size=”14px” class=”” id=””][fusion_li_item icon=””]Contenuto 10[/fusion_li_item][fusion_li_item icon=””]Contenuto 11[/fusion_li_item][fusion_li_item icon=””]Contenuto 12[/fusion_li_item][/fusion_checklist][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”yes” overflow=”visible” margin_top=”55px” margin_bottom=”” background_color=”rgba(255,255,255,0)”][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][fusion_separator style_type=”none” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]