Highly skilled employ­ees are the key factor in the avail­ab­il­ity, reli­ab­il­ity and pro­ductiv­ity of mod­ern IT infra­struc­tures. In this con­text, a com­plete and con­tinu­ous train­ing pro­gram is the guar­an­tee of the sus­tain­ab­il­ity of a com­pany.


IN1.01 - Fortinet (Fortigate)

Deploy­ment and admin­is­tra­tion of Fortin­et FortiG­ate equip­ment. This course provides a found­a­tion for Fortin­et First Level Cer­ti­fic­a­tion: Fortin­et Cer­ti­fied Net­work Secur­ity Admin­is­trat­or (FCNSA).

IN1.02 - Fortinet avanced

This course intro­duces some of the advanced fea­tures of Fortinet’s FortiG­ate equip­ment. This hands-on course focuses on areas such as IPSec, Advanced Rout­ing (Dynam­ic), IPv6, HA.

IN2.01 - Security Linux 1

Based on the GNU /​ Linux dis­tri­bu­tions of the Red­Hat and Debi­an fam­il­ies. The object­ive of this train­ing is to present an over­view of exist­ing secur­ity tech­niques, best prac­tices and evol­u­tions of these in these two cat­egor­ies of Linux OS. The use of SELinux and oth­er Man­dat­ory Access Con­trol (MAC) sub­sys­tems is quickly over­flowed, with a focus on tra­di­tion­al tools and sys­temd.

IN2.02 - Security Linux 2

Based on the CentOS7 dis­tri­bu­tion (derived from Red­Hat). This train­ing presents the oper­a­tion and use of the SELinux tar­geted mode, includ­ing the cre­ation and use of cus­tom policies. The use of cgroups and LXC con­tain­ers is also covered, as well as the block­ing of access by fire­walling. A quick over­view presents the SELinux mls mode and its object­ives.

IN3.01 - Microsoft PKI

This course presents the basics of set­ting up a PKI infra­struc­ture in a Microsoft Win­dows envir­on­ment. After review­ing the basics of cer­ti­fic­ates, the train­ing will focus on the con­fig­ur­a­tion and the use of a PKI through sev­er­al con­crete cases (Set­ting up a PKI, the gen­er­a­tion of cer­ti­fic­ates, cli­ent authen­tic­a­tion and machine, admin­is­tra­tion, …). The prac­tice will not be for­got­ten with demon­stra­tions and exer­cises in vir­tu­al­ized envir­on­ments to illus­trate the whole thing.


HA1.01 - Attack of Web Applications 1

The pur­pose of this course is to pre­pare the par­ti­cipant not only to test the secur­ity of a Web applic­a­tion, but also to cor­rect the most com­mon flaws.The meth­od­o­logy of ana­lyz­ing a web­site is developed by focus­ing first on the iden­ti­fic­a­tion of sys­tems and entry points, then on the exploit­a­tion of breaches like SQL injec­tions or Cross-Site Script­ing.

HA1.02 - Attack of Web Applications 2

This course is a logic­al con­tinu­ation of HA1.01.It takes some con­cepts and pushes them fur­ther to show that exploit­ing a vul­ner­ab­il­ity often not only com­prom­ises an applic­a­tion, but in some cases the entire infra­struc­ture host­ing it.The course ana­lyzes both serv­er-side attacks, such as XML eXtern­al Entit­ies, Loc­al File Inclu­sion, or oth­er weak encryp­tion issues, as well as cli­ent-side attacks to bypass the browser’s “Same Ori­gin Policy”.

HA2.01 - Attack of Windows environments

This course presents the fea­tures of the Win­dows sys­tem secur­ity mod­el as well as the most com­mon attacks against enter­prise envir­on­ments. Demon­stra­tions and exer­cises allow par­ti­cipants to bet­ter under­stand how these attacks work and – by exten­sion – how to pro­tect them effect­ively.

HA3.01 - Exploitation of memory corruptions (Linux)

This train­ing addresses memory cor­rup­tion flaws in nat­ive Linux-based programs.After a review of the basics of the x86 assem­bler and intro­duc­tion to the struc­ture of pro­grams in memory, par­ti­cipants will learn how to cre­ate their own shellcode and then exploit the tra­di­tion­al vul­ner­ab­il­it­ies (buf­fer over­flows, heap over­flows, use-after-free, …).The mod­ern pro­tec­tion meas­ures (ASLR /​ PIE, NX, SSP, RELRO, x64 …) are intro­duced gradu­ally, as well as the means of cir­cum­ven­tion such as Return Ori­ented Pro­gram­ming.

HA4.01 - Advanced use of Metasploit

This train­ing cov­ers the bases of Metas­ploit to quickly pass on the more advanced (but some­times unknown) tech­niques of this frame­work. Learn how to build HTTP and HTTPS pay­loads, evade anti­vir­us and bypass proxy authen­tic­a­tion. Use meterpret­er to rotate through a machine, use Metas­ploit as a proxy serv­er and many more fea­tures.


FOR1.01 - incident Response 1

This train­ing aims to present meth­ods and tools to be used to invest­ig­ate a secur­ity incid­ent. Covered top­ics includes the acquis­i­tion of hard disks, retriev­al of inform­a­tion, cre­ation of chro­no­lo­gies of events. This intens­ive train­ing is mainly prac­tic­al with many labs based on free tools. It intro­duces all the basics needed to under­stand the forensic of Win­dows sys­tems.

FOR1.02 - Incident Response 2

This train­ing aims to present meth­ods and tools to be used to invest­ig­ate a secur­ity incid­ent. It fol­lows the Level 1 train­ing and dis­cusses advanced tech­niques such as resus­cit­a­tion of Win­dows sys­tems from hard disk images and RAM ana­lys­is. This intens­ive train­ing is mainly prac­tic­al with many labs based on free and com­mer­cial tools.It focuses on com­pre­hens­ive case stud­ies and a pro­fes­sion­al forensic approach to Win­dows sys­tems.

FOR2.01 - Incident management policy

Incid­ent response is not just about tools and tech­niques. A large part is real­ized upstream by pre­par­ing the pro­ced­ures and know­ing the actions to real­ize. The aim of this train­ing is to present best prac­tices regard­ing incid­ent man­age­ment as well as recom­mend­a­tions for dif­fer­ent scen­ari­os.


AW1.01 - Users Awareness

The most com­plex secur­ity meas­ures can usu­ally be foiled by attack­ing the weak­est link in the secur­ity of your inform­a­tion sys­tem: the user. This train­ing, based on demon­stra­tions and con­crete examples, aims to give good reflexes to users. The con­tent of the train­ing can be adap­ted to match your expect­a­tions: social engin­eer­ing, mali­cious code, social net­work­ing, mobile users, mobile devices, MiTM attacks, etc …

AW1.02 - Developer Awareness (OWASP TOP 10)

Dis­cov­er the TOP10 of OWASP risks, tips and solu­tions to reduce them.