Cybersecurity Training Center

Recognized expertise in cyber security training

For over 15 years, Orange Cyberdefense has been delivering training to information system security professionals (IS). Always up-to-date, they are committed to keeping abreast of rapid changes in the risks and threats facing organizations.


Our catalogue dedicated to security and business continuity is one of the most complete on the market. It represents all our expertise put at the service of our clients in our daily missions. The training modules offered and their formats are adapted to the learners, trades and organisations to which they are addressed: general training, demonstrations, practical work.

Orange Cyberdefense is a partner of the Cyber ​​Pole of Excellence, a member of the Training Group and a privileged partner of the Cyberdefense work-study program at ENSIBS (Ecole Nationale Superieure d’Ingénieurs de Bretagne Sud).


Orange Cyberdefense, Supélec and Télécom-Bretagne are at the origin of a continuous training course in the field of Information Systems Security. This course is partly based on the programme created for the SSI Master’s but also includes modules more oriented towards the immediate concerns of companies.


The Orange Cyberdefense Cybersecurity Training Center is a VeriSelect Professional Training certified training organization by Bureau Veritas.


This certification meets the quality requirements in Decree No. 2015-790 of June 30th, 2015. It allows our clients to have their training activities financed by their Joint Collector Organization Approved by the State (OPCA) in charge of mutualizing and redistributing corporate financing funds for vocational training.


Apply for training at the Cybersecurity Training Center

Les données sont cryptolockées

Our training offers

Our training courses are aimed at all company profiles. Our methods are tested by our security consultants

Training in this field focuses on the IT security organization and management skills of organizations. They are based on the ISO 2700X family of standards.

Ethical Hacking training reflects the latest standard attack techniques. It is only TP oriented and practical cases to allow participants to practice throughout the training.

80% of attacks are performed on the application layer. As network and systems teams become more skilled, hackers are turning to the most vulnerable resources.

The security of developments and applications becomes a major issue in IS security because a flaw on a website can lead to complete IS corruption. It is therefore essential to train developers and project managers on this subject.

This course is dedicated to training courses dealing with cybercrime. The trainers are members of the CERT OCD, Europe’s first private CERT.


The Risk Management department is dedicated to IT and operational risk analysis training. It complements the WSIS mechanisms. These training courses are based on two reference standards: ISO 27005 and ISO 31000.
This course includes all safety training with technical connotation. They are intended for all IT professionals who wish to strengthen the systems they administer on a daily basis.

Given the operating and safety constraints, industrial information systems nevertheless remain managed by automation engineers who are more aware of operational safety than cybersecurity.

Our training courses enable automation engineers to identify the risks and to understand the process required to guarantee an acceptable level of safety without isolating industrial systems.

The Business Continuity Plan (BCP) focuses on all aspects of major claims handling, be they IT or business. This ranges from crisis management to maintenance and testing of PRA and PCA devices.

LSTI is a private certification body specialized in the field of information security, able to deliver ISO 2700X certifications to individuals and legal entities.

Our tailor-made training program

Our catalogue training can be given in-company, only with employees of your company, on your premises.

  • To identify your educational objectives
  • To define your training needs
  • To design a suitable training programme
  • In every dimension of your security
  • We offer modules adapted to your organisational model, from the definition of the security strategy to its implementation and operational management
  • Specific IS security training needs not found in our catalogue, we can design training specific to your context
  • Practical work and exercises that can be adapted to your environment and custom designed

6 good reasons to choose the cybersecurity training center

  • Trainers connected to the business realities of Information Security
  • Courses based on concrete cases. Operational content with experience feedback
  • Training, technical, organizational, and certifying
  • Short modules from 1 to 5 days, adapted to the pace of the company
  • More than 50 IT security expert trainers
  • Flexible, personalised, tailor-made intra-company training courses