Les formations Network Security

Les formations Network Security

Cours de formation de Network Security dirigé par un formateur sur place en direct á France.

Nos Clients témoignent

★★★★★
★★★★★

Sous-catégories Network Security

Plans de cours Network Security

Nom du Cours
Durée
Aperçu
Nom du Cours
Durée
Aperçu
14 hours
Aperçu
During the course, participants will learn:

- What is denial of service attacks, Flooding, Sniffing, MIM?
- How to break from the network to the server?
- How to watch packets on the network (also running on switches)?
- Do you watch any combination of the world?
- How to monitor the network?
- How to configure a firewall?
- How to use encrypted connections?
- How to create tunnels?
- How to log packets?
- How to scan ports?
- How to reduce the number of unnecessary services on the server?
14 hours
Aperçu
Since all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
35 hours
Aperçu
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
14 hours
Aperçu
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
35 hours
Aperçu
This instructor-led, live training in France (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
14 hours
Aperçu
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
21 hours
Aperçu
This instructor-led, live training in France (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
14 hours
Aperçu
This instructor-led, live training in France (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.

By the end of this training, participants will be able to:

- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.
21 hours
Aperçu
This instructor-led, live training in France (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.

By the end of this training, participants will be able to:

- Install and configure the preferred FortiGate NGFW software and hardware model.
- Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
- Manage various forms of external and internal threats using FortiGate features.
- Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
- Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
- Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
- Implement Fortinet security solutions in other enterprise applications.

Prochains cours Network Security

Weekend Network Security cours, Soir Network Security formation, Network Security stage d’entraînement, Network Security formateur à distance, Network Security formateur en ligne, Network Security formateur Online, Network Security cours en ligne, Network Security cours à distance, Network Security professeur à distance, Network Security visioconférence, Network Security stage d’entraînement intensif, Network Security formation accélérée, Network Security formation intensive, Formation inter Network Security, Formation intra Network Security, Formation intra Enteprise Network Security, Formation inter Entreprise Network Security, Weekend Network Security formation, Soir Network Security cours, Network Security coaching, Network Security entraînement, Network Security préparation, Network Security instructeur, Network Security professeur, Network Security formateur, Network Security stage de formation, Network Security cours, Network Security sur place, Network Security formations privées, Network Security formation privée, Network Security cours particulier, Network Security cours particuliers

Réduction spéciale

Newsletter offres spéciales

Nous respectons le caractère privé de votre adresse mail. Nous ne divulguerons ni ne vendrons votre adresse email à quiconque
Vous pouvez toujours modifier vos préférences ou vous désinscrire complètement.

Nos clients

is growing fast!

Nous recherchons des formateurs alliant compétences techniques et savoir-être en France!

En tant que formateur NobleProg, vous serez responsable de :

  • délivrer des formations dans le monde entier
  • préparer les supports de cours
  • apporter des améliorations au fil des formations
  • fournir des prestations de conseil

Pour le moment, nous nous concentrons sur les domaines suivants :

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • Si vous avez de la patience et de l'empathie pour les personnes que vous formez, vous êtes fait pour rejoindre NobleProg.

Pour postuler, veuillez s'il vous plaît créer votre profil formateur en cliquant sur le lien ci-dessous :

Postuler ici

This site in other countries/regions