thumbnail image
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • TRAINING

    The most effective way to ensure success is through consistent training and effort.

    GET STARTED
  • Cyber Resilience Act

    This training will provide an in-depth review of the Cyber Resilience Act, a law that sets out the requirements for individuals and organizations to protect their data and systems from cyber threats. The training will cover the types of threats, how to assess and manage risk, and how to respond to an incident. It will also cover best practices for implementing cyber resilience measures, such as encrypting data, monitoring systems, and patching software.

  • Why Attend ?

    Participants will gain an understanding of the legal and technical aspects of the law and will be able to implement these measures in their own organizations.

     

    Download the Brochure
  • Sign Up

    We'll get in touch with you soon.

    Submit
  • Training Methods

    Red Alert Labs training services portfolio, delivered by specialized security experts, provides comprehensive and flexible security training when you need it and how you need it

    On-premise Training

    Get comprehensive and focused in-person training from experienced instructors, and connect with other security professionals.

    • Courses are held on our site or at your location
    • Full immersive
    • Instructor-led
    • Tailor-made
    • Hands-on exercises for deeper learning through use case scenarios
    • Knowledge test

    Online Training

    Gain knowledge at your desk:

    • Online training on demand
    • Instructor-led
    • Tailor-made online modules
    • Hands-on exercises for deeper learning through use case scenarios
    • Knowledge test
  • Do you have additional questions ?

    Contact us...

    3 Rue Parmentier, 94140 Alfortville, Paris Area - FRANCE
    Red Alert Labs S.A.S.U
    827 677 303 R.C.S. Créteil
    +33 9 51 79 07 87
    +33 9 51 79 07 87
    contact@redalertlabs.com
    Get started

© 2023 Red Alert Labs. All rights reserved.

Terms & Conditions
Privacy Policy
    Appelez
    Retrouvez
    Contact
Cookie Use
We use cookies to ensure a smooth browsing experience. By continuing we assume you accept the use of cookies.
Learn More