Skip to content
Next Generation Academy
```html



Cybersecurity Analyst Program

Enroll in our Cybersecurity Analyst program
and boost your career!

CPF-eligible and several funding options up to 100%

Request a callback Access the program



3P Approach

Ready for takeoff
Full immersion
Ready to perform

Our training center guides you in identifying the ideal course and helps you maximize funding opportunities.
We provide everything you need to start with confidence.

Experience an immersive and intensive training designed to immerse you in hands-on workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.

At the end of your journey, we assess your acquired skills, issue a certification attesting to your expertise, and support you to ensure your success in your professional projects.
You are now ready to excel!

Course Description

trains engineers capable of designing, deploying, and maintaining security systems to protect IT infrastructures against cyber threats. It includes topics such as secure network architecture, cryptography, risk management, incident response, as well as advanced knowledge in secure development and vulnerability analysis.

Learning Objectives

By the end of this course, participants will be able to:

  • Acquire the foundational skills to become a cybersecurity analyst.
  • Learn to detect, analyze, and respond to cybersecurity threats.
  • Use monitoring, detection, and incident response tools.
  • Develop practical knowledge of penetration testing, cryptography, and securing applications and databases.


Who is this course for?

The course is intended for a wide audience, including:

    • IT professionals wishing to specialize in cybersecurity:
    • System and network administrators who want to deepen their knowledge of infrastructure security.
    • Developers eager to incorporate application security practices into their work.
    • Support technicians or IT managers aiming to strengthen the protection of systems and data.
    • Recent graduates or career changers in the IT sector who want to acquire the skills needed to move into a cybersecurity analyst role.
    • IT or security managers tasked with protecting company infrastructures and data against cyberattacks.
    • Security consultants and auditors wishing to strengthen their technical skills in detection, analysis, and incident response.
    • Anyone involved in IT security management or data protection who wants to develop technical expertise in cybersecurity.

    Prerequisites

    No specific prerequisites are required. This course is accessible to anyone wishing to discover AWS, but basic knowledge of IT or information systems can be an asset.


    Course Outline

    Day 1: Introduction to Cybersecurity and Basic Concepts

    • Objective: Understand the fundamental principles of cybersecurity, current threats, and the key role of the cybersecurity analyst.
    Morning: Introduction to cybersecurity
    • Fundamental principles of cybersecurity (confidentiality, integrity, availability).
    • The threat landscape: Types of attacks (phishing, ransomware, APTs, etc.).
    • The roles and responsibilities of the cybersecurity analyst within an organization.
    • Overview of the main tools used in cybersecurity.
    Afternoon: Security models and common threats
    • Security models: Defense in depth, access control, identity management.
    • Introduction to common attacks and trends (phishing, malware, ransomware).
    • Vulnerabilities and risk management: Identifying and assessing vulnerabilities.
    Day 2: Monitoring and Detection Tools
    • Objective: Learn to use network monitoring and intrusion detection tools to identify threats.
    Morning: Introduction to network monitoring tools
    • Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
    • Introduction to logs and security events: Using syslog, SNMP.
    • Network monitoring tools: Wireshark, tcpdump, etc.
    Afternoon: Security Information and Event Management (SIEM) tools
    • Introduction to SIEM (e.g., Splunk, ELK stack) and their role in cybersecurity.
    • Collecting, analyzing, and correlating events with a SIEM.
    • Hands-on workshop: Configuring rules and alerts in a SIEM to detect security incidents.
    Day 3: Incident Analysis and Threat Response
    • Objective: Learn to analyze a cybersecurity incident and respond appropriately.
    Morning: Analyzing cybersecurity incidents
    • Incident management phases: Identification, containment, analysis, eradication, recovery.
    • Analyzing indicators of compromise (IOC): URLs, IP addresses, malware signatures.
    • Tools for analyzing malware and suspicious files.
    Afternoon: Incident response and crisis management
    • Developing an incident response plan: Process and key steps.
    • Managing cybersecurity incidents: Coordination with internal and external teams.
    • Hands-on workshop: Simulating a response to a security incident.
    Day 4: Securing Networks and Systems
    • Objective: Acquire the skills needed to secure computer networks and systems.
    Morning: Network security
    • Firewalls and Virtual Private Networks (VPN): Configuration and best practices.
    • Securing network communications: Secure protocols (HTTPS, SSL/TLS).
    • Network segmentation techniques and network access control.
    Afternoon: System security
    • Securing operating systems (Windows, Linux, macOS): Hardening, user and privilege management.
    • Securing network services (DNS, DHCP, SMB).
    • Hands-on workshop: Securing a Windows/Linux server against common attacks.
    Day 5: Cryptography and Data Protection
    • Objective: Understand cryptographic concepts and how they are used to protect data.
    Morning: Introduction to cryptography
    • Principles of cryptography: Symmetric and asymmetric encryption.
    • Common algorithms: AES, RSA, SHA-256, etc.
    • Using cryptography to protect data confidentiality.
    Afternoon: Securing communications and data
    • Securing email (PGP, S/MIME) and web communications (SSL/TLS).
    • Cryptographic key management: Storage, distribution, and revocation.
    • Hands-on workshop: Implementing data encryption on a network.
    Day 6: Penetration Testing and Security Auditing
    • Objective: Learn to conduct penetration tests and audits to identify system weaknesses.
    Morning: Introduction to penetration testing
    • Penetration testing process: Planning, reconnaissance, exploitation, post-exploitation.
    • Popular tools for penetration testing: Kali Linux, Metasploit, Burp Suite.
    • Legislation and ethics of penetration testing.
    Afternoon: Security auditing
    • System security auditing: Analyzing security flaws and weak points.
    • Vulnerability analysis with tools such as Nessus, OpenVAS.
    • Hands-on workshop: Conducting a penetration test on a virtual machine.
    Day 7: Securing Applications and Databases
    • Objective: Learn to secure applications and databases against attacks.
    Morning: Web application security
    • Main web application vulnerabilities: SQL Injection, XSS, CSRF, etc.
    • OWASP Top 10: Analysis and prevention of critical vulnerabilities.
    • Application testing tools: Burp Suite, OWASP ZAP.
    Afternoon: Database security
    • Database access controls: Authentication, authorizations.
    • Encrypting sensitive data in databases.
    • Hands-on workshop: Securing a database against attacks.
    Day 8: Current Trends and Cybersecurity Outlook
    • Objective: Prepare for future developments in cybersecurity and understand the latest trends in the field.
    Morning: Cybersecurity in the Cloud and IoT
    • Securing Cloud environments (AWS, Azure, Google Cloud).
    • Securing IoT devices and associated challenges.
    • Emerging threats in the cloud and IoT.
    Afternoon: Cybersecurity careers and certification
    • Cybersecurity certifications: CISSP, CISM, CompTIA Security+, etc.
    • Skills needed to advance in cybersecurity.
    • Discussion on career development and preparation for advanced roles (CTO, CISO).


    Course Highlights

    • Comprehensive and Progressive Program: A well-structured path from foundational concepts to advanced applications for in-depth understanding.
    • Practical and Contextual Approach: Numerous hands-on workshops let participants use tools and models in real-world contexts.
    • Cutting-Edge Tooling Expertise: Use of the latest and most relevant frameworks and platforms.
    • Real Project Development: An entire day dedicated to a capstone project, integrating knowledge in a practical, professional scenario.
    • Ethical and Security Dimension: In-depth reflection on ethical issues, bias, and technology regulation to ensure responsible use.
    • Market-Aligned: Training designed to meet current business needs for innovative, high-performance solutions.
    • Support and Guidance: Mentoring by experts and access to resources to ensure lasting skill development.


    Teaching Methods and Tools Used

    • Live demonstrations with cybersecurity services.
    • Hands-on workshops and real case studies across various sectors (industry, retail, healthcare).
    • Experience feedback: Sharing best practices and common pitfalls in companies.
    • Simulations and tools: Use of simulators for interactive workshops.


    Assessment

    • End-of-course multiple-choice quiz.
    • Practical case studies.
    • Continuous assessment with personalized feedback.


    Normative References

    • Well-Architected cloud Framework.
    • GDPR (General Data Protection Regulation).
    • ISO 27001, SOC 2 (Service Organization Control).
    • NIST Cybersecurity Framework.

Modalities

Inter-company or remote
In-house

Inter-company or remote

Duration: 8 days

Price: €6500

More details Contact us

In-house

The duration and program can be customized according to your company’s specific needs

More details Contact us
💬
FAQ Assistant

Next Generation Academy