Cybersecurity Analyst Program
Enroll in our Cybersecurity Analyst program
and boost your career!
CPF-eligible and several funding options up to 100%
Request a callback Access the program3P Approach
Our training center guides you in identifying the ideal course and helps you maximize funding opportunities.
We provide everything you need to start with confidence.
Experience an immersive and intensive training designed to immerse you in hands-on workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.
At the end of your journey, we assess your acquired skills, issue a certification attesting to your expertise, and support you to ensure your success in your professional projects.
You are now ready to excel!
Course Description
trains engineers capable of designing, deploying, and maintaining security systems to protect IT infrastructures against cyber threats. It includes topics such as secure network architecture, cryptography, risk management, incident response, as well as advanced knowledge in secure development and vulnerability analysis.
Learning Objectives
By the end of this course, participants will be able to:
- Acquire the foundational skills to become a cybersecurity analyst.
- Learn to detect, analyze, and respond to cybersecurity threats.
- Use monitoring, detection, and incident response tools.
- Develop practical knowledge of penetration testing, cryptography, and securing applications and databases.
Who is this course for?
The course is intended for a wide audience, including:
- IT professionals wishing to specialize in cybersecurity:
- System and network administrators who want to deepen their knowledge of infrastructure security.
- Developers eager to incorporate application security practices into their work.
- Support technicians or IT managers aiming to strengthen the protection of systems and data.
- Recent graduates or career changers in the IT sector who want to acquire the skills needed to move into a cybersecurity analyst role.
- IT or security managers tasked with protecting company infrastructures and data against cyberattacks.
- Security consultants and auditors wishing to strengthen their technical skills in detection, analysis, and incident response.
- Anyone involved in IT security management or data protection who wants to develop technical expertise in cybersecurity.
- Objective: Understand the fundamental principles of cybersecurity, current threats, and the key role of the cybersecurity analyst.
- Fundamental principles of cybersecurity (confidentiality, integrity, availability).
- The threat landscape: Types of attacks (phishing, ransomware, APTs, etc.).
- The roles and responsibilities of the cybersecurity analyst within an organization.
- Overview of the main tools used in cybersecurity.
- Security models: Defense in depth, access control, identity management.
- Introduction to common attacks and trends (phishing, malware, ransomware).
- Vulnerabilities and risk management: Identifying and assessing vulnerabilities.
- Objective: Learn to use network monitoring and intrusion detection tools to identify threats.
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
- Introduction to logs and security events: Using syslog, SNMP.
- Network monitoring tools: Wireshark, tcpdump, etc.
- Introduction to SIEM (e.g., Splunk, ELK stack) and their role in cybersecurity.
- Collecting, analyzing, and correlating events with a SIEM.
- Hands-on workshop: Configuring rules and alerts in a SIEM to detect security incidents.
- Objective: Learn to analyze a cybersecurity incident and respond appropriately.
- Incident management phases: Identification, containment, analysis, eradication, recovery.
- Analyzing indicators of compromise (IOC): URLs, IP addresses, malware signatures.
- Tools for analyzing malware and suspicious files.
- Developing an incident response plan: Process and key steps.
- Managing cybersecurity incidents: Coordination with internal and external teams.
- Hands-on workshop: Simulating a response to a security incident.
- Objective: Acquire the skills needed to secure computer networks and systems.
- Firewalls and Virtual Private Networks (VPN): Configuration and best practices.
- Securing network communications: Secure protocols (HTTPS, SSL/TLS).
- Network segmentation techniques and network access control.
- Securing operating systems (Windows, Linux, macOS): Hardening, user and privilege management.
- Securing network services (DNS, DHCP, SMB).
- Hands-on workshop: Securing a Windows/Linux server against common attacks.
- Objective: Understand cryptographic concepts and how they are used to protect data.
- Principles of cryptography: Symmetric and asymmetric encryption.
- Common algorithms: AES, RSA, SHA-256, etc.
- Using cryptography to protect data confidentiality.
- Securing email (PGP, S/MIME) and web communications (SSL/TLS).
- Cryptographic key management: Storage, distribution, and revocation.
- Hands-on workshop: Implementing data encryption on a network.
- Objective: Learn to conduct penetration tests and audits to identify system weaknesses.
- Penetration testing process: Planning, reconnaissance, exploitation, post-exploitation.
- Popular tools for penetration testing: Kali Linux, Metasploit, Burp Suite.
- Legislation and ethics of penetration testing.
- System security auditing: Analyzing security flaws and weak points.
- Vulnerability analysis with tools such as Nessus, OpenVAS.
- Hands-on workshop: Conducting a penetration test on a virtual machine.
- Objective: Learn to secure applications and databases against attacks.
- Main web application vulnerabilities: SQL Injection, XSS, CSRF, etc.
- OWASP Top 10: Analysis and prevention of critical vulnerabilities.
- Application testing tools: Burp Suite, OWASP ZAP.
- Database access controls: Authentication, authorizations.
- Encrypting sensitive data in databases.
- Hands-on workshop: Securing a database against attacks.
- Objective: Prepare for future developments in cybersecurity and understand the latest trends in the field.
- Securing Cloud environments (AWS, Azure, Google Cloud).
- Securing IoT devices and associated challenges.
- Emerging threats in the cloud and IoT.
- Cybersecurity certifications: CISSP, CISM, CompTIA Security+, etc.
- Skills needed to advance in cybersecurity.
- Discussion on career development and preparation for advanced roles (CTO, CISO).
- Comprehensive and Progressive Program: A well-structured path from foundational concepts to advanced applications for in-depth understanding.
- Practical and Contextual Approach: Numerous hands-on workshops let participants use tools and models in real-world contexts.
- Cutting-Edge Tooling Expertise: Use of the latest and most relevant frameworks and platforms.
- Real Project Development: An entire day dedicated to a capstone project, integrating knowledge in a practical, professional scenario.
- Ethical and Security Dimension: In-depth reflection on ethical issues, bias, and technology regulation to ensure responsible use.
- Market-Aligned: Training designed to meet current business needs for innovative, high-performance solutions.
- Support and Guidance: Mentoring by experts and access to resources to ensure lasting skill development.
- Live demonstrations with cybersecurity services.
- Hands-on workshops and real case studies across various sectors (industry, retail, healthcare).
- Experience feedback: Sharing best practices and common pitfalls in companies.
- Simulations and tools: Use of simulators for interactive workshops.
- End-of-course multiple-choice quiz.
- Practical case studies.
- Continuous assessment with personalized feedback.
- Well-Architected cloud Framework.
- GDPR (General Data Protection Regulation).
- ISO 27001, SOC 2 (Service Organization Control).
- NIST Cybersecurity Framework.
Prerequisites
No specific prerequisites are required. This course is accessible to anyone wishing to discover AWS, but basic knowledge of IT or information systems can be an asset.
Course Outline
Day 1: Introduction to Cybersecurity and Basic Concepts
Course Highlights
Teaching Methods and Tools Used
Assessment
Normative References
Modalities
In-house
The duration and program can be customized according to your company’s specific needs
More details Contact usNext Generation Academy