Leader in the cybersecurity training sector.

Courses

ACG CyberAcademy offers you its expertise in digital technology and cyber security.

Career opportunities in a field where there is a shortage of talent.

SOC Analyst pathway

The SOC (Security Operations Centre) Analyst programme consists of the following modules:

Chapter 1: Introduction to cyber security

Chapter 2: Monitoring and detection

Chapter 3: Threat Analysis

Chapter 4: Tools and Technologies

Chapter 5: Security Incident Management

Chapter 6: Containment and eradication

Chapter 7: Threat prevention

Chapter 8: Continuous improvement

Practical Exercises And Training Scenarios

GRC Consultant pathway

The GRC (Governance Risk Compliance) Consultant programme consists of the following modules:

Chapter 1: Introduction to Governance, Risk and Compliance (GRC)

Chapter 2: CRM reference frameworks

Chapter 3: Risk identification and assessment

Chapter 4: Risk mitigation

Chapter 5: Regulatory compliance

Chapter 6: Compliance management programme

Chapter 7: Corporate governance

Chapter 8: Ethics in business

Practical exercises and case studies

Cybersecurity Consultant pathway

The Cybersecurity Consultant programme consists of the following modules:

Chapter 1: Introduction to cyber security

Chapter 2: The basics of digital security

Chapter 3: Network traffic translation and filtering

Chapter 4: Firewalls and security architectures

Chapter 5: VPN, IDS/IPS and Wireless Network Security

Chapter 6: Exchange security and cryptography

Chapter 7: Fundamental Concepts of Application Security and OWASP

Chapter 8: Managing cyber security within an organisation

Chapter 9: The challenges and risks associated with personal data management

Cloud Security Consultant pathway

The Cloud Security Consultant programme consists of the following modules:

Datacenter Security Consultant

The Datacenter Security Consultant programme consists of the following modules:

System and network security - The basics

The Systems and Network Security Consultant programme consists of the following modules:

