Toutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.luToutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.lu

Public / Acteurs des services informatiques

Accueil » Acteurs des services informatiques

Operational Resilience Professional

  • 14 septembre 2022

1. Introduction  2. Core knowledge BCM to resilience International standards Incident Management, Crisis management and Business Continuity Good practices in crisis response (+ feedbacks on current crisis) 3. Delivering an effective business continuity capability Dealing with the Management Board Implementing Governance and resources Business Impact Analysis Plan and procedures Training the team Resilience for third […]

Microsoft Azure Administrator (Version Française)

  • 21 décembre 2020

Module 1: Identité Description Dans ce module, vous découvrirez comment sécuriser les identités avec Azure Active Directory et mettre en œuvre des utilisateurs et des groupes. Leçons Azure Active Directory Utilisateurs et Groupes Laboratoire: Gérer les Identités d’Azure Active Directory. Après avoir terminé ce module, les étudiants seront capables de: Sécuriser et gérer les identités […]

Microsoft Azure Administrator (English version)

  • 21 décembre 2020

Module 1: Identity In this module, you will learn how to secure identities with Azure Active Directory, and implement users and groups. Lessons Azure Active Directory Users and Groups Lab : Manage Azure Active Directory Identities After completing this module, students will be able to: Secure and manage identities with Azure Active Directory. Implement and […]

Microsoft Cloud Workshop : Machine Learning

  • 18 décembre 2019

Module 1: Whiteboard Design Session – Machine Learning Lessons Review the customer case study Design a proof of concept solution Present the solution Module 2: Hands-on lab – Machine Learning Lessons Creating a forecast model using automated machine learning Understanding the automated ML generated forecast model using model explainability Creating a deep learning model (RNN) […]

EC-Council Certified Security Analyst (ECSA)

  • 6 mars 2018

Contents Security Analysis and Penetration Testing Methodologies TCP IP Packet Analysis Pre-penetration Testing Steps Information Gathering Methodology Vulnerability Analysis External Network Penetration Testing Methodology Internal Network Penetration Testing Methodology Firewall Penetration Testing Methodology IDS Penetration Testing Methodology Web Application Penetration Testing Methodology SQL Penetration Testing Methodology Database Penetration Testing Methodology Wireless Network Penetration Testing Methodology […]