Sagas

You will find below the different themes covered throughout the various training courses.

  • Operating System 

    In this saga, you will learn about the different operating systems and get to the heart of your machines. Whether you're using Linux or Windows, you'll know all there is to know about operating systems. In this way, you will gradually enter the world of Computer Defence and the challenges associated with performance.

  • The network layers

    In this saga, we will give you the keys to understanding how computer networks operate on a layer-by-layer basis, in particular according to the OSI model. You will learn how routing, switching and the main equipment used to transport information work. You will be able to understand the Domain Name System and even DNSSEC mechanisms. A key aim of this course is to give you the keys to understanding how to secure a network while guaranteeing quality of service or QoS.

  • Monitoring

    This saga will give you the knowledge you need to monitor networks, with a particular focus on metrology and optical network monitoring.

  • Network infrastructures

    This saga covers all the issues surrounding transport network infrastructures. Learn to understand the issues surrounding the transmission and reception chains of mobile, radio and satellite communication networks.

  • Network architecture

    You will see the main concepts of network architecture, particularly around the mechanics of Software Define Network (SDN) design, in comparison with Network Functions Virtualization (NFV).

  • Virtualization

    Virtualization has become indispensable in the design of Information Systems, enabling improvements in the management and deployment of machines. In this saga, you will learn about the different issues involved, as well as deployment, containment, and hybridization techniques.

  • Cloud providers

    Are you still mystified by the cloud? This saga will help you to master the basic concepts, and in particular the main technologies most commonly used on the market: AWS and Azure Active Directory.

  • Orchestration tools

    In this saga, you will learn how to deploy and configure the main orchestration tools on the market, including Puppet and Kubernetes.

  • Firewalling

    Firewalling is the first level of Cyber applied to network infrastructures. We invite you to discover how the products of Seela's partners and market leaders work: Stormshield, Cisco and Fortinet. Above all, you will be able to carry out exercises directly on this equipment, which will enable you to become rapidly operational in the processing of filtering rules and their configuration in accordance with best practice in terms of security.

  • Languages and their management

    Modern computing is based on a number of programming languages that have become indispensable, including in the management of an Information System. This saga explains how C, C#, JavaScript and Python work. Mastering programming languages is the basis for application, software or embedded security.

  • Artificial intelligence

    In this saga, we demystify the main concepts of artificial intelligence. Machine Learning, Reinforcement Learning and Deep Reinforcement Learning will no longer hold any secrets for you.

  • Introduction to Cybersecurity

    This saga presents the different areas of cybersecurity and the most common attack techniques. Cisco's vision of cybersecurity will give you an insight into how cyber is conceived in North America.

    You will experience first-hand a cyber crisis to understand the risks and challenges for information systems.

  • Standards and regulations 

    Standards and regulations in the field of cyber and risk management have led to the definition of a set of best practices to meet the challenges of Information Systems Security. This saga will help you to understand the ISO27K standard and the RGPD, an essential regulation for all tech that deals with data.

  • Awareness

    This saga will help you understand the issues surrounding human security breaches and teach you the right reflexes when it comes to digital hygiene.

  • Training

    In this saga, you will learn the main attack and defence techniques directly on our simulation platform: the Airbus CyberSecurity CyberRange. Over a hundred practical and practical exercises to help you make step-by-step progress in cybersecurity.

  • Capture The Flag

    This saga is the last step towards validating your skills. There are no instructions here, the story is between you and the machines. You'll have to use all the skills you've acquired to pass these tests and win the flag to prove your success. We look forward to seeing you there.

  • The CyberRange for the FreeRide (by Seela)

    Learn how to use the Airbus CyberSecurity CyberRange. This training is a must for Seela FreeRide users.

  • Industrial cybersecurity

    In this saga, we offer you the opportunity to understand the application of cybersecurity to the industrial sector. You will take lessons on SCADA technologies, hardening, OTs, ICS, DCS and PLCs. These sagas will apply nuclear control issues and give you the foundations for understanding safety mechanisms, particularly ISO19443.

  • Risk management 

    In cyber, you can't consider an Information System without mapping the risks. You will learn about cyber risk management using the EBIOS reference framework, and you will be able to use the risk assessment tools provided by our partners to supplement your knowledge in this area. This is also where you will learn how to draw up a Business Continuity Plan and a Disaster Recovery Plan.

  • Cyber defense and attack tools

    Mastering the mechanics of attackers also means knowing their weapons. Here, you can learn how to employ the main tools currently used in the industry to carry out your first cyber exploits. Whether for investigative or reverse engineering purposes, you will discover the hacker's toolbox: Nmap, Nikto, OpenVAS, C2, etc.

  • Cryptology

    This saga is designed for anyone who wants to understand the mechanics of securing information. Through practical case studies presented by our partners, you will understand the challenges of data encryption, how it works and the differences between synchronous and asynchronous encryption protocols.

  • Vulnerabilities

    Cybersecurity is based on identifying, qualifying and exploiting vulnerabilities. The saga also presents the different attack techniques and the main flaws and vulnerabilities, enabling you to better secure your web applications and software, your systems and your IS.

  • Digital Forensics and Incident Response (DFIR)

    This saga presents the investigation tools used to gather information on attackers, particularly in the context of investigations. The collection tools presented are particularly essential for forensic operations in the embedded sector.

  • Identity Access Management 

    The aim of this saga is to introduce you to the challenges of Identity Access Management. IAM is one of the major challenges, particularly when it comes to implementing security levels for infrastructure access. You will learn about the two pillars of IAM: identity governance and administration.

  • Operations Centre

    This saga will give you an understanding of the issues surrounding network and application supervision and monitoring technologies. From the Network Operation Center (NOC) to the Maintenance Operation Center (MOC), you will discover how the Security Operation Center (SOC) works. This saga will enable you to master and use the main SOC tools: ELK, Splunk Wazuh and many others…