Introduction to IT security

10-day cycle - 70h 

  • What is IT security?
  • How can negligence create a disaster?
  • Everyone's responsibilities.
  • IS architecture and potential vulnerabilities.
  •  Company networks (local, remote, Internet).
  •  - Wireless networks and mobility. High-risk applications: Web, messaging, etc.
  • The database and file system. Threats and risks.
  • The sociology of pirates. Underground networks. Motivations.
  • Confidentiality, signature and integrity. Encryption constraints.
  • The different cryptographic elements. Windows, Linux or MAC OS: which is the most secure?
  • Management of sensitive data. Laptop issues.
  • The different threats to the client workstation? Understanding malicious code.
  • How do you manage security breaches?
  • USB ports. The role of the client firewall.
  • Access controls: authentication and authorisation.
  • The importance of authentication.
  • The traditional password. - Certificate and token authentication.
  • Remote connection via the Internet.
  • What is a VPN?
  • Why use strong authentication?
  • The definition of risk and its characteristics: potential, impact, seriousness.
  • The different types of risk: accident, error, malicious intent.
  • DIC classification: Availability, Integrity and Confidentiality of information.
  • Risk management countermeasures: prevention, protection, risk transfer, outsourcing.
  • The definition of risk and its characteristics: potential, impact, seriousness.
  • The different types of risk: accident, error, malicious intent.
  • DIC classification: Availability, Integrity and Confidentiality of information.
  • Risk management countermeasures: prevention, protection, risk transfer, outsourcing.
  • What are the role and responsibilities of the IS Security Manager?
  • Towards a safety organisation, the role of the Assets Owners.
  • How to implement optimal management of the means and resources allocated.
  • The Risk Manager in the company, his role in relation to the IS Security Manager.
  • SOX, COSO and COBIT regulations. What for? For whom?
  • Towards Information System Governance. Links with ITIL and CMMI.
  • The ISO 27001 standard in an information security management system approach.
  • Links with ISO 15408: common criteria, ITSEC, TCSEC.
  • The benefits of ISO 27001 certification for organisations.
  • How to set up a risk identification and classification process.
  • Operational, physical and logical risks.
  • How can you build up your own knowledge base of threats and vulnerabilities?
  • Methods and standards: EBIOS (Expression of Requirements and Identification of Security Objectives)/FEROS, MEHARI.
  • The risk analysis approach within the framework of ISO 27001, the PDCA (Plan, Do, Check, Act) approach.
  • What are the contributions of the ISO 27005 standard and changes to French methods?
  • From risk assessment to risk management: best practice.
  • A continuous and comprehensive process.
  • Audit categories, from organisational audits to penetration tests.
  • 19011 best practice applied to safety.
  • How do you create an internal audit programme? How do you qualify your auditors?
  • Comparative contributions, recursive approach, human implications.
  • Safety awareness: who? Who? What? How?
  • Definitions of Morality/Deontology/Ethics.
  • The safety charter, its legal existence, content and validation.
  • Risk coverage and continuity strategy.
  • The importance of contingency, continuity, recovery and crisis management plans, PCA/PRA, PSI, RTO/RPO.
  • Developing a continuity plan and integrating it into a quality approach.
  • How to define safety budgets.
  • The definition of Return On Security Investment (ROSI).
  • What are the cost evaluation techniques, the different calculation methods and the Total Cost of Ownership (TCO)?
  • The Anglo-Saxon concept of the "Payback Period".
  • Selection process for appropriate security solutions for each action.
  • Definition of a target architecture.
  • ISO 15408 as a selection criterion.
  • Content control as a necessity.
  • How do you deploy a PKI project? Pitfalls to avoid.
  • Authentication techniques, SSO projects, identity federation.
  • The security approach in IS projects, the ideal PDCA cycle.
  • How to set up a risk management approach: facts, certainties...
  • What are the key indicators and dashboards? Moving towards an ISO and PDCA approach.
  • Outsourcing: what are the benefits and what are the limits?
  • Reminder, definition of the Automatic Data Processing System (ADPS).
  • Types of infringement, the European context, the LCEN law.
  • What are the legal risks for the company, its managers and the CISO?
  • Protection of personal data, penalties for non-compliance.
  • The use of biometrics in France.
  • Cybersurveillance of employees: limits and legal constraints.
  • Employee rights and employer sanctions
  • Principles of security: defence in depth, security policy.
  • Fundamental concepts: risk, asset, threat, etc.
  • Risk management methods (ISO 27005, EBIOS, MEHARI). Overview of ISO 2700x standards.
  • The evolution of cybercrime. Identifying threat agents.
  • New threats (APT, spear phishing, watering holes, exploit kits, etc.).
  • Software security flaws.
  • The course of a cyber attack (NIST).
  • 0day vulnerabilities, 0day exploits and exploitation kits.
  • Principles of security: defence in depth, security policy.
  • Fundamental concepts: risk, asset, threat, etc.
  • Risk management methods (ISO 27005, EBIOS, MEHARI). Overview of ISO 2700x standards.
  • The evolution of cybercrime. Identifying threat agents.
  • New threats (APT, spear phishing, watering holes, exploit kits, etc.).
  • Software security flaws.
  • The course of a cyber attack (NIST).
  • 0day vulnerabilities, 0day exploits and exploitation kits.
  • Threats to client workstations.
  • The role of the personal firewall and its limitations.
  • Anti-virus/anti-spyware software.
  • Security patches on client workstations.
  • Secure removable devices.
  • Cisco NAC, Microsoft NAP client compliance check.
  • Browser and plug-in vulnerabilities.
  • The main constraints on use and legislation in France and around the world.
  • Cryptographic techniques.
  • Public and symmetric key algorithms.
  • Hash functions. - Public key architectures.
  • NSA and GCHQ cryptanalysis programmes.
  • Biometric authentication and the legal aspects.
  • Challenge/response authentication.
  • Techniques for stealing passwords, brute force, entropy of secrets.
  • Strong authentication.
  • Smart card and X509 client certificate authentication.
  • 3A" architecture: SSO concept, Kerberos.
  • IAM platforms.
  • Identity federation via social network APIs.
  • Identity federation for the enterprise and the Cloud.
  • SSL Crypto API and developments from SSL v2 to TLS v1.3.
  • Attacks on SSL/TLS protocols and HTTPS flows.
  • Hardware key containment, FIPS-140-2 certification.
  • Easily assess the security of an HTTPS server.
  • The IPsec standard, AH and ESP modes, IKE and key management.
  • Overcoming the problems between IPSec and NAT.
  • SSL VPNs. What's the advantage over IPSec?
  • Use of SSH and OpenSSH for secure remote administration.
  • On-the-fly decryption of data flows: legal aspects.
  • Specific WiFi attacks. How can Rogue APs be detected?
  • Terminal security mechanisms.
  • WEP vulnerabilities. Weaknesses in the RC4 algorithm.
  • Description of risks.
  • The IEEE 802.11i security standard. WLAN architecture.
  • Authentication of users and terminals.
  • WiFi authentication in the enterprise.
  • Audit tools, free software, aircrack-ng, Netstumbler, WifiScanner...
  • Threats and attacks on mobility.
  • iOS, Android, Windows mobile: strengths and weaknesses.
  • Viruses and malicious code on mobile phones.
  • MDM and EMM solutions for fleet management.
  • Web and mobile applications: what are the differences in terms of security?
  • The main risks according to OWASP.
  • Focus on XSS, CSRF, SQL injection and session hijacking attacks.
  • The main secure development methods.
  • Security clauses in development contracts.
  • The application firewall or WAF.
  • How do you assess an application's level of security?
  • The Security by Design approach to security assurance.
  • The 7 fundamental principles of Privacy by Design.
  • Privacy taken into account throughout the process.
  • Safety dashboards.
  • Security audits and penetration tests.
  • The legal aspects of penetration testing.
  • IDS probes, VDS scanner, WASS.
  • How do you respond effectively to attacks?
  • Record the evidence.
  • Implement a SIEM solution.
  • ANSSI labels (PASSI, PDIS & PRIS) for outsourcing.
  • How do you react in the event of an intruder?
  • Judicial expertise: the role of a judicial expert (in criminal or civil cases).
  • Private legal expertise
  • OWASP: organisation, chapters, Top10, manuals, tools.
  • Discover the infrastructure and associated technologies, strengths and weaknesses.
  • Client side: clickjacking, CSRF, cookie theft, XSS, components (Flash, Java). New vectors.
  • Server side: authentication, session theft, injections (SQL, LDAP, files, commands).
  • Inclusion of local and remote files, attacks and cryptographic vectors.
  • Evasion and bypassing protection: example of WAF bypass techniques.
  • Burp Suite, ZAP, Sqlmap, BeEF tools.
  • Case studies: Presentation and familiarisation with environments and tools. Implementation of various Web attacks under real conditions on the server and client sides.
  • Operating principles and detection methods.
  • Market players, overview of the systems and applications involved.
  • Network (Nmap) and application (Web applications) scanners.
  • IDS (Intrusion Detection System).
  • The advantages and limitations of these technologies.
  • How should they be positioned in the enterprise architecture?
  • Market overview, detailed study of SNORT.
  • Case study: Presentation and familiarisation with the environments and tools. Installation, configuration and implementation of SNORT, writing attack signatures.
  • The heterogeneity of sources. What is a safety event?
  • Security Event Information Management (SIEM). Events collected from the IS.
  • Equipment system logs (firewalls, routers, servers, databases, etc.).
  • Passive collection in listening mode and active collection.
  • Case study: Log analysis approach. Geolocating an address. Correlating logs from different sources, viewing, sorting and searching for rules.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.