All Architect courses

Course image
Advanced Cisco Routing: RIP and EIGRP (LinkedIn Learning)
The decisions you make about routing determine how your information moves from place to place. And if you’re an IT administrator working with Cisco, you need to understand the various routing protocols that are available as well as how to effectively configure and manage them within your organization. In this course, instructor Jarrel Rivera gives you an in-depth overview of advanced routing in Cisco. Explore the basics of the Routing Information Protocol (RIP), before turning to the Enhanced Interior Gateway Routing Protocol (EIGRP), a more advanced distance-vector protocol for network route configuration. Along the way, Jarrel provides step-by-step demos using IPv4 and IPv6 addresses. By the end of this course, you’ll have the skills you need to leverage RIP and EIGRP so you can get the most out of your network topology. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Angular: Testing and Debugging (LinkedIn Learning)
Errors caused by missing dependencies, undefined variables, or poorly formatted data can cause your web application to stop working. In this course, learn how to track down and eliminate these types of errors in your Angular applications through the process of testing and debugging. Instructor Derek Peruo breaks down common error messages and goes over a variety of testing and debugging options. He also covers code linting, shares some tips and tricks for avoiding pitfalls during development, and goes into writing custom error handlers to make it easier to work with errors as your application grows. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in English only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Webinar ReUse, All that data (OpenCourses)
How do reusable services contribute to the management of large volumes of data? How do can they reduce the data volume? Or garantee its quality? And control storage and handling cost?
 
Course image
DevOps Foundations: Containers (LinkedIn Learning)
Software containers are the future of app deployment—and an instrumental component of any DevOps strategy. They package everything a program needs to run, allowing developers to move applications from one environment to another relatively hassle free. In this course, cloud-computing luminary David Linthicum dives into the exciting world of software containers. David goes over the basics of containers, including an overview of the fundamental steps involved in building container-based software, followed by some examples of real-world applications that leverage containers. The course concludes with container standards and best practices, and the tools, processes, and skills a DevOps professional needs to work with them. Topics include: Containers vs. virtual machines When vs. when not to use containers Building new apps with containers Moving existing apps to containers Example container applications Standards, tools, processes, and skills Apply for this course //
 
Course image
DevOps Foundations: Infrastructure as Code (LinkedIn Learning)
By automating configuration management, you can make your organization's systems more reliable, processes more repeatable, and server provisioning more efficient. In this course, learn the basics of infrastructure as code, including how to keep your configuration in a source repository and have it built and deployed like an application. Discover how to approach converting your systems over to becoming fully automated—from server configuration to application installation to runtime orchestration. Well-known DevOps practitioners Ernest Mueller and James Wickett dive into key concepts, and use a wide variety of tools to illustrate those concepts, including Chef, CloudFormation, Docker, Kubernetes, Lambda, and Rundeck. After you wrap up this course, you'll have the knowledge you need to start implementing an infrastructure as code strategy. Topics include: Testing your infrastructure Going from infrastructure code to artifacts Unit testing your infrastructure code Creating systems from your artifacts Instantiating your infrastructure from a defined model Provisioning with CloudFormation Immutable deployment with Docker Container orchestration with Kubernetes Apply for this course //
 
Course image
DevOps Foundations (LinkedIn Learning)
DevOps is not a framework or a workflow. It's a culture that is overtaking the business world. DevOps ensures collaboration and communication between software engineers (Dev) and IT operations (Ops). With DevOps, changes make it to production faster. Resources are easier to share. And large-scale systems are easier to manage and maintain. In this course, well-known DevOps practitioners Ernest Mueller and James Wickett provide an overview of the DevOps movement, focusing on the core value of CAMS (culture, automation, measurement, and sharing). They cover the various methodologies and tools an organization can adopt to transition into DevOps, looking at both agile and lean project management principles and how old-school principles like ITIL, ITSM, and SDLC fit within DevOps. The course concludes with a discussion of the three main tenants of DevOps—infrastructure automation, continuous delivery, and reliability engineering—as well as some additional resources and a brief look into what the future holds as organizations transition from the cloud to serverless architectures. Topics include: What is DevOps? Understanding DevOps core values and principles Choosing DevOps tools Creating a positive DevOps culture Understanding agile and lean Building a continuous delivery pipeline Building reliable systems Looking into the future of DevOps Apply for this course //
 
