This training program aims to raise awareness among IT teams about IT risks and their consequences. This module presents the techniques commonly used by hackers, while popularizing the subject for a non-technical audience. It details the best practices to adopt to protect against most attacks.
Course overview
Raising awareness among IT teams about IT risks and their consequences
Presentation of techniques commonly used by hackers by popularizing the subject for a non-technical audience
Detailing the best practices to adopt to protect against most attacks
Course Curriculum
Introduction
Cybersecurity context (CNIL, threats, attackers, data leaks, the black market in vulnerabilities, etc.).
MITRE ATT&CK matrix
Web application security
OWASP
Authentication/Password storage
HTTP (Burp Suite presentation)
Equipment weaknesses
Risks of USB equipment
Recommandations
Security for mobile devices
The risks of nomadism
Data encryption and erasure
Recommandations
OS security
Linux and/or Windows (depending on target audience)
Active Directory security
NTLM authentication and relay
Password management
Privilege management
Security tools
Social engineering
How to detect it?
Fraud by email, telephone, to the president
Recommandations
WIFI networks
Wireless network protection
Method of Assessment
Production of a final online questionnaire covering all the concepts learned.
Training benefits
Training by an offensive safety expert
Operating recommendations
Practical tools
Real case studies
Who should attend?
IT team
CISO
IT Support team
System administrator
Network administrator
Entry Requirements
Computer basics: network (protocols, OSI model, etc.) and system (Linux or Windows, server management, etc.).
How and when to access
The participant is considered registered when:
The prerequisites and needs are identified and validated
The training agreement is signed
Registration requests can be sent up to 10 working days before the start of the training.
Accessibility
Whether you are recognized as having a disability or not, making our training accessible to everyone is part of our commitment.
If you need compensation or adaptation for the content, the supports, the “venue”, the material used, the schedules, the rhythm, we are at your disposal.
To go further
This training course is a preparation for the following training course: