Cybersecurity Expert Track
Take our Cybersecurity Expert track
and boost your career!
CPF-eligible and several funding options up to 100%
Request a callback Access the program3P Approach
Our training center guides you in identifying the ideal program and helps you maximize funding opportunities.
We give you all the keys to start with confidence.
Experience immersive and intensive training designed to plunge you into hands-on workshops and real case studies.
Learn by doing, and develop concrete skills directly applicable to your future projects.
At the end of your journey, we assess your acquired skills, issue a certification attesting to your expertise, and support you to ensure your success in your professional projects.
You are now ready to excel!
Course Description
Trains cybersecurity experts capable of designing, deploying, and maintaining security systems to protect IT infrastructures against cyber threats. It includes subjects such as secure network architecture, cryptography, risk management, incident response, as well as advanced knowledge in secure development and vulnerability analysis.
Learning Objectives
By the end of this course, participants will be able to:
- Strengthen advanced skills to detect, analyze, and prevent cyber threats.
- Master the design and deployment of complex defense strategies.
- Develop capabilities in risk management and security policies.
- Optimize compliance with security standards and regulations (GDPR, ISO 27001).
- Prepare for leadership roles in cybersecurity (RSSI, CISO).
- Secure complex environments (cloud, IoT, virtualization).
- Improve incident response and crisis management.
Who Is This Course For?
The course is intended for a wide audience, including:
- IT professionals wishing to specialize in cybersecurity:
- System and network administrators looking to deepen their knowledge of infrastructure security.
- Developers wanting to integrate application security practices into their work.
- Support technicians or IT managers seeking to strengthen the protection of systems and data.
- Recent graduates or career changers in the IT sector who wish to acquire the skills needed to move into a cybersecurity analyst role.
- IT or security managers in companies tasked with protecting infrastructures and data against cyberattacks.
- Security consultants and auditors who want to strengthen their technical skills in detection, analysis, and incident response.
- Anyone involved in IT security management or data protection who wants to acquire technical expertise in cybersecurity.
- Objective: Understand the fundamental principles of cybersecurity, current threats, and the key role of the cybersecurity analyst.
- The fundamental principles of cybersecurity (confidentiality, integrity, availability).
- The threat landscape: Types of attacks (phishing, ransomware, APTs, etc.).
- The roles and responsibilities of the cybersecurity analyst within an organization.
- Overview of the main tools used in cybersecurity.
- Security models: Defense in depth, access control, identity management.
- Introduction to common attacks and trends (phishing, malware, ransomware).
- Vulnerabilities and risk management: Identifying and assessing vulnerabilities.
- Objective: Learn to use network monitoring and intrusion detection tools to identify threats.
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
- Introduction to logs and security events: Using syslog, SNMP.
- Network monitoring tools: Wireshark, tcpdump, etc.
- Introduction to SIEM (e.g., Splunk, ELK stack) and their role in cybersecurity.
- Collecting, analyzing, and correlating events with a SIEM.
- Hands-on lab: Configuring rules and alerts in a SIEM to detect security incidents.
- Objective: Learn to analyze a cybersecurity incident and respond appropriately.
- Incident management phases: Identification, containment, analysis, eradication, recovery.
- Indicators of Compromise (IOC): URLs, IP addresses, malware signatures.
- Tools for analyzing malware and suspicious files.
- Developing an incident response plan: Process and key steps.
- Managing cybersecurity incidents: Coordination with internal and external teams.
- Hands-on lab: Simulating a response to a security incident.
- Objective: Acquire the skills needed to secure networks and IT systems.
- Firewalls and Virtual Private Networks (VPN): Configuration and best practices.
- Securing network communications: Secure protocols (HTTPS, SSL/TLS).
- Network segmentation techniques and network access control.
- Securing operating systems (Windows, Linux, macOS): Hardening, user and privilege management.
- Securing network services (DNS, DHCP, SMB).
- Hands-on lab: Hardening a Windows/Linux server against common attacks.
- Objective: Understand cryptography concepts and how they are used to protect data.
- Principles of cryptography: Symmetric and asymmetric encryption.
- Common algorithms: AES, RSA, SHA-256, etc.
- Using cryptography to protect data confidentiality.
- Securing emails (PGP, S/MIME) and web communications (SSL/TLS).
- Cryptographic key management: Storage, distribution, and revocation.
- Hands-on lab: Implementing data encryption on a network.
- Objective: Learn to conduct penetration tests and audits to identify system weaknesses.
- Pen test process: Planning, reconnaissance, exploitation, post-exploitation.
- Popular tools for penetration testing: Kali Linux, Metasploit, Burp Suite.
- Legislation and ethics of penetration testing.
- System security audit: Analyzing security gaps and weak points.
- Vulnerability analysis with tools such as Nessus, OpenVAS.
- Hands-on lab: Carrying out a penetration test on a virtual machine.
- Objective: Learn to secure applications and databases against attacks.
- Main web app vulnerabilities: SQL Injection, XSS, CSRF, etc.
- OWASP Top 10: Analysis and prevention of critical vulnerabilities.
- Application testing tools: Burp Suite, OWASP ZAP.
- Database access controls: Authentication, authorizations.
- Encryption of sensitive data in databases.
- Hands-on lab: Securing a database against attacks.
- Objective: Prepare for future evolutions in cybersecurity and understand the latest trends in the field.
- Securing Cloud environments (AWS, Azure, Google Cloud).
- Securing IoT devices and associated challenges.
- Emerging threats in cloud and IoT.
- Cybersecurity certifications: CISSP, CISM, CompTIA Security+, etc.
- The skills required to grow in cybersecurity.
- Discussion on career paths and preparation for advanced roles (CTO, CISO).
- Comprehensive and Progressive Program: A well-defined structure from fundamentals to advanced applications for deep understanding.
- Practical and Contextual Approach: Numerous hands-on workshops let participants use tools and models in real contexts.
- Expertise with Cutting-Edge Tools: Use of the most current and relevant frameworks and platforms.
- Development of a Real Project: A full day devoted to a capstone project, fostering integration of learning in a practical, professional scenario.
- Ethical and Security Dimension: In-depth reflection on ethical issues, bias, and regulation to ensure responsible use.
- Aligned with Market Needs: Training designed to meet current business needs for innovative, high-performance solutions.
- Support and Guidance: Mentoring by experts and resources to ensure lasting skill development.
- Live demonstrations with cybersecurity services.
- Hands-on workshops and real case studies across various sectors (industry, retail, healthcare).
- Experience feedback: Sharing best practices and common mistakes in companies.
- Simulations and tools: Use of simulators for interactive workshops.
- End-of-course multiple-choice test to assess understanding of the topics covered.
- Practical case studies or group discussions to apply acquired knowledge.
- Continuous assessment during practical sessions.
- Practical Application: A complete project at the end of the modules to consolidate learning.
- Well-Architected Cloud Framework.
- GDPR (General Data Protection Regulation).
- ISO 27001, SOC 2 (Service Organization Control).
- NIST Cybersecurity Framework.
Prerequisites
No specific prerequisites are required. This training is accessible to anyone wishing to discover AWS, but basic knowledge of IT or information systems can be an asset.
Course Outline
Day 1: Introduction to Cybersecurity and Basic Concepts
Course Highlights
Teaching Methods and Tools Used
Assessment
Normative References
Modalities
In-house
The duration and program can be customized according to your company’s specific needs
More details Contact usNext Generation Academy