Publication date : 03/14/2024

Course : System and network security

Face up to threats with the CyberRange from Airbus CyberSecurity

Practical course - 4d - 28h00 - Ref. SCR
Price : 2470 € E.T.

System and network security

Face up to threats with the CyberRange from Airbus CyberSecurity


Required course

This practical course will show you how to implement the main means of securing systems and networks. After studying a few threats to the information system, you will learn about the role of various security equipment in protecting the company.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. SCR
  4d - 28h00
2470 € E.T.




This practical course will show you how to implement the main means of securing systems and networks. After studying a few threats to the information system, you will learn about the role of various security equipment in protecting the company.


Teaching objectives
At the end of the training, the participant will be able to:
Understand information system vulnerabilities and threats
Understand the role of various safety devices
Design and implement an appropriate security architecture
Implement the main network security measures
Securing Windows and Linux systems

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of networks and systems.

Practical details
Hands-on work
Airbus CyberSecurity's CyberRange is used to create and play out realistic scenarios involving real cyber-attacks.

Course schedule

1
Risks and threats

  • Lower layer" attacks.
  • TCP/IP protocol strengths and weaknesses.
  • Illustration of ARP and IP Spoofing attacks, TCP-SYNflood, SMURF, etc.
  • Denial of service and distributed denial of service.
  • Application attacks.
  • HTTP, a particularly exposed protocol (SQL injection, Cross Site Scripting, etc.).
  • DNS: attack Dan Kaminsky.
Hands-on work
Log on to the CyberRange platform, take control of a Linux/Windows machine to navigate in command and graphics mode. Use of the Wireshark network analyzer.

2
Everyday tools

  • Available tools and techniques.
  • Penetration testing: tools and resources.
  • Types of scans, filtering detection, firewalking.
  • Vulnerability detection (scanners, IDS probes, etc.).
  • Real-time detection tools IDS-IPS, agent, probe or cut-off.
  • Build an architecture and train with CyberRange (architecture, operating system, components, etc.).
  • CyberRange scenarios: cyber-attacks (network, system, web), traffic (dns, ftp, ping, http), etc.
Hands-on work
Run a scenario on CyberRange to perform web vulnerability scans (ping, port scan, web vulnerability scan, user database dump, traffic generation).

3
Security architectures

  • Which architectures for which needs?
  • Secure addressing plan: RFC 1918.
  • Address translation (FTP as an example).
  • The role of demilitarized zones (DMZs).
  • Secure architecture through virtualization.
  • Firewall: the cornerstone of security. Actions and limitations of traditional network firewalls.
  • Proxy server, firewall, application relay.
  • Reverse proxy, content filtering, caching and authentication.
Hands-on work
Implementation of a web cache proxy (Squid) on CyberRange.

4
Data security

  • Fundamental concepts of cryptography. The main tools on the market, and what vendors have to offer.
  • Current trends. The antiviral offer, complementary elements. EICAR, a "virus" you need to know about.
  • Symmetrical and asymmetrical encryption. Hash functions.
  • Cryptographic services and concepts.
  • Cryptographic principles and algorithms (DES, 3DES, AES, RC4, RSA, DSA, ECC).
  • User authentication. The importance of mutual authentication.
  • Public key management and certification, revocation, renewal and archiving.
  • Key management infrastructure (PKI).
  • Diffie-Hellman algorithm. Man-in-the-middle attack.
  • X509 certificates. Electronic signature. Radius. LDAP.
  • Worms, viruses, trojans, malware and keyloggers.
Hands-on work
Deployment of SMTP relay and HTTP/FTP Antivirus proxy.

5
Exchange security

  • The IPSec protocol.
  • Presentation of the protocol.
  • Tunnel and transport modes. ESP and AH.
  • Analysis of protocol and associated technologies (SA, IKE, ISAKMP, ESP, AH, etc.).
  • SSL/TLS protocols.
  • Presentation of the protocol. Negotiation details.
  • Analysis of the main vulnerabilities.
  • sslstrip and sslsnif attacks.
  • The SSH protocol. Overview and features.
  • Differences with SSL.
Hands-on work
Run an SSL vulnerability scanning scenario on CyberRange to highlight SSL/TLS vulnerabilities. Perform a man-in-the-middle attack on an SSL session.

6
Hardening a system

  • Introducing hardening.
  • Insufficient default installations.
  • Evaluation criteria (TCSEC, ITSEC and common criteria).
  • Securing Windows.
  • Account and authorization management.
  • Service control.
  • Network configuration and auditing.
  • Securing Linux.
  • Kernel configuration.
  • File system.
  • Service and network management.
Hands-on work
Example of securing a Windows and Linux system.

7
Audit

  • Supervision and administration.
  • Organizational impact.
  • Real-time detection tools IDS-IPS, agent, probe or cut-off. What products are available?
  • Processing information from the various safety devices.
  • React effectively in all circumstances.
  • Technology watch. Reference site and overview of auditing tools.
Hands-on work
Analysis of machine system log files on CyberRange.


Customer reviews
4,4 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
PONTE CORP SYLVAIN D.
18/11/25
5 / 5

An excellent trainer, both technically and in terms of delivery over the 4 days of training, which was a great help in assimilating the knowledge.
RODOLPHE J.
18/11/25
5 / 5

Very good training to help you understand the main hacking techniques and the precautions you need to take to make your network activity as secure as possible.
LOIC B.
18/11/25
3 / 5

Formation très intéressante du point de vue de l’attaquant, avec la démonstration et utilisation des outils de hackings à dispo dans Kali Linux entre autre, permettant de déterminer les différentes méthodes d’attaquesEn revanche, le programme de la formation n’a pas été respecté :Le point 3 Architectures de sécurité, 4 Sécurité des données, 5 Sécurité des échanges et 6 Sécuriser un système, le “hardening” ont été survolésNous n’avons pas fait beaucoup de pratique (pb techniqu



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 4 May, 30 June, 6 Oct.

PARIS LA DÉFENSE
2026 : 27 Apr., 23 June, 29 Sep.