Description
Objective of the training: To enable cybersecurity professionals to conduct technical audits (systems, applications, infrastructures), source code audits, and penetration tests in a controlled environment, using recognized industry tools and methods while ensuring traceability, effectiveness, and compliance of practices.
Learning Objectives
- Distinguish the objectives, scopes, and methods of security audits, code audits, and penetration tests
- Prepare and structure a technical audit or intrusion mission within a defined contractual framework
- Use appropriate tools for each type of audit (static analysis, SAST, DAST, fuzzing, network tools)
- Identify and exploit security vulnerabilities in applications or infrastructure
- Formulate a clear, prioritized, and actionable audit report for stakeholders
- Integrate confidentiality, ethics, and non-repudiation requirements into offensive activities
Target Audience
Technical security analysts (SOC, CERT)
Internal or external pentesters
Technical cybersecurity consultants
Security developers (DevSecOps)
Security administrators upskilling in offensive security
Prerequisites
Mastery of cybersecurity fundamentals (vulnerabilities, network protocols, Linux/Windows systems)
Strong knowledge of application architectures and development basics (HTML, JS, SQL, backend code)
Prior experience in log analysis, investigation, or technical audits is appreciated
Program Outline
Informations
Duration
3 jour(s)
21h
Tarif
2200 € HT
HT