Toutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.luToutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations :

Public / System administrators

Accueil » System administrators

Certified Ethical Hacking Master

  • 10 février 2023

Contents Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service Session Hijacking Evading IDS, Firewalls, and Honeypots Hacking Web Servers Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Platforms IoT and OT Hacking Cloud Computing Cryptography Details The C|EH (Practical) is a […]

Practical DevOps and Continuous Delivery

  • 21 décembre 2020

Course Introduction Let’s Get to Know Each Other Course Rationale Overview Course Learning Objectives Course Agenda Case Study or Caselets Labs Course Book Source Control Done Right Source Control Source Control Concepts Unit of Work Source Control Patterns Build Automation Automated Build Process CI and Build Automation Testing Done Right Fundamentals of Testing Benefits and […]

Office Document Analysis

  • 25 novembre 2019

The following courses syllabus will be learned : Treat landscape Setup forensic Lab and Tools Why opening theses files & document identification Understand how macro deliver payload Extraction of Macro Macro Goal Obfuscation

Build your CSIRT

  • 25 novembre 2019

The topics covered will be : Threat Landscape Reactions Preparation How to face External Threat How to face Internal threat Detect and find threats Evidences collection Appropriate actions to appropriate threats  

Malware : Reverse engineering

  • 25 novembre 2019

What is a malware Taxonomies and different types and capabilities of malware Analysis of classic schemes of compromises and adjacent infrastructures Malware analysis Review of the basics needed for Windows process and assembly language operation Triages techniques, dynamic and static analysis Use of debugger, decompilers and disassembler Using flow control graphs Use of forensic detection […]