Company Details
ifptraining
177
21,446
6115
ifptraining.com
0
IFP_2548597
In-progress

IFP Training Company CyberSecurity Posture
ifptraining.comIFP Training is a professional training expert that helps the energy, mobility and environment sectors to reinvent themselves by developing their people’s skills. Created nearly 50 years ago by IFP Energies nouvelles and IFP School, it contributes to enhancing the human capital of companies and ensuring the safety of their operations. Our 300 lecturers and consultants coming from the industry combine technical expertise and educational know-how to train more than 10,000 participants from around the world each year.
Company Details
ifptraining
177
21,446
6115
ifptraining.com
0
IFP_2548597
In-progress
Between 750 and 799

IFP Training Global Score (TPRM)XXXX



No incidents recorded for IFP Training in 2025.
No incidents recorded for IFP Training in 2025.
No incidents recorded for IFP Training in 2025.
IFP Training cyber incidents detection timeline including parent company and subsidiaries

IFP Training is a professional training expert that helps the energy, mobility and environment sectors to reinvent themselves by developing their people’s skills. Created nearly 50 years ago by IFP Energies nouvelles and IFP School, it contributes to enhancing the human capital of companies and ensuring the safety of their operations. Our 300 lecturers and consultants coming from the industry combine technical expertise and educational know-how to train more than 10,000 participants from around the world each year.


King’s College London is amongst the top 40 universities in the world and top 10 in Europe (THE World University Rankings 2024), and one of England’s oldest and most prestigious universities. With an outstanding reputation for world-class teaching and cutting-edge research, King’s maintained its si

UCL (University College London) is London's leading multidisciplinary university, ranked 9th in the QS World University Rankings. Established in 1826 UCL opened up education in England for the first time to students of any race, class or religion and was also the first university to welcome female

Imagine what you could do at a world-leading university that is globally recognised for its teaching, research and innovation. The University of Edinburgh has been providing students with world-class teaching for more than 425 years, unlocking the potential of some of the world's leading thinkers

Delft University of Technology (TU Delft) is a leading technical university in the Netherlands, known for our world-class engineering, science and design education. We offer top-ranked education and PhD programmes, and we conduct cutting-edge research that addresses global challenges. TU Delft play

Consistently rated in the top 10 universities in the world, Imperial College London is the only university in the UK to focus exclusively on science, medicine, engineering and business. At Imperial we bring together people, disciplines, industries and sectors to further our understanding of the n

The University of Cambridge is one of the world's foremost research universities. The University is made up of 31 Colleges and over 150 departments, faculties, schools and other institutions. Its mission is 'to contribute to society through the pursuit of education, learning, and research at the hi
.png)
Proven AI-powered digital experience platform—Xvantage—enables Proofpoint and channel partners to realize greater efficiencies and deliver...
System integrator ACS shows how to cope with future, in-your-face cyber-intrusions and -attacks.
A novel way of launching cyber attacks has emerged recently and is slowly, buy steadily taking on the western countries like UK and USA.
A "Cyber Shield" would enable the U.S. and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing's cyber...
The country's anticipated cyber strategy will need to sharpen its focus while better implementing its provisions.
COMMENTARY | You don't need a billion-dollar overhaul to modernize cybersecurity. Lou Eichenbaum shares three quick wins and three long-term...
The very nature of cybersecurity makes it a constant arms race between attackers and defenders and recently that's meant both sides...
Cybersecurity used to mean installing antivirus software and setting up a firewall. Those days are over. Today's hackers use methods that...
Cybeats Technologies Corp. ( ($TSE:CYBT) ) has shared an announcement. Cybeats Technologies Corp. has appointed Tejinder Kaushik,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IFP Training is http://www.ifptraining.com.
According to Rankiteo, IFP Training’s AI-generated cybersecurity score is 771, reflecting their Fair security posture.
According to Rankiteo, IFP Training currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IFP Training is not certified under SOC 2 Type 1.
According to Rankiteo, IFP Training does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IFP Training is not listed as GDPR compliant.
According to Rankiteo, IFP Training does not currently maintain PCI DSS compliance.
According to Rankiteo, IFP Training is not compliant with HIPAA regulations.
According to Rankiteo,IFP Training is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IFP Training operates primarily in the Technical and Vocational Training industry.
IFP Training employs approximately 177 people worldwide.
IFP Training presently has no subsidiaries across any sectors.
IFP Training’s official LinkedIn profile has approximately 21,446 followers.
IFP Training is classified under the NAICS code 6115, which corresponds to Technical and Trade Schools.
No, IFP Training does not have a profile on Crunchbase.
Yes, IFP Training maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ifptraining.
As of December 22, 2025, Rankiteo reports that IFP Training has not experienced any cybersecurity incidents.
IFP Training has an estimated 121 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, IFP Training has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.