Odoo image and text block


A travers cette formation, les stagiaires obtiendront des compétences nécessaires pour la surveillance de la sécurité des systèmes informatiques, la détection des cyberattaques, la collecte et l'analyse des preuves informatiques, la mise en corrélation des informations, et la coordination des réponses aux incidents informatiques.


Write one or two paragraphs describing your product or services. To be successful your content needs to be useful to your readers.

Start with the customer – find out what they want and give it to them.

Odoo text and image block
Odoo image and text block


Compétences basiques en ordinateur et navigation Internet
Concepts de bases des systèmes linux et Windows
Connaissance des concepts réseaux
Connaissance basiques en programmation et langage SQL

Contenu de la formation 

Chapter 1. Cybersecurity and the Security Operations Center

​The Danger ​Explain why networks and data are attacked
​Fighters inthe War Against Cybercrime ​Explain how to prepare for a career in Cybersecurity operations

Chapter 2. Windows Operating System 

Windows Overview​                         ​Explain the operation of the Windows Operating System.
​Windows Administration ​Explain how to secure Windows endpoints.

Chapter 3. Linux Operating System

Using Linux​                                ​Perform basic operations in the Linux shell.
​Linux Administration ​Perform basic Linux administration tasks.
​Linux Clients ​Perform basic security-related tasks on a Linux host.

Chapter 4. Network Protocols and Services

​Network Protocols                                                       ​Explain how protocols enable network operations.
​Ethernet and Internet Protocol (IP) ​Explain how the Ethernet and IP protocols support network communication.
​Connectivity Verification ​Use common testing utilities to verify and test network connectivity.
​Address Resolution Protocol ​Explain how the address resolution protocol enables communication.
​The Transport Layer and Network Services ​Explain how transport layer protocols and network services support network functionality.
​Network Services ​Explain how network services enable network functionality.

Chapter 5. Network Infrastructure

Network Communication Devices​                      ​Explain how network devices enable wired and wireless network communication.
​Network Security Infrastructure ​Explain how devices and services are used to enhance network security.
​Network Representations ​Explain how networks and network topologies are represented.

Chapter 6. Principles of Network Security

Attackers and Their Tools​  ​Explain how networks are attacked.
​Common Threats and Attacks ​Explain the various types of threats and attacks.

Chapter 7. Network Attacks: A Deeper Look 

Observing Network Operation​                                ​Explain network traffic monitoring.
​Attacking the Foundation ​Explain how TCP/IP vulnerabilities enable network attacks.
​Attacking What We Do ​Explain how common network applications and services are vulnerable to attack.

Chapter 8. Protecting the Network 

Understanding Defense​ Explain approaches to network security defense.​
​Access Control ​Explain access control as a method of protecting a network.
​Network Firewalls and Intrusion Prevention          ​Explain how firewalls and other devices prevent network intrusions.
​Content Filtering ​Explain how content filtering prevents unwanted data from entering the network.
​Threat Intelligence ​Use various intelligence sources to locate current security threats.

         Chapter 9. Cryptography and the Public Key Infrastructure

Cryptography​ Use tools to encrypt and decrypt data.​
​Public Key Cryptography                               ​Explain how the public key infrastructure (PKI) supports network security.

Chapter 10. Endpoint Security and Analysis

Endpoint Protection​ ​Use a tool to generate a malware analysis report.
​Endpoint Vulnerability Assessment ​Classify endpoint vulnerability assessment information.

Chapter 11. Security Monitoring 

Technologies and Protocols​                  ​Explain how security technologies affect security monitoring.
​Log Files ​Explain the types of log files used in security monitoring

Chapter 12. Intrusion Data Analysis

Data Collection​                                              ​Explain how security-related data is collected.
​Data Preparation ​Arrange a variety of log files in preparation for intrusion data analysis.
​Data Analysis ​Analyze intrusion data to determine the source of an attack.

Chapter 13. Incident Response and Handling 

Incident Response Models​                                          ​Apply incident response models to an intrusion event.
​CSIRTs and NIST 800-61r2                   ​Apply standards specified in NIST 800-61r2 to a computer security incident.
​Case-Based Practice ​Given a set of logs, isolate a threat actor and recommend an incident response plan.