Course image
Building a Full-Stack App with Angular 2+ and Spring Boot (LinkedIn Learning)
Angular 2 can serve as the primary MVC framework for your application, or it can supplement a server-side solution like Laravel or ASP.NET. In this course, Derek Peruo guides you through the process of transforming your Angular 2 single-page application (SPA) into a widget-based application for use with server-side frameworks. Plus, he goes into single-page and widget-based architectures, as well as common patterns for communicating between your server-side and client-side frameworks. Topics include: Single-page applications and widget-based applications Creating a new Laravel project Moving Angular files into Laravel Migrating Angular routing and Angular modules Using global variables Adding stateless API routes Using basic REST requests Using route parameters in controllers Apply for this course
 
Course image
Building Native Mobile Apps with NativeScript and Angular 2 (LinkedIn Learning)
NativeScript is an open-source framework for building native iOS and Android apps. Web developers who are familiar with Angular 2 can get introduced to NativeScript in this course and learn how to develop an application for iOS and Android by leveraging the NativeScript framework with Angular 2. Join Alex Ziskind as he guides you from the initial installation of NativeScript through architecting an application. He explains how to declare the most common user interface widgets while styling them with CSS. Plus, he demonstrates how to set up the Faker library, and how to programmatically tap into the native navigation engine for iOS and Android. Topics include: Setting up the development environment Using the NativeScript CLI Using Angular with NativeScript Angular bootstrap Application architecture Components User interface NativeScript widgets Application lifecycle Data and event binding Navigation Apply for this course
 
Course image
Managing Data in Angular 2 Applications (LinkedIn Learning)
All web applications use data, which can come from a server or be stored locally in the browser. In Managing Data in Angular 2 Applications, Derek Peruo guides you through the process of retrieving and saving data for your Angular applications, both in the browser and on a server. He also introduces tips and tricks for customizing data management as your application grows in size and complexity. Learn about the various storage options and when and where to use each type, and find out how to write custom services to manage the data for a fast-growing Angular app. Topics include: Overview of data storage options Saving and retrieving data from the browser Setting routes in the URL Using query strings and fragments instead of routes Saving and retrieving data from a server Working with user input Using JSONP instead of HTTP Why writing custom services is important Writing custom services for working with browsers and servers Apply for this course
 
Course image
Découvrir l'écosystème d'Angular (LinkedIn Learning)
Si vous êtes un développeur formé à JavaScript ou TypeScript, suivez cette présentation de l'environnement de développement Angular. Vous aborderez les différents outils et vous découvrirez quel est le rôle et l'intérêt des serveurs et des bases de données. Vous verrez également les outils de développement pour appareils mobiles, ainsi que les techniques de test et de débogage, avant de passer à l'intégration continue et au déploiement. À la fin de cette formation, vous aurez les bases indispensables pour développer et également pour poursuivre votre formation avec Angular. Apply for this course
 
Course image
AI The LinkedIn Way: A Conversation with Deepak Agarwal (LinkedIn Learning)
Deepak Agarwal is the VP of artificial intelligence (AI) at LinkedIn, a company on the frontline of data science. LinkedIn is heavily invested in AI and machine learning, transformative technologies that can improve all aspects of member experience. This investment is demonstrated in the LinkedIn AI Academy, which trains engineers and other employees on the power, potential, and best practices for developing and using AI tools. In this Q&A style course, Deepak discusses how LinkedIn leverages AI and machine learning, the ways the technology influences our lives, and what's to come, including advice for those wondering "Will AI take our jobs?" and "What skills can I learn in order to start a career in AI?" Apply for this course
 
Course image
Learning XAI: Explainable Artificial Intelligence (LinkedIn Learning)
Now that AI and machine learning are widespread, people are starting to ask, "Is the technology actually making the best decisions? Can AI be trusted? How and where do humans fit in?" Explainable artificial intelligence (XAI) is a solution that increases transparency about how AI systems make decisions and take actions. This course provides a solid introduction of how XAI works and the value it provides to data science-related businesses and initiatives from legal and commercial perspectives. Instructor Aki Ohashi, director of business development for PARC, a Xerox company, bridges the gap between AI's potential and pitfalls, presenting executives, entrepreneurs, managers, and team leaders with exactly what they need to know to stay on top of how AI affects their fields. He uses real-world examples and cases studies to show what XAI is, how it works, how it's being used right now, and where it may have the most impact in the future. Apply for this course
 
Course image
Programming Foundations: Web Security (LinkedIn Learning)
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and smart strategies for encryption and user authentication. Kevin also covers special considerations when it comes to credit cards, regular expressions, source code managers, and databases. This course is great for developers who want to secure their client's websites, and for anyone else who wants to learn more about web security. Topics include: Why security matters What is a hacker? How to write a security policy Cross-site scripting (XSS) Cross-site request forgery (CSRF) SQL injection Session hijacking and fixation Passwords and encryption Secure credit card payments Apply for this course
 
