Incident response is (normally) an organized approach to addressing and managing the aftermath of a security breach or cyberattack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
This course provides the required skills to achieve this goal:
This course first recalls a number of concepts in the area of distributed systems. Then, in the second part of the course the concepts of information security are applied to distributed information systems.
This course is taught at the Royal Military Academy (code IN006).
This course introduces a number of concepts in the area of operating systems and shows how these are used in different types of computer systems.
The following topics are covered:
This course is taught at the Royal Military Academy (code IN005).
This course introduces a number of concepts in the area of distributed systems and then shows how these concepts are applied in command & control systems.
This course is taught at the Royal Military Academy (code IN013).
This course covers a large number of languages, protocols and techniques required for the development of information systems.
After general reminders and a brief introduction to information systems, the course is divided into four main modules. First, the different languages, protocols and techniques necessary for the development of static web pages are presented. The second module then consists of a quick but relatively complete learning of relational databases, their definition, standardization and use. The basic techniques for developing dynamic web applications are then considered. Finally, some advanced techniques are presented.
This course is taught at the Royal Military Academy (code IN003).
This 2 days training is a typical cyber-risk awareness course. It is intended for nearly any staff member, from higher management to entry-level staff.
The goal of this course is turn participants into active contributors to the information security of their organization. To this aim a number of typical threats will be demonstrated on the cyber range to show the necessity for security controls and procedures. The participants will always be involved as much as possible in the exercises.
This 5 days training is intended for staff members working in IT functions, such as members of IT support teams or software developers. These people will be directly confronted to ICT problems and therefore need to have the necessary skills to be able to quickly identify a problem as a cyber-incident and react appropriately while correctly preparing for a forensic analysis, even though the investigation itself may be performed by another dedicated team or by an external contractor.
During this training the participants will learn the basics of cyber security forensics so they can contribute to a more in-depth analysis of the incident, for instance assess damage, define indicators of compromise, propose structural measures to prevent similar events of occurring in the future, etc.