Human beings represent the most important part of IT departments
Highly qualified workers is the key for availability, reliability and productivity of modern information infrastructures. In that context, a complete training program which offers a continuing education is essential.
40% of information systems downtime is the result of human errors. Thus the education of the IT staff is no more an option. SCRT offers complete training solutions which help companies reach their technological aims while optimizing their intellectual asset.
Securing virtual environments
System Administrators, Vmware ESX Administrators
The goal of this course is to present the new risks related to the use of virtual environments. Administration best practices, important Vmware ESX points and security solutions for protecting against these new threats are discussed.
Windows 7/2008 Security
The goal of this course is to present the best practices and configuration options of Windows 2008 and 7 in order to reinforce the security level of these systems.
Notions already available in previous versions of the operating system will be discussed along with new topics such as AppLocker and NAP.
Hacking tools and methods
Beginner / Intermediate / Expert
System/Network administrators, CISO
This course presents the various tools and methods used by « hackers » as well as different ways to protect against them. The course is based around a series of practical exercices that will allow the participant to understand the use of each tool.
The following topics are discussed during the course : Information gathering, Network vulnerabilities, System vulnerabilities, Application vulnerabilities.
New Web Hacking Methods
Network/System administrators, CISO, developers
This course presents various new web hacking techniques that will allow the participant to keep up to date with the latest threats to web applications.
It is mostly designed for system administrators already well educated about ethical hacking, who ideally have already followed at least one of the "Hacking tools and methods" trainings.
Web architectures security
Developers, Project Managers, System Administrators
The topics addressed during this course are the fundamentals of security, security in your computing projects, public key infrastructures, the specific problems related to web architectures, securing transactions, authentication solutions, securing web services and several study cases.
Administration/protection of a Linux system
CISO, Project manager, System administrators
This course covers various topics such as installing a secure Linux box and the basic tools needed to secure a Linux installation.
ISO 27001 assistance
Project managers, CISO, System administrators
This course presents the 27001 standard, its implementation process and audit paths.
This course presents the investigation process that follows a security incident: Preserving systems, the hardware and software tools needed to constitute proof to legally protect a company.
Objectives: Know the procedures to be applied, know the necessary tools, know what to look for and how to maintain it.
Our training workshops are provided in different levels. They are opened to final users as well as to experts. You can take our courses in your premises or in one of our training centers.
© 2002-2017 SCRT. All rights reserved.