Unlock the potential of generative AI across all your managerial functions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This advanced cybersecurity training is designed for professionals aiming to master key concepts in Information Systems Governance (GISA), Incident Detection and Response (SAD), Network and DNS Security, and national cybersecurity strategy (DSR). It blends theory, hands-on labs, real-world case studies, and certification preparation.

Who is this training for ?

For whom ?

  • Information Systems Security Managers (ISSM).
  • System and Network Administrators.
  • Cybersecurity Consultants.
  • SOC / CERT Analysts.
  • Professionals transitioning into cybersecurity roles.

Prerequisites

  • Basic knowledge of networking (TCP/IP, DNS), OS (Linux/Windows), and security (firewall, IDS).
  • Familiarity with ISO 27001 and SIEM tools recommended.

Training objectives

  • Understand the strategic challenges of information systems security
  • Master tools for monitoring, alerting, and incident response
  • Secure networks, DNS services, and critical applications
  • Apply best practices in governance and risk management
  • Prepare participants for industry-recognized cybersecurity certifications
  • Training program

      • Key principles: confidentiality, integrity, availability, resilience, and privacy protection.
      • Aligning cybersecurity with business objectives.
      • Information security governance frameworks (ISO 27001, NIST CSF, CIS Controls, SOC2).
      • Risk management: EBIOS, threat modeling, and mapping.
      • Regulatory compliance: GDPR, ISO standards, legal frameworks.
      • Cybersecurity KPIs and executive dashboards.
      • SOC roles and maturity models (SOC-CMM, MITRE D3FEND).
      • Telemetry and data collection: logs, network flows, endpoints, cloud.
      • Monitoring tools: Zeek, Suricata, Sysmon.
      • Detection engineering and alert tuning (MITRE ATT&CK, Indicators of Compromise).
      • SIEM/SOAR platforms: integrations with Splunk, Sentinel, Elastic.
      • Red Team, Blue Team, and Purple Team collaboration.
      • Cyber Threat Intelligence and adversary emulation.
      • Full incident response lifecycle: identification, containment, eradication, recovery.
      • Playbook and runbook development based on NIST, SANS, ISO 27035.
      • Case studies: ransomware, insider threats, supply chain attacks.
      • Basics of forensics and chain of custody.
      • Business continuity and cyber resilience planning.
      • Crisis communication and stakeholder reporting.
      • Network security: segmentation, VPN, IPsec, TLS, next-gen firewalls.
      • DNS security: DNSSEC, filtering, DDoS protection.
      • Vulnerability management: patching, scanning, lifecycle management.
      • Application security: OWASP Top 10, API security, SSRF.
      • Cloud security and hybrid workload protection.
      • Zero Trust principles, architecture, and implementation.
      • Identity and Access Management (IAM), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Entra ID.
      • Secure Software Development Lifecycle (Secure SDLC).
      • Data protection strategies: Data Loss Prevention (DLP), encryption, tokenization.
      • Advanced threat awareness: AI-related threats, insider risks, sophisticated ransomware.
    • 305
    • 35 h

    Submit your review

    Translated By Google Translate