FORMATION MICROSOFT OFFICE ACCESS 2010 SÉCURITÉ (1jour)

ACCESS SECURITE
PRE-REQUIS
Avoir une bonne connaissance de Access
OBJECTIFS
A la fin du cours, le participant sera capable de :

– Sécuriser les bases de données,
– …

CONTENU DU COURS
– Introduction,
– Gestion des utilisateurs et des groupes,
– Gestion des permissions,
– Installation réseau,
– Protection des fichiers,
– Confidentialité,
– …
DUREE de la Formation Microsoft Office Access Sécurité
1 Jour de formation
PRIX de la Formation Microsoft Office Access Sécurité
Liste de prix
Notre particularité est de faire des cours sur mesure,
donc le programme de cours énoncé ci-dessus s’adapte différement
selon la personne concernée !

 

NOUS CONTATCER:

JL GESTION SA

Centre de formation Bruxelles

Avenue de l’indépendance Belge 58
1081 Bruxelles
Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Gsm : +32 485 212 722
Email : selossej@jlgestion.be

NOS AVANTAGES :

  • Type de formation : Inter-entreprise, Intra-entreprise et particuliers
  • Formation 100% flexible et personnalisée : Vous choisissez le lieu, la date et le programme de formation
  • Demande de devis : Réponse dans les 24 heures.
  • Remise de 50% pour les PME Bruxelloises
  • Parking, boisson et lunch gratuit
  • Accès à notre centre de compétences : Syllabus, note de cours, exercices,…

Faites une demande de devis gratuitement en remplissant notre formulaire en ligne

 

Eerste Belgian Internet Security Conference sleutelt aan securitybesef

Alle belangrijke overheidsspelers op securitygebied en een breed publiek ontmoetten elkaar op de eerste Belgian Internet Security Conference.

Met de aanwezigheid van het Cert.be security response-team, de FCCU- cybermisdaadbestrijdingseenheid, het B-CCENTRE met een educatieve opdracht, evenals vertegenwoordigers van de FOD’s Economie en Justitie en de diensten van het kabinet van de Eerste Minister, waren duidelijk de hoofdspelers rond de verwachte Belgische Nationale Cyber Security Strategie aanwezig. Blijkbaar groeit bij de overheid het inzicht hoezeer security van belang is voor de economie en de economische slagkracht van bedrijven. Pascal Petry, security advisor bij de diensten van de Eerste Minister, benadrukte in zijn inleiding dat in zo’n strategie tevens een rol is weggelegd voor de expertise in de bedrijfswereld, ook al omdat een groot deel van de kritieke nationale infrastructuur door het bedrijfsleven wordt beheerd. Voorts moeten alle niveaus, tot en met het lokale hun verantwoordelijkheid nemen.

In dat opzicht was het interessant om tijdens het debat het spanningsveld te zien tussen de CERT.BE die meldingen van securityvoorvallen in absolute confidentialiteit behandelt, en de FCCU, die uiteraard graag