Course image
Performing a Technical Security Audit and Assessment (LinkedIn Learning)
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. Topics include: Developing technical security assessments Conducting technical security reviews Identifying and analyzing targets Validating target vulnerabilities Planning a technical assessment Conducting a technical assessment Implementing remediation and mitigation Apply for this course
 
Course image
IT Security: Key Policies and Resources (LinkedIn Learning)
Cybersecurity can be daunting because of its technical complexity and the ever-changing threats that professionals must grapple with. And more than ever, cybersecurity is not just an IT issue, but a core business issue for organizations of all kinds. Just like other business issues—such as finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Apply for this course
 
Course image
DevOps Foundations: DevSecOps (LinkedIn Learning)
Security is a major concern in the DevOps world. There is a constant push for companies to move more quickly, and security teams struggle to keep up with testing. This has led to the rise of a new field: DevSecOps. This course introduces the concept of DevSecOps and explains how an organization can build out a DevSecOps program that helps teams integrate security into the application development pipeline. Learn about the role of APIs, containers, and automation, and how a continuous integration and delivery framework can help your organization run security tests as often as developers want. Instructor Tim Chase also introduces some free tools and resources for starting your DevSecOps journey. Apply for this course
 
Course image
Ethical Hacking: System Hacking (LinkedIn Learning)
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.Learning Objectives:● Acquiring passwords● Generating rainbow tables● Understanding where passwords are stored● Defending against privilege escalation● Understanding spyware● Protecting against keylogging● Detecting steganography● How hackers cover their tracksApply for this course //
 
Course image
Ethical Hacking: Hacking IoT Devices (LinkedIn Learning)
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures.Learning Objectives:● How IoT devices work● IoT technologies and protocols● IoT communication models● Common OWASP vulnerabilities● Overcoming inherent IoT challenges● Attacks occurring on IoT devices● Methodologies used for hacking● Securing IoT devicesApply for this course //
 
Course image
Ethical Hacking: Wireless Networks (LinkedIn Learning)
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Selecting an antenna Configuring security Extracting WEP and network passwords Testing passwords Harvesting connections from rogue access points Attacking networks via Bluetooth Capturing wireless packets with Acrylic Wi-Fi Heat mapping with Ekahau Wi-Fi sniffing with Wireshark Testing the Internet of Things Apply for this course
 
Course image
Ethical Hacking: Mobile Devices and Platforms (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.Learning Objectives:● Today's threat landscape● Managing incidents● Creating security policies● Protecting data● The COBIT framework● Conducting penetration testing Apply for this course //
 
Course image
Ethical Hacking: Social Engineering (LinkedIn Learning)
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.Learning Objectives:● Visualizing the victim● Recognizing an attack● Using charm, power, and influence● Manipulating with social media● Preventing insider attacks● Stealing identities● Pen testing with social engineering● Taking countermeasuresApply for this course //
 
Course image
Ethical Hacking: Introduction to Ethical Hacking (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.Learning Objectives:● Today's threat landscape● Managing incidents● Creating security policies● Protecting data ● The COBIT framework● Conducting penetration testingApply for this course //
 
Course image
Learning Cisco CLI Switch Configuration (LinkedIn Learning)
Learn how to configure a Cisco switch to connect and control resources on your network. Join Denise Allen-Hoyt in this course, as she explores the Cisco command-line interface using an out-of-band connection with a cable and terminal program. She'll show how to access the switch's three modes—user EXEC, privileged EXEC, and global configuration—and use commands to configure essential settings. After addressing the switch and configuring a default gateway, Denise shows how to modify individual port modes, secure those ports, and create and manage virtual LANs (VLANs). In the final chapter, she'll show how to verify your settings and reset the switch if necessary. Topics include: Accessing a switch Configuring the terminal program Configuring a switch hostname Saving and viewing configurations Securing access Encrypting passwords Assign an IP address to a switch Exploring port modes and security Creating VLANs Resetting a switch Apply for this course
 
Course image
Cisco Network Security: Cisco Firewall Technologies (LinkedIn Learning)
The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Topics include: Firewall services and security contexts Basic firewall configuration Stateless versus stateful firewalls Implementing NAT on Cisco ASA Zone-based firewalls Access Management Implementing high availability Cisco Modular Policy Framework Apply for this course
 
