Developing Cybersecurity Training Program

Baptiste Coste

Formation

• Networks
• Web applications
• OWASP top 10 security Risks
• Common Web vulnerability
• Building scripts to exploit vulnerabilities
• Phishing techniques
• Prevention around phishing
• Detecting intrusion
• Integrating cybersecurity into the application development cycle
• Cryptography introduction : symmetric and asymmetric encryption, hash, hmac
• TLS and HTTPS
• Good practices when implementing cryptographic algorithms
• Cryptographic standards
Like this project

Posted Mar 12, 2024

Providing formation for educational purposes on cybersecurity (cryptography, web attacks, remediation ...)

Attacking a REST API
Attacking a REST API
Attacking a file share web application
Attacking a file share web application

Join 50k+ companies and 1M+ independents

Contra Logo

© 2025 Contra.Work Inc