Course 2 : Introduction to the CyberFundamentals Framework (CyFun) and ethical hacking
Webinar cycle - Strengthen the cybersecurity of your organization to counter cyberattacks : regulation and implementation
Immerse yourself in the heart of cybersecurity and compliance with the new NIS2 Directive through this comprehensive training series, delivered in three interactive webinars. Guided by seasoned experts, you will explore the fundamentals of digital security, compliance frameworks, and best practices, as well as hands-on technical implementation to ensure your organization’s resilience.
Why attend?
- Master current challenges and recent legislation: Discover the impact and obligations introduced by the NIS2 Directive (Directive (EU) 2022/2555) and learn how to effectively implement them.
- Operational approach: Familiarize yourself with the CyberFundamentals Framework (CyFun), inspired by international standards (NIST CSF, ISO/IEC 27001, CIS Controls, IEC 62443), and understand the conditions for applying ethical hacking.
- Immediate practical application: Through case studies, incident simulation exercises, and field-tested checklists, you will be ready to design and deploy concrete solutions while relying on reputable reference tools.
- Tailored to your context: Whether you are an SME, an essential entity, or a service provider, this series will guide you towards legal, technical, and organizational compliance.
- Ensure your entity’s resilience and reputation: Anticipate risks, reduce your attack surface, and protect your sensitive data to maintain the trust of your clients, partners, and regulatory authorities (e.g., the Centre for Cybersecurity Belgium – CCB).
What you will gain:
- A clear understanding of modern cybersecurity and the NIS2 Directive,
- A solid foundation for implementing the CyberFundamentals Framework (CyFun),
- Proven methods to plan, execute, and sustain a long-term security strategy,
- Practical guidance to achieve lasting compliance.
Join us and make cybersecurity a strategic asset!
Introduction to the CyberFundamentals (CyFun) Framework and ethical hacking
- Introduction
1.1. Course Objectives
o Learn the basics of the CyberFundamentals Framework.
o Discover the principles and methodology of ethical hacking.
1.2. Context
o Importance of a proactive approach to cybersecurity.
o The link between CyFun, NIS2 compliance, and cyberattack prevention.
- Presentation of the CyberFundamentals Framework
2.1. Overview
o Framework based on NIST CSF, ISO 27001, CIS Controls, IEC 62443.
o Objective: Strengthen the security of small entities.
2.2. “Small” Level
o Minimum measures: Regular backups - Access management - Software patching - Employee awareness.
2.3. Documentation and Available Tools
Use of Safeonweb@Work - Practical guides for small entities.
Example: Implementing backups and patching in a fictitious SME.
- Ethical hacking: Concepts and Methodologies
3.1. Definition and Objectives
Difference between ethical hacking and malicious hacking. The role of penetration tests in cybersecurity.
3.2. Methodologies
o Steps: reconnaissance, scanning, exploitation, reporting.
o International standards: OSSTMM, OWASP.
3.3. Common techniques
o Vulnerability testing (port scanning, network reconnaissance) - Simulated attacks (e.g., SQL injection).
Example: Demonstration of a simple vulnerability test on a dedicated test platform.
- Legal and ethical aspects of ethical hacking
4.1. Regulations
The need for prior authorization - Responsibilities of ethical hackers.
4.2. Penalties for unauthorized hacking
o Case studies: consequences of illegal hacking.
4.3. Integration into a Legal Framework
o Clauses in contracts with penetration testing providers.
- Conclusion and Q&A
Summary of key points covered & Interactive session for questions.
Orateurs
Date and time
Wednesday 19th March 2025
From 9am to noon.
Thursday 13th March : Course 1 : Introduction to cybersecurity and the NIS2 Directive
Wednesday 19th March : Course 2 : Introduction to the CyberFundamentals Framework (CyFun) and ethical hacking
Tuesday 25th March : Course 3 : Technical implementation and practical cases
Discover the whole cycle and the French one here
Location
Online
You will be able to follow the course live on the web. You will receive the connection details in advance by e-mail.
Please note! The e-mail address you use to register will be the address to which the link to the webinar will be sent. If you register via another person (secretary, colleague, etc.), that person will have to forward you the link in question so that you can connect and follow the training. Unfortunately, registrations that arrive less than one hour before the start of the webinar will not be taken into account.
Price
230 € INCL. VAT - Taking part in a course
594 € INCL. VAT - Taking part in three courses
Target audience
This program is offered to all professionals looking to enhance their skills in cybersecurity, legal compliance, and the protection of information systems and data to ensure the security of their organization. The program can also be equally beneficial for lawyers, notaries, bailiffs, corporate legal advisors, CISOs, DPOs, CISOs, and other professionals responsible for handling technical-legal issues related to data security and regulatory compliance, and who are concerned about safeguarding their organization against cyberattacks.
Ongoing training
If you would like accreditation, please send an e-mail to formations@larcier-intersentia.be
Accreditation was granted by the IJE (3 points).
This webinar is eligible for a Liberform bonus if you meet the conditions.
Further information
Larcier-Intersentia
formations@larcier-intersentia.com
Freephone numbers: 0800 39 067 (from Belgium) - 800 24 227 (from France)
+32 (0) 2 548 07 13 (from all other countries)
Register now!
Unfortunately, registrations received less than one hour before the start of the webinar will not be taken into account.