Toutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.luToutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.lu

Public / IT Security Officers

Accueil » IT Security Officers

Microsoft 365 Mobility and Security

  • 25 août 2023

1 – Explore security metrics in Microsoft 365 Defender Module 1: Examine threat vectors and data breaches Module 2: Explore the Zero Trust security model Module 3: Explore security solutions in Microsoft 365 Defender Module 4: Examine Microsoft Secure Score Module 5: Examine Privileged Identity Management Module 6: Examine Azure Identity Protection 2 – Manage […]

SC-300T00 Identity and Access Administrator

  • 25 août 2023

This course includes the following Module and Learning Paths: Explore identity in Azure AD – Learn | Microsoft Docs SC-300: Implement an identity management solution – Learn | Microsoft Docs SC-300: Implement an Authentication and Access Management solution – Learn | Microsoft Docs SC-300: Implement Access Management for Apps – Learn | Microsoft Docs SC-300: […]

Introduction à la gestion de la sécurité de l’information ISO27001

  • 2 décembre 2019

Contenu La formation d’introduction à la norme ISO/IEC 27001 vous permettra d’appréhender les concepts fondamentaux d’un Système de management de la sécurité de l’information En participant à la formation d’introduction ISO/IEC 27001, vous allez comprendre l’importance d’un Système de management de la sécurité de l’information et les avantages que peuvent en tirer les entreprises, la […]

EC-Council Certified Security Analyst (ECSA)

  • 6 mars 2018

Contents Security Analysis and Penetration Testing Methodologies TCP IP Packet Analysis Pre-penetration Testing Steps Information Gathering Methodology Vulnerability Analysis External Network Penetration Testing Methodology Internal Network Penetration Testing Methodology Firewall Penetration Testing Methodology IDS Penetration Testing Methodology Web Application Penetration Testing Methodology SQL Penetration Testing Methodology Database Penetration Testing Methodology Wireless Network Penetration Testing Methodology […]

Securing Windows Server 2019

  • 20 janvier 2017

Module 1: Introduction to Microsoft SQL Server 2012 Description This module introduces the SQL Server platform and major tools It discusses editions, versions, tools used to query, documentation sources, and the logical structure of databases Lessons Introducing Microsoft SQL Server 2012 Getting Started with SQL Server Management Studio Lab: Working with SQL Server 2012 Tools […]

F5 – Configuring BIG-IP LTM v16: Local Traffic Manager

  • 8 juin 2016

Items BIG-IP initial setup (licensing, provisioning, and network configuration) A review of BIG-IP local traffic configuration objects Using dynamic load balancing methods Modifying traffic behavior with persistence (including SSL, SIP, universal, and destination address affinity persistence) Monitoring application health with Layer 3, Layer 4, and Layer 7 monitors (including transparent, scripted, and external monitors) Processing […]