Responsável Segurança de SI

As certificações seguintes da área de redes e cibersegurança correspondem a diversas formações. Alguns desses cursos fazem parte da formação de Responsável Segurança de SI da Openclassrooms.

Networks for dummies (30h)

  • OSI model
  • Network protocols
  • Subnetting
  • CIDR
  • IPV6
  • Routing
  • DHCP
  • Security

Control your applications and TCP/IP networks (15h)

  • Packet fragmentation
  • Port scan and attack by idle port scan (zombie)
  • TCP connections tracking and blind ip spoofing attack
  • Knowing all the mail protocols and create your own mail management solution

Learn TCP/IP networks management (15h)

  • Complete course on network theory at all levels of the OSI scheme
  • Network security at levels 2, 3 and 4 of the OSI layers and use of standard network diagnostic tools; approach to hacking possibilities (usurpation with ARP cache poisonning, network scanning)
  • Creation of complete small company networks and network services such as DHCP, DNS, Routers, web servers

Udemy logocisco logo Free Cisco CCNA and CCNP Remote Labs! Free Cisco VIRL labs! (6h)

  • How to access CISCO network simulation environments for free with CISCO material

Linux logo Keep control with Linux (30h)

  • Part 1 – Discover and install Linux
  • Part 2 – Handling the console and files
  • Part 3 – Controlling Data Processes and Flows
  • Part 4 – Transfer data across the network
  • Part 5 – Automate your tasks with Bash scripts

logo GNS3 Simulate and design networks models with GNS3 (6h)

  • Analyze a manufacturer’s document
  • Test a network architecture by manipulating the components
  • Identify and choose an IOS according to the project
  • Deploy the GNS3 network simulator to create, simulate and test the functioning of your networks and systems
  • Master the operation of network and systems virtualization
  • Virtual supply of IT equipment and configuration (cables, switch, router …)
  • Interconnect computer, switch and router equipment using appropriate cables to network them
  • Design an infrastructure based on the needs of your project

Secure your infrastructures (10h)

  • Secure the architecture of your information system
  • Partition and filter a network
  • Secure Active Directory
  • Secure Windows and Linux systems
  • Secure the network system with OpenSSH

Centralize and secure your Active Directory (8h)

  • Planning the use of a single directory of resources
  • Design a company’s resource directory
  • Install a company directory
  • Secure directory management and access
  • Centralize the configuration of a company’s resources

cisco logo Introduction to Packet Tracer (10h)

  • Simulate data interactions traveling through a network.
  • Visualize the network in both logical and physical modes.
  • Apply skills through practice, using labs and Cisco Packet Tracer activities.
  • Develop critical thinking and problem-solving skills.

Get started with Windows Server 2019 (12h)

  • Install and administer the relevant version according to your Windows Server context
  • Install and configure Windows Server roles and their associated features
  • Manage advanced services
  • Setting up Windows Server in a professional context

Administer a network architecture with CISCO (12h)

  • Connect and configure Cisco hardware for the network
  • Configure VLANs to segment the network
  • Set up protocols for the LAN
  • Interconnect and configure Cisco routers (OSPF, EIGRP)
  • Set up security on routers
  • Manage network access using the RADIUS server

Conduct a penetration test (8h)

  • Define an intrusion test (or pentest)
  • Select a type of penetration test according to the need
  • Scan the vulnerabilities of a computer system
  • Perform a penetration test
  • Suggest corrective solutions
  • Write and present a penetration test report

Metasploit Unleashed (30h)

Metasploit Unleashed - Free Ethical Hacking Security Training

We are proud to present the most complete and in-depth Metasploit guide available, with contributions from the authors of the No Starch Press Metasploit Book. This course is a perfect starting point for Information Security Professionals who want to learn penetration testing and ethical hacking, but are not yet ready to commit to a paid course. We will teach you how to use Metasploit, in a structured and intuitive manner. Additionally, this free online ethical hacking course makes a wonderful quick reference for penetration testers, red teams, and other security professionals.

Ethical Hacking (20h)

Course from Michael Whittle : Network Architect.

Certification Cisco CCNA Routing&Switching (R&S)
Cisco Certified Network Associate
(10h)

  • Medium Network Scalability Implementation
  • Troubleshoot VLAN connectivity.
  • Create redundant switched topologies.
  • Improve redundant switched topologies with EtherChannels. Level 3 redundancy.
  • Implement scalability for medium-sized networks.
  • Troubleshoot IPv4 network connectivity.
  • Troubleshoot IPv6 network connectivity.
  • Implementation of an EIGRP architecture. Implement EIGRP.
  • Troubleshoot EIGRP.
  • Implement EIGRP for IPv6.
  • Implementation of a multi-area OSPF architecture.
  • Presentation of the OSPF architecture.
  • Implement OSPF IPv4.
  • Troubleshoot an OSPFv3 multi-area OSPF architecture.
  • WAN networks.
  • WAN Technologies.
  • Configure Point to Point protocols.
  • Configure GRE tunnels.
  • Configure Single-Homed EBGP.
  • Network device management.
  • Implement the management and security of basic network devices.
  • Evolution of smart grids. Introduction to QoS..