Les formations Maitrise de la sécurité

Les formations Maitrise de la sécurité

Les cours de formation pratique Hands on Security démontrent, par le biais de discussions interactives et pratiques, les principes fondamentaux et les sujets avancés de Hands on Security La formation Hands on Security est disponible sous forme de «formation en direct sur site» ou de «formation en direct à distance» La formation en direct sur site peut être effectuée localement dans les locaux du client France ou dans les centres de formation d'entreprise NobleProg à France La formation en ligne à distance est réalisée au moyen d'un ordinateur de bureau interactif et distant NobleProg Votre fournisseur de formation local.

Machine Translated

Nos Clients témoignent

★★★★★
★★★★★

Plans de cours Maitrise de la sécurité

Nom du Cours
Durée
Aperçu
Nom du Cours
Durée
Aperçu
21 hours
Aperçu
Overview

This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.

Throughout the whole course, participants will gain in-depth knowledge on the following topics:

- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models

After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI).

This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation.

Objectives

To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities.

To give students hands on experience of implementing and using PKI solutions with a variety of applications.

To give students an understanding of the concepts of evaluating and selecting PKI technologies

Audience

Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
35 hours
Aperçu
The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.

The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.

The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
28 hours
Aperçu
Description:

This course will give the participants thorough understanding about security concepts, web application concepts and frameworks used by developers in order to be able to exploit and protect targeted application. In today’s world, that is changing rapidly and thus all the technologies used are also changed at a fast pace, web applications are exposed to hackers attacks 24/7. In order to protect the applications from external attackers one has to know all the bits and pieces that makes the web application, like frameworks, languages and technologies used in web application development, and much more than that. The problem is that attacker has to know only one way to break into the application and developer (or systems administrator) has to know all the possible exploits in order to prevent this from happening. Because of that it is really difficult to have a bullet proof secured web application, and in most of the cases web application is vulnerable to something. This is regularly exploited by cyber criminals and casual hackers, and it can be minimized by correct planning, development, web application testing and configuration.

Objectives:

To give you the skill and knowledge needed to understand and identify possible exploits in live web applications, and to exploit identified vulnerabilities. Because of the knowledge gained through the identification and exploitation phase, you should be able to protect the web application against similar attacks. After this course the participant will be able to understand and identify OWASP top 10 vulnerabilities and to incorporate that knowledge in web application protection scheme.

Audience:

Developers, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Banking, Insurance and other professionals, Government agencies, IT managers, CISO’s, CTO’s.
21 hours
Aperçu
As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Learn about Node.js security
- Learn about MongoDB security
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand security concepts of Web services
- Learn about JSON security
- Get practical knowledge in using security testing techniques and tools
- Learn how to handle vulnerabilities in the used platforms, frameworks and libraries
- Get sources and further readings on secure coding practices
21 hours
Aperçu
Cette formation en direct, animée par un instructeur, présente les problèmes d'architecture, de système d'exploitation, de réseau, de stockage et de cryptographie à prendre en compte lors de la conception de systèmes intégrés sécurisés.

À la fin de ce cours, les participants auront une solide compréhension des principes, des préoccupations et des technologies de sécurité. Plus important encore, les participants disposeront des techniques nécessaires pour développer des logiciels intégrés sûrs et sécurisés.

Format du cours

- Conférence interactive et discussion.
- Beaucoup d'exercices et de pratique.
- Mise en œuvre pratique dans un environnement de laboratoire réel.

Options de personnalisation du cours

- Pour demander une formation personnalisée pour ce cours, veuillez nous contacter pour organiser cela.
14 hours
Aperçu
Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.

By the end of this training, participants will be able to:

- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection

Audience

- DevOps engineers
- Security engineers
- Developers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
Aperçu
Apache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management.

In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.

By the end of this training, participants will be able to:

- Use Shiro's API to secure various types of applications, including mobile, web and enterprise
- Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.

Audience

- Developers
- Security engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
35 hours
Aperçu


Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals
35 hours
Aperçu
Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
42 hours
Aperçu
This instructor-led, live training in France (online or onsite) is aimed at SysAdmins, systems engineers, security architects, and security analysts who wish to write, execute, and deploy PowerShell scripts and commands to automate Windows security management in their organization.

By the end of this training, participants will be able to:

- Write and execute PowerShell commands to streamline Windows security tasks.
- Use PowerShell for remote command execution to run scripts on thousands of systems across an organization.
- Configure and harden Windows Server and Windows Firewall to protect systems from malware and attacks.
- Manage certificates and authentication to control user access and activity.

Prochains cours Maitrise de la sécurité

Weekend Maitrise de la sécurité cours, Soir Maitrise de la sécurité formation, Maitrise de la sécurité stage d’entraînement, Maitrise de la sécurité formateur à distance, Maitrise de la sécurité formateur en ligne, Maitrise de la sécurité formateur Online, Maitrise de la sécurité cours en ligne, Maitrise de la sécurité cours à distance, Maitrise de la sécurité professeur à distance, Maitrise de la sécurité visioconférence, Maitrise de la sécurité stage d’entraînement intensif, Maitrise de la sécurité formation accélérée, Maitrise de la sécurité formation intensive, Formation inter Maitrise de la sécurité, Formation intra Maitrise de la sécurité, Formation intra Enteprise Maitrise de la sécurité, Formation inter Entreprise Maitrise de la sécurité, Weekend Maitrise de la sécurité formation, Soir Maitrise de la sécurité cours, Maitrise de la sécurité coaching, Maitrise de la sécurité entraînement, Maitrise de la sécurité préparation, Maitrise de la sécurité instructeur, Maitrise de la sécurité professeur, Maitrise de la sécurité formateur, Maitrise de la sécurité stage de formation, Maitrise de la sécurité cours, Maitrise de la sécurité sur place, Maitrise de la sécurité formations privées, Maitrise de la sécurité formation privée, Maitrise de la sécurité cours particulier, Maitrise de la sécurité cours particuliers

Réduction spéciale

Newsletter offres spéciales

Nous respectons le caractère privé de votre adresse mail. Nous ne divulguerons ni ne vendrons votre adresse email à quiconque
Vous pouvez toujours modifier vos préférences ou vous désinscrire complètement.

Nos clients

is growing fast!

Nous recherchons des formateurs alliant compétences techniques et savoir-être en France!

En tant que formateur NobleProg, vous serez responsable de :

  • délivrer des formations dans le monde entier
  • préparer les supports de cours
  • apporter des améliorations au fil des formations
  • fournir des prestations de conseil

Pour le moment, nous nous concentrons sur les domaines suivants :

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • Si vous avez de la patience et de l'empathie pour les personnes que vous formez, vous êtes fait pour rejoindre NobleProg.

Pour postuler, veuillez s'il vous plaît créer votre profil formateur en cliquant sur le lien ci-dessous :

Postuler ici

This site in other countries/regions