Cybersecurity e-learning channel

Practical course - 1d - 07h23 - Ref. 8CY
Price : 190 € E.T.

Cybersecurity e-learning channel




Combat cyber threats with our specialized cybersecurity channel. Find out about data protection methods, attack prevention techniques and strategies for countering vulnerabilities in your digital infrastructures. Are you ready to become a cybersecurity expert?


Prêt à
l'emploi
Clés en
main
À la carte


Chaîne e-learning accessible sur la E-academy by ORSYS

Ref. 8CY
  07h23
Prix : 190 € E.T.
Language : EN
This course is also available in English.
Optional :
Tutorat : 199 € HT




Combat cyber threats with our specialized cybersecurity channel. Find out about data protection methods, attack prevention techniques and strategies for countering vulnerabilities in your digital infrastructures. Are you ready to become a cybersecurity expert?


Teaching objectives
At the end of the training, the participant will be able to:
Know how to protect information.
Promote the company's IS security policy.
Identify the risks of using digital tools.
Securing your workstation.
Implement encryption with BitLocker.
Set up group strategies.
Manage BitLocker recovery key retrieval in Active Directory and Azure Active Directory.
Install and use the Kali Linux distribution.
Analyze vulnerabilities with Nessus.
Test your network with Macchanger or Macof.
Understand the concept of Man in The Middle, as well as brute force attack tools.
Manage WiFi network security.
Deploy a PKI solution in your company.
Understanding PKI.
Know the concepts of cryptography.
Understand symmetrical and asymmetrical encryption.
Use certificates and certificate templates.

Intended audience
System and network administrators and anyone in charge of IT security.

Prerequisites
Knowledge of Linux and Windows systems.

Practical details
Digital activities
IT structure: recorded courses, expert videos and best practice sharing.
Mentoring
L’option tutorat propose un accompagnement personnalisé par un formateur référent ORSYS, expert du domaine. Adapté aux besoins, aux capacités et au rythme de chaque apprenant, ce tutorat combine un suivi asynchrone (corrections personnalisées d’exercices, échanges illimités par message…) et des échanges synchrones individuels. Bénéfice : une meilleure compréhension, le développement des compétences et un engagement durable dans la formation.
Pedagogy and practice
A wealth of content produced by trainers following a rigorous pedagogical approach. During each course, operational cases are commented on by experts to help learners put into practice what they have just learned. To help learners anchor their memory, each content item is broken down into short sequences of 3 to 10 minutes. This enables each learner to learn dynamically and independently.

Course schedule

1
BitLocker, implementing and managing desktop encryption in the enterprise

  • Discover the BitLocker feature.
  • Setting up encryption with BitLocker.

2
Kali Linux, start analyzing the security of your infrastructure

  • Discover Kali Linux.
  • Installing Kali Linux.
  • Kali Linux configuration.
  • Discovering vulnerabilities.
  • Installing and using Nessus.
  • Getting to grips with Kali Linux and the network.
  • Use of network tools.
  • Discovering brute force attacks with Kali Linux.
  • Use of brute force attack tools.
  • WiFi security management.

3
PKI, implementing and using a public key infrastructure in a Windows environment

  • Introduction to PKI: cryptography.
  • Certificates in a public key infrastructure.
  • PKI implementation.
  • Certificate models in a public key infrastructure.