The tender is made up of 7 lots relating to the main themes in cybersecurity. The detail of training by batch is explained in part B “technical contract clauses”. for tender documentation fill the form below, free for a limited time:
LOT 1 – INCIDENT RESPONSE MANAGEMENT TRAINING – IRMT
Managing information security incidents is the raison d’être of a cyber emergency team. All training work therefore begins with learning a solid foundation in the subject. Here are the 4 subjects for which the service provider must offer lessons:
Basic Techniques
Continuous monitoring
Threat Hunting
SIEM Operation
LOT 2 – NETWORK TRAFFIC ANALYSIS TRAINING – NTAT
The internet is a network of networks. The existence of a security incident almost implies systematically from network traffic.
Here are the 3 subjects for which the service provider must offer lessons:
Network Traffic Analysis
Intrusion Detection
Network Forensics
LOT 3 – FORENSICS ANALYSIS TRAINING – FAT
“Forensics” (computer forensic investigation) is the art of collecting and interpreting traces
of an incident. It requires advanced knowledge about how the systems work.
exploitation, techniques for exploiting software weaknesses, and malware dissection in order to
to understand its functionalities.
Here are the 4 subjects for which the service provider must offer lessons:
Windows Forensic Analysis
Linux Forensics Analysis
Mac Forensics Analysis
Mobile Forensics Analysis
Malware Analysis
Memory Forensics
LOT 4 – CYBER THREAT INTELLIGENCE TRAINING – CTIT
Threats are constantly evolving: Hackers are finding new ways to exploit weaknesses systems, and new types of systems are released every year. The threat study is all the skills that make it possible to follow these developments. Here is the subject for which the service provider should offer lessons:
Cyber Threat Intelligence
LOT 5 – PENETRATION TESTING AND OFFENSIVE SECURITY TRAINING – PTOST
By carrying out a penetration test, a company or an institution allows professionals to attempt to penetrate its systems, so as to establish their level of security. It is a task of essential prevention that CERT. Here are the 4 subjects for which the service provider must offer lessons:
Network Penetration Testing
Vulnerability Assessment
Web-app Penetration Testing
Ethical Hacking
LOT 6 – CLOUD SECURITY TRAINING – CST
Here are the 2 subjects for which the service provider must offer lessons:
Cloud Basics
Cloud Penetration Testing
LOT 7 – INDUSTRIAL CONTROL SYSTEMS SECURITY TRAINING – ICSST
Here are the 2 subjects for which the service provider must offer lessons:
ICS / SCADA Basics
ICS / SCADA Incident Response
Comments are closed, but trackbacks and pingbacks are open.