Course : Cybersecurity, testing environments

attack, detect, collect and analyze

Practical course - 3d - 21h00 - Ref. CTE
Price : 2100 € E.T.

Cybersecurity, testing environments

attack, detect, collect and analyze



This advanced training course will teach you the techniques you need to measure the security level of your Information System. Following these attacks, you will learn how to trigger the appropriate response and raise the security level of your network.


INTER
IN-HOUSE
CUSTOM

In person or remote class
Available in English on request

Ref. CTE
  3d - 21h00
2100 € E.T.




This advanced training course will teach you the techniques you need to measure the security level of your Information System. Following these attacks, you will learn how to trigger the appropriate response and raise the security level of your network.


Teaching objectives
At the end of the training, the participant will be able to:
Understand hacker techniques and counter their attacks
Measure the security level of your Information System
Perform a penetration test

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of IS security, networks and systems (especially Linux).

Course schedule

1
Web attacks

  • OWASP: organization, chapters, Top10, manuals, tools.
  • Discover the infrastructure and associated technologies, strengths and weaknesses.
  • Client side: clickjacking, CSRF, cookie theft, XSS, components (Flash, Java). New vectors.
  • Server side: authentication, session theft, injections (SQL, LDAP, files, commands).
  • Inclusion of local and remote files, cryptographic attacks and vectors.
  • Evasion and bypassing protection: WAF bypass techniques, for example.
  • Burp Suite tools, ZAP, Sqlmap, BeEF.
Role-playing
Presentation and familiarization with environments and tools. Implementation of various Web attacks in real-life conditions on the server and client sides.

2
Detecting intrusions

  • Operating principles and detection methods.
  • Market players, overview of systems and applications.
  • Network (Nmap) and application (Web applications) scanners.
  • IDS (Intrusion Detection System).
  • The advantages of these technologies, and their limitations.
  • How do you place them in your enterprise architecture?
  • Market overview, detailed SNORT study.
Role-playing
Presentation and familiarization with environments and tools. Installation, configuration and implementation of SNORT, writing attack signatures.

3
Information gathering

  • Heterogeneous sources. What is a safety event?
  • Security Event Information Management (SIEM). Events collected from the IS.
  • Equipment system logs (firewalls, routers, servers, databases, etc.).
  • Passive collection in listening mode and active collection.
Role-playing
Log analysis procedure. Geolocating an address. Correlating logs from different sources, visualizing, sorting and searching for rules.


Customer reviews
3,8 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
BAPTISTE M.
25/03/26
5 / 5

Formation au top. Le fait de mélanger théorie et pratique nous permet de comprendre plus facilement l’ensemble des mécanismes. Merci beaucoup à Frédéric pour son cours.
TAYLOR D.
25/03/26
5 / 5

top, complet et bon partage entre théorie et pratique
CHRISTOPHER D.
25/03/26
4 / 5

Temps accordé au module attaque web trop présent par rapport aux modules de détection et gestion des logs sur lesquelles j’aurait souhaité passer plus de temps.



Publication date : 07/30/2024


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Last places available
Guaranteed date, in person or remotely
Guaranteed session

REMOTE CLASS
2026 : 24 June, 7 Oct., 9 Dec.

PARIS LA DÉFENSE
2026 : 24 June, 7 Oct., 9 Dec.