cyber training

Belgium: Tender for Advanced Training for Cybersecurity Analysts

The tender is made up of 7 lots relating to the main themes in cybersecurity. The detail of training by batch is explained in part B “technical contract clauses”. for tender documentation fill the form below, free for a limited time:


LOT 1 – INCIDENT RESPONSE MANAGEMENT TRAINING – IRMT
Managing information security incidents is the raison d’être of a cyber emergency team. All training work therefore begins with learning a solid foundation in the subject. Here are the 4 subjects for which the service provider must offer lessons:
 Basic Techniques
 Continuous monitoring
 Threat Hunting
 SIEM Operation


LOT 2 – NETWORK TRAFFIC ANALYSIS TRAINING – NTAT
The internet is a network of networks. The existence of a security incident almost implies systematically from network traffic.
Here are the 3 subjects for which the service provider must offer lessons:
 Network Traffic Analysis
 Intrusion Detection
 Network Forensics


LOT 3 – FORENSICS ANALYSIS TRAINING – FAT
“Forensics” (computer forensic investigation) is the art of collecting and interpreting traces
of an incident. It requires advanced knowledge about how the systems work.
exploitation, techniques for exploiting software weaknesses, and malware dissection in order to
to understand its functionalities.
Here are the 4 subjects for which the service provider must offer lessons:
 Windows Forensic Analysis
 Linux Forensics Analysis
 Mac Forensics Analysis
 Mobile Forensics Analysis
 Malware Analysis
 Memory Forensics

LOT 4 – CYBER THREAT INTELLIGENCE TRAINING – CTIT
Threats are constantly evolving: Hackers are finding new ways to exploit weaknesses systems, and new types of systems are released every year. The threat study is all the skills that make it possible to follow these developments. Here is the subject for which the service provider should offer lessons:
 Cyber ​​Threat Intelligence

LOT 5 – PENETRATION TESTING AND OFFENSIVE SECURITY TRAINING – PTOST
By carrying out a penetration test, a company or an institution allows professionals to attempt to penetrate its systems, so as to establish their level of security. It is a task of essential prevention that CERT. Here are the 4 subjects for which the service provider must offer lessons:
 Network Penetration Testing
 Vulnerability Assessment
 Web-app Penetration Testing
 Ethical Hacking

LOT 6 – CLOUD SECURITY TRAINING – CST
Here are the 2 subjects for which the service provider must offer lessons:
 Cloud Basics
 Cloud Penetration Testing


LOT 7 – INDUSTRIAL CONTROL SYSTEMS SECURITY TRAINING – ICSST
Here are the 2 subjects for which the service provider must offer lessons:
 ICS / SCADA Basics
 ICS / SCADA Incident Response

Comments are closed, but trackbacks and pingbacks are open.