Baptiste Coste
Formation
• Networks
• Web applications
• OWASP top 10 security Risks
• Common Web vulnerability
• Building scripts to exploit vulnerabilities
• Phishing techniques
• Prevention around phishing
• Detecting intrusion
• Integrating cybersecurity into the application development cycle
• Cryptography introduction : symmetric and asymmetric encryption, hash, hmac
• TLS and HTTPS
• Good practices when implementing cryptographic algorithms
• Cryptographic standards