{"id":6778,"date":"2024-08-06T15:57:31","date_gmt":"2024-08-06T14:57:31","guid":{"rendered":"https:\/\/cristechservices.com\/?page_id=6778"},"modified":"2024-08-08T18:39:00","modified_gmt":"2024-08-08T17:39:00","slug":"ccna-cyber-ops","status":"publish","type":"page","link":"https:\/\/cristechservices.com\/index.php\/formation\/ccna-cyber-ops\/","title":{"rendered":"CCNA Cyber Ops"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6778\" class=\"elementor elementor-6778\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8a96b1 e-flex e-con-boxed e-con e-parent\" data-id=\"a8a96b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-596ec85 e-con-full e-flex e-con e-child\" data-id=\"596ec85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c33e8f elementor-widget elementor-widget-image\" data-id=\"4c33e8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber.jpg\" class=\"attachment-large size-large wp-image-6935\" alt=\"\" srcset=\"https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber.jpg 1000w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-300x169.jpg 300w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-768x432.jpg 768w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-720x405.jpg 720w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-600x337.jpg 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-282f35b e-con-full e-flex e-con e-child\" data-id=\"282f35b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cb2854 elementor-widget elementor-widget-toggle\" data-id=\"9cb2854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1641\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1641\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Objectif de la formation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1641\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1641\"><p style=\"text-align: justify;\">Cette formation offre la possibilit\u00e9 de saisir les principes essentiels des op\u00e9rations de cybers\u00e9curit\u00e9. Les concepts de s\u00e9curit\u00e9, les op\u00e9rations et les attaques fr\u00e9quentes des applications r\u00e9seau, les syst\u00e8mes d&rsquo;exploitation Windows et Linux, ainsi que les types de donn\u00e9es utilis\u00e9s pour \u00e9tudier les incidents de s\u00e9curit\u00e9 sont entre autres les comp\u00e9tences et connaissances que les apprenants vont acqu\u00e9rir.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1642\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1642\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Description<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1642\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1642\"><p style=\"text-align: justify;\">A l&rsquo;issue de cette formation aussi bien th\u00e9orique que pratique, les connaissances et comp\u00e9tences suivantes seraont acquises:<\/p><p style=\"text-align: justify;\">\u2192 Comprendre et d\u00e9finir le centre des op\u00e9rations de s\u00e9curit\u00e9;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre l&rsquo;infrastructure r\u00e9seau et les outils de surveillance de la s\u00e9curit\u00e9 r\u00e9seau;<\/p><p style=\"text-align: justify;\">\u2192 Explorer les cat\u00e9gories de types de donn\u00e9es<\/p><p style=\"text-align: justify;\">\u2192 Ma\u00eetriser les concepts de base de la cryptographie;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre les attaques TCP\/IP courantes;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre les technologies de s\u00e9curit\u00e9 des \u00e9quipements finaux<br \/>Comprendre l&rsquo;analyse des incidents dans un SOC centr\u00e9 sur les menaces;<\/p><p style=\"text-align: justify;\">\u2192 Identifier les ressources pour la chasse aux cybermenaces;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre la corr\u00e9lation et la normalisation des \u00e9v\u00e9nements;<\/p><p style=\"text-align: justify;\">\u2192 Identification des vecteurs d&rsquo;attaque courants;<\/p><p style=\"text-align: justify;\">\u2192 Identifier les activit\u00e9s malveillantes;<\/p><p style=\"text-align: justify;\">\u2192 Identifier les mod\u00e8les de comportements suspects;<\/p><p style=\"text-align: justify;\">\u2192 Mener des enqu\u00eates sur les incidents de s\u00e9curit\u00e9;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre les mesures du SOC<br \/>Comprendre le flux de travail et l&rsquo;automatisation du SOC;<\/p><p style=\"text-align: justify;\">\u2192 D\u00e9crire la r\u00e9ponse aux incidents<br \/>Comprendre les bases du syst\u00e8me d&rsquo;exploitation Windows;<\/p><p style=\"text-align: justify;\">\u2192 Comprendre les bases du syst\u00e8me d&rsquo;exploitation Linux.<\/p><p style=\"text-align: justify;\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1643\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1643\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Pr\u00e9-requis<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1643\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1643\"><p>\u2192 Avoir obtenu une certification CCNA ou conna\u00eetre les principes de base des r\u00e9seaux et la construction de r\u00e9seaux locaux;<\/p><p>\u2192 Comprendre le fonctionnement des r\u00e9seaux Ethernet et TCP\/IP;<\/p><p>\u2192 Avoir une ma\u00eetrise des syst\u00e8mes d\u2019exploitation Windows &amp; Linux.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1644\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1644\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Public cible<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1644\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1644\"><p>\u2192 Analyse SOC;<\/p><p>\u2192 Tout professionnel en s\u00e9curit\u00e9 informatique.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d30cc6b e-flex e-con-boxed e-con e-parent\" data-id=\"d30cc6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3282cd elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"b3282cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cristechservices.com\/index.php\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contactez-nous<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Objectif de la formation Cette formation offre la possibilit\u00e9 de saisir les principes essentiels des op\u00e9rations de cybers\u00e9curit\u00e9. Les concepts de s\u00e9curit\u00e9, les op\u00e9rations et les attaques fr\u00e9quentes des applications r\u00e9seau, les syst\u00e8mes d&#8217;exploitation Windows et Linux, ainsi que les types de donn\u00e9es utilis\u00e9s pour \u00e9tudier les incidents de s\u00e9curit\u00e9 sont entre autres les comp\u00e9tences [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6779,"parent":6168,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_regular_price":[],"currency_symbol":[],"iawp_total_views":3,"footnotes":""},"class_list":["post-6778","page","type-page","status-publish","has-post-thumbnail","hentry"],"post_slider_layout_featured_media_urls":{"thumbnail":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops-150x150.png",150,150,true],"post_slider_layout_landscape_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"post_slider_layout_portrait_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"post_slider_layout_square_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"post_slider_layout_landscape":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"post_slider_layout_portrait":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"post_slider_layout_square":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false],"full":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/CCNA-Cyber-Ops.png",500,350,false]},"_links":{"self":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=6778"}],"version-history":[{"count":19,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6778\/revisions"}],"predecessor-version":[{"id":6941,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6778\/revisions\/6941"}],"up":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/media\/6779"}],"wp:attachment":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=6778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}