Course image
Drupal 8 Essential Training 1: The Basics (LinkedIn Learning)
Drupal 8 Essentials is designed to help anyone create a simple website using Drupal, the free web design software that powers personal blogs as well as the sites of some of the world's largest corporations.This course is the first of the series. No prerequisites are required beyond basic computer skills! These easy-to-follow tutorials show how to install Drupal and other necessary components on a Windows or Mac computer, navigate Drupal's web-based interface, configure the settings of a new Drupal site, create content, and move the site to a server. Every step includes best practices to ensure your website remains streamlined, secure, and up-to-date.Watch Drupal 8 Essentials 2: Building Out Your Website to find out how to finesse your site with categories, comments, custom styles, and other special features.Topics include: Comparing Drupal to other software Getting help with Drupal Installing Acquia Dev Desktop on Mac and Windows Installing the Drupal database, modules, and themes Creating basic content Establishing your site's look and feel Adjusting security settings Adding images and metadata Adding a sidebar Moving your Drupal website to a server Backing up a Drupal site Apply for this course
 
Course image
Drupal 8 Essential Training 2: Building Out Your Website (LinkedIn Learning)
Your Drupal site is built. Now what? Web design doesn't stop once the website is launched. Learn how to build out your Drupal site to better fit your visitors' needs.In these tutorials, Tom Geller helps new Drupal designers change the layout and design elements of their sites, control visitor interactions (including comments), arrange content in user-friendly "views," and expand the site's capabilities beyond what's available in core Drupal with Drupal modules. In all the steps you'll learn best practices to ensure your sites remain streamlined, secure, and up to date.If you want to start from the beginning and create your Drupal site from scratch, check out Drupal 8 Essentials 1: Getting Started.Topics include: Grouping content into categories Managing comments Adding discussion groups Customizing fields and image styles Adjusting menus and navigation to help users Adding new features with Drupal modules Apply for this course
 
Course image
API Testing Foundations (LinkedIn Learning)
As software companies continue to shift towards cloud computing, mobile apps, and microservice architectures, the ability to quickly and effectively test APIs has become a critical skill for software testers. In this course, instructor Dave Westerveld covers the basics of API testing, sharing how to work with several robust tools for testing APIs at scale in an organization. After providing a primer on web services and important API terminology, Dave shows how to use Postman for some basic API exploration. He then goes over some basic approaches and methodologies used in testing GET, POST, PUT, and DELETE requests; shows how to approach performance testing using SoapUI, a popular automated API testing tool; and more. Apply for this course
 
Course image
AngularJS 1 Form Validation (LinkedIn Learning)
Validation is key to successful online forms. Implementing dynamic form validation that reacts to input can be difficult to implement with languages like JavaScript and jQuery. However, AngularJS allows you to take advantage of two-way data-binding functionality without having to write any JavaScript code. This makes reacting to input from the user—as it happens—a breeze. In this short course, Ray Villalobos shows how to implement form validation on any HTML form using the built-in validation properties and methods in AngularJS. Together, you'll look at how AngularJS can help style forms dynamically as the user updates the content. Plus, explore how to implement validation with JavaScript, just in case you need more fine-tuned control of form interactions. Apply for this course
 
Course image
AngularJS 1 Building a Data-Driven App (LinkedIn Learning)
Want to create data-driven web applications? AngularJS is a great choice. It allows you to build apps where multiple users can push and pull data at the same time, in real time. However, while the framework is easy to learn, it can be tough to master. This course is the second in a two-part series designed to show you how Angular works in the real world. It takes up where AngularJS 1: Adding Registration to Your Application left off: a simple application that checks users in and out of meetings. Here, instructor and Angular advocate Ray Villalobos shows how to enhance the existing app with new views and controllers to reward random checked-in users with prizes. Learn how to create forms, edit database records, create methods, randomize record selections, and style and secure your app. With these project-based lessons, you'll learn how to see how data-driven programming with AngularJS can help your apps react to real-time data streams. Apply for this course
 
Course image
IT Security Foundations: Network Security (LinkedIn Learning)
Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Apply for this course
 
Course image
Learning Cryptography and Network Security (LinkedIn Learning)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Apply for this course
 
Course image
La sécurité informatique et cybersécurité : Niveau avancé (LinkedIn Learning)
En tant que responsable de la sécurité ou DSI, vous devez mettre en place une politique de cybersécurité pour répondre aux menaces qui pèsent sur votre informatique. Pour cela, Pierre Cabantous vous propose de faire un tour de la cybersécurité en entreprise. Dans ce cours, vous étudierez la démarche d'un pirate, avant et après l'intrusion dans un système, à la suite de l'exploitation d'une vulnérabilité. Vous verrez comment gérer ces vulnérabilités par rapport à un niveau de risque que vous apprendrez à calculer. Vous aborderez aussi une des principales menaces encourues aujourd'hui par tout service accessible en ligne : les attaques par déni de service. Puis vous découvrirez comment protéger votre organisation aux niveaux technique et organisationnel, en suivant des bonnes pratiques, des process ainsi que des normes européennes comme le RGPD. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course //