As certificações seguintes da área de redes e cibersegurança correspondem a diversas formações. Alguns desses cursos fazem parte da formação de Responsável Segurança de SI da Openclassrooms.
Networks for dummies (30h)
- OSI model
- Network protocols
- Subnetting
- CIDR
- IPV6
- Routing
- DHCP
- Security
Control your applications and TCP/IP networks (15h)
- Packet fragmentation
- Port scan and attack by idle port scan (zombie)
- TCP connections tracking and blind ip spoofing attack
- Knowing all the mail protocols and create your own mail management solution
Learn TCP/IP networks management (15h)
- Complete course on network theory at all levels of the OSI scheme
- Network security at levels 2, 3 and 4 of the OSI layers and use of standard network diagnostic tools; approach to hacking possibilities (usurpation with ARP cache poisonning, network scanning)
- Creation of complete small company networks and network services such as DHCP, DNS, Routers, web servers
Free Cisco CCNA and CCNP Remote Labs! Free Cisco VIRL labs! (6h)
- How to access CISCO network simulation environments for free with CISCO material
Keep control with Linux (30h)
- Part 1 – Discover and install Linux
- Part 2 – Handling the console and files
- Part 3 – Controlling Data Processes and Flows
- Part 4 – Transfer data across the network
- Part 5 – Automate your tasks with Bash scripts
Simulate and design networks models with GNS3 (6h)
- Analyze a manufacturer’s document
- Test a network architecture by manipulating the components
- Identify and choose an IOS according to the project
- Deploy the GNS3 network simulator to create, simulate and test the functioning of your networks and systems
- Master the operation of network and systems virtualization
- Virtual supply of IT equipment and configuration (cables, switch, router …)
- Interconnect computer, switch and router equipment using appropriate cables to network them
- Design an infrastructure based on the needs of your project
Secure your infrastructures (10h)
- Secure the architecture of your information system
- Partition and filter a network
- Secure Active Directory
- Secure Windows and Linux systems
- Secure the network system with OpenSSH
Centralize and secure your Active Directory (8h)
- Planning the use of a single directory of resources
- Design a company’s resource directory
- Install a company directory
- Secure directory management and access
- Centralize the configuration of a company’s resources
Introduction to Packet Tracer (10h)
- Simulate data interactions traveling through a network.
- Visualize the network in both logical and physical modes.
- Apply skills through practice, using labs and Cisco Packet Tracer activities.
- Develop critical thinking and problem-solving skills.
Get started with Windows Server 2019 (12h)
- Install and administer the relevant version according to your Windows Server context
- Install and configure Windows Server roles and their associated features
- Manage advanced services
- Setting up Windows Server in a professional context
Administer a network architecture with CISCO (12h)
- Connect and configure Cisco hardware for the network
- Configure VLANs to segment the network
- Set up protocols for the LAN
- Interconnect and configure Cisco routers (OSPF, EIGRP)
- Set up security on routers
- Manage network access using the RADIUS server
Conduct a penetration test (8h)
- Define an intrusion test (or pentest)
- Select a type of penetration test according to the need
- Scan the vulnerabilities of a computer system
- Perform a penetration test
- Suggest corrective solutions
- Write and present a penetration test report
Metasploit Unleashed (30h)

We are proud to present the most complete and in-depth Metasploit guide available, with contributions from the authors of the No Starch Press Metasploit Book. This course is a perfect starting point for Information Security Professionals who want to learn penetration testing and ethical hacking, but are not yet ready to commit to a paid course. We will teach you how to use Metasploit, in a structured and intuitive manner. Additionally, this free online ethical hacking course makes a wonderful quick reference for penetration testers, red teams, and other security professionals.
Ethical Hacking (20h)
Course from Michael Whittle : Network Architect.
Certification Cisco CCNA Routing&Switching (R&S)
Cisco Certified Network Associate (10h)
- Medium Network Scalability Implementation
- Troubleshoot VLAN connectivity.
- Create redundant switched topologies.
- Improve redundant switched topologies with EtherChannels. Level 3 redundancy.
- Implement scalability for medium-sized networks.
- Troubleshoot IPv4 network connectivity.
- Troubleshoot IPv6 network connectivity.
- Implementation of an EIGRP architecture. Implement EIGRP.
- Troubleshoot EIGRP.
- Implement EIGRP for IPv6.
- Implementation of a multi-area OSPF architecture.
- Presentation of the OSPF architecture.
- Implement OSPF IPv4.
- Troubleshoot an OSPFv3 multi-area OSPF architecture.
- WAN networks.
- WAN Technologies.
- Configure Point to Point protocols.
- Configure GRE tunnels.
- Configure Single-Homed EBGP.
- Network device management.
- Implement the management and security of basic network devices.
- Evolution of smart grids. Introduction to QoS..
Kaspersky Security Certifications (100h)
Certification – Certified Professional: KUMA (034.2.1)
- Validates expertise in Kaspersky Unified Monitoring and Analysis (KUMA) platform.
- Demonstrates ability to deploy, configure, and manage monitoring solutions for security event analysis and threat detection
Certification – Certified Professional Kaspersky Endpoint Security and Management (002.12.1)
- Confirms proficiency in Kaspersky Endpoint Security deployment, configuration, and lifecycle management.
- Includes skills in policy management, endpoint protection optimization, and threat remediation.
Certification – System Engineer Kaspersky Security Center Systems Management (009.12)
- Recognizes advanced technical skills in Kaspersky Security Center.
- Covers centralized security administration, network inventory, automated software deployment, and update management.
Qualys Cloud Agent Certification (20h)
- The Qualys Cloud Agent certification verifies a – professional’s ability to deploy and manage the Qualys Cloud Agent. It covers:
- Deployment: Installing agents on various operating systems.
- Integration: Using agents with Qualys modules like VMDR, PC, FIM, and CSAM.
- Maintenance: Configuring and troubleshooting the agent.