Leader in the cybersecurity training sector.

DTISI Certification Pathway:
Detecting and Handling IT Security Incidents

Reference: DTISI

Duration: 23 days (161 hours)

Cost : 14 490 € HT

Category: 
Computer security

Our in-company training courses are customised, flexible and tailored to the specific needs of your team.

This certification training program lasts 23 days (161 hours) over approximately 4 months. The DTISI pathway prepares participants to identify, analyze, and manage incidents within a SOC or CERT. The program combines in-depth theory, immersive practical exercises, and crisis management simulations, validated through a final role-play and an oral defense before a panel.

TARGET AUDIENCE

SOC analysts, security technicians, incident management experts, CERT team coordinators.

Objectives

  • Master the fundamental concepts and stakeholders in cybersecurity.
  • Identify and analyze attack vectors, techniques, and scenarios.
  • Effectively use SIEM tools as well as SOC analysis and detection methods.
  • Manage incidents with structured processes in compliance with standards (ISO 27035).
  • Participate in crisis management and team awareness initiatives.

PREREQUISITES

  • General IT knowledge and cybersecurity fundamentals (concepts of attacks, vectors, risks).
  • Knowledge of the ANSSI security guide or completion of an equivalent training module (e.g., ANSSI SecNumacadémie Mooc) is recommended but not mandatory.
  • A personal computer with internet access and the ability to run advanced cybersecurity tools (SIEM, forensic tools).
  • Familiarity with networks and system environments, along with skills in analysis and synthesis to process complex security log data.
  • Willingness to actively participate in practical workshops and incident simulations to validate skills.

DETAILED PROGRAM

The pathway is organized around 7 major modules, covering theory, practice, and real-world cases.

Module 1: Fundamentals of System and Network Security

Duration: 2 days – 14 hours
Objectives: Enable participants to master key cybersecurity concepts, identify risks and attack vectors, and understand the applicable regulatory framework.

Contents:

  • Identification of the cyber ecosystem: actors, cybercrime chain, attacker profiles and motivations.
  • Fundamental concepts: risks, organizational impacts, affected information systems.
  • Types of attacks: ransomware, phishing, denial of service, social engineering, compromised passwords.
  • Main vectors: email, web browsing, wireless connections, malware.
  • Regulatory framework: ISO 27001, 27005 standards, GDPR.
  • Security references: OWASP Top 10, STRIDE.
  • Practical exercises: identifying attack vectors on a simulated architecture, categorizing incidents by criticality, validation quizzes.

Duration: 4 days – 28 hours
Objectives: Train participants in SOC knowledge, its tools and methods, particularly SIEM, as well as the main incident management frameworks.

Contents:

  • Definition, role, and organization of a SOC.
  • Overview of functions: monitoring, analysis, incident response.
  • Introduction to SIEM tools (Elastic Stack, Splunk), their architecture and features.
  • Presentation and demonstration of IDS/IPS.
  • ANSSI recommendations on logging.
  • Incident response frameworks: NIST, CERT, ISO 27035.
  • Practical exercises: SIEM installation and configuration, log analysis, correlation rule creation,
    case study (real-time phishing).

Duration: 10 days – 70 hours
Objectives: Learn to deploy and manage the complete security incident management process, from initial detection to remediation.

Contents:

  • Principles and roles of IDS, IPS, UTM.
  • Incident classification by criticality, functioning of incident databases.
  • Response phases: detection, categorization, containment, eradication, recovery.
  • Forensic analysis methods, tools: Kansa, GRR.
  • Procedures and tools to handle minor and major incidents.
  • Practical exercises: full simulations, report writing, root cause analysis.

Duration: 1 day – 7 hours
Objectifs : Acquire the fundamentals of digital investigation: evidence preservation, collection, analysis, and reporting.

Content:

  • Digital investigation process, definition and role of evidence.
  • Forensic taxonomy and methodologies.
  • Collaboration with internal and external actors (ANSSI, law enforcement).
  • Practical exercises: evidence collection, preservation and analysis, forensic report writing.

Duration: 3 days – 21 hours
Objectives : Structure, lead, and train organizational response in a cyber crisis, from activation to feedback (RETEX).

Contents:

  • Crisis cell: roles, escalation, coordination.
  • BCP/DRP: scope, dependencies, activation, action synchronization.
  • Communication: messages, channels, dashboards.3
  • Practical exercises: crisis cell setup, ransomware exercise, message kit, RETEX.

Duration: 2 days – 14 hours
Objectifs : Design, deploy, and measure awareness actions to sustainably strengthen cybersecurity posture.

Contents:

  • Key topics and materials: phishing, passwords, remote work.
  • Facilitation methods and managerial support.
  • KPIs and awareness dashboards.
  • Practical exercises: mini-campaign, dashboard creation, and improvement plan.

Duration: 1 day – 7 hours
Objectives: Learn to implement effective operational monitoring to anticipate threats and adapt security measures.

Contents:

  • Monitoring sources: ANSSI, CERT-FR, OSINT, CVE.
  • Methods for analyzing and exploiting alerts.
  • Writing and communicating recommendations.
  • Practical exercises: setting up monitoring processes, analyzing results, formulating continuous improvement plans.

LEARNING ASSESSMENT

  • Skills validated through a final role-play, followed by an oral defense before a panel.
  • Regular evaluations with quizzes and self-tests integrated into the modules.
  • In-depth practical exercises using SOC tools (SIEM Splunk, Elastic Stack), forensic tools (Kansa, GRR, autopsy), and incident simulations (phishing, ransomware).
  • Deliverables: analysis reports, incident classification, forensic documentation, and remediation plans.
  • Deliverables: analysis reports, incident classification, forensic investigation documentation, and remediation plans.
  • Labs include advanced configuration and customization of detection tools, as well as coordinated management of complex incidents.
  • Evaluated skills include mastery of ISO 27035, NIST CSF standards, SOC and CERT processes, and in-depth log analysis.

Teaching Methods

  • Theoretical courses enriched with real-world case studies and feedback.
  • Practical exercises with SOC tools, log investigations, and incident simulations.
  • Role-plays and oral defenses to validate operational skills.

KEY STRENGTHS

  • PASSI certified trainers, SOC and forensic experts.
  • Hands-on experience with leading professional tools (SIEM, Elastic, Splunk).
  • Pragmatic approach with simulations and real-world scenarios.
  • Alignment with ANSSI, ISO 27035, and NIST recommendations.
  • This program is eligible for OPCO Atlas funding.

This program qualifies for OPCO Atlas funding as part of the CampusAtlas offering, recognized and funded up to 100%, with simplified procedures, a quality guarantee, and tailored support provided to member companies.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.

Demande d’information

Je souhaite obtenir plus d'informations sur vos formations.
ACG CyberAcademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.
* Pour en savoir plus et exercer vos droits, consultez notre Politique Vie privée.