Cyber Defense Specialist

The Cyber Defense Specialist works on designing solutions to reduce cyber threats. This role is essential in understanding computer attack methodologies. It aims to perform maneuvers which will aim to identify the level of vulnerabilities in the organization and to associate the right countermeasures with the failures found.

The cyber defense specialist may also be required to carry out incident analysis and identification activities. This is in order to identify the source and understand how these could have occurred in the environment using highly specialized tools.

The trainings below aim in particular to:

  • Discover the methodology of a computer attack - from reconnaissance to data exfiltration;
  • Know the means of cyber defense, in particular the concrete measures to stop a threat;
  • Identify best practices in implementing the organizational and technical security program;
  • Simulate computer attacks in order to discover system failures;
  • Detect and perform data analysis to identify the source of an attack;
  • Implement a continuity and continuous data protection strategy.

Possible certifications following the completion of your training:

  • EC-Council CEH, CND, LPT, CHFI, CSA, CPENT, ECIH, ECES, CTIA, EDRP;
  • SSCP;
  • CompTIA CySA+.
1
Tentative dateTentative date
Virtual classroom
Tentative dateTentative date
Virtual classroom
5 days / 35 hours
3000 €
 
Our most popular ethical hacking course - it brings together about 20 modules focused on offensive security and prepares to take the C|EH Knowledge and Practical exams.
1
Tentative dateTentative date
Virtual classroom
Tentative dateTentative date
Virtual classroom
5 days / 35 hours
3000 €
 
A cybersecurity course with an emphasis on defense security - learn how to secure the network, as well as your business data.
Tentative dateTentative date
Virtual classroom
Tentative dateTentative date
Virtual classroom
15 days / 105 hours
9000 €
 
An EC-Council training package providing increased preparation for the prestigious Certified Network Defender, Certified Ethical Hacker and Certified Penetration Testing Professional certifications.
Tentative dateTentative date
Virtual classroom
Tentative dateTentative date
Virtual classroom
10 days / 70 hours
6000 €
 
The bootcamp is a package of two certifying trainings, allowing participants to acquire knowledge of both organizational security (CISSP) and offensive security (CEH).
This course is oriented towards defensive security - the training introduces the countermeasures to be implemented to ensure the security of a network.
5 days / 35 hours
Price on request
 
This course demonstrates common techniques for defending a network from computer threats. It is also preparatory for the CS0-002 certification exam.
1
3 days / 21 hours
Price on request
 
The SOC course is designed to help you acquiring knowledge in the management of a security operations center, as well as in incident analysis and management.
The CHFIv9 course informs you of forensics and computer data recovery practices.
Tentative dateTentative date
Virtual classroom
5 days / 35 hours
4200 €
 
The CPENT training teaches you the methodology for assessing intrusion of networks and systems in large environments.
This training introduces the methodology of incident management, including means of responding to cyber attacks on networks, data and applications.
3 days / 21 hours
Price on request
 
The ECES course is designed to educate you on the various possibilities of data encryption, including cryptography protocols and procedures.
The CTIA training informs you of the tools and the appropriate methodology to manage cyber threats.
5 days / 35 hours
Price on request
 
This intermediate level training demonstrates the possibilities of intruding and finding vulnerabilities in a computer network. It also prepares for the PT0-001 exam.
Learn how to put business continuity practices to work and how a recovery plan for your systems can aid in resuming business from incidents threatening your business.
5 days / 35 hours
Price on request
 
Learn how to manage WireShark, a powerful scanner for understanding your network activity.
2 days / 14 hours
Price on request
 
A course designed to discover the most important features of Nessus, a powerful vulnerability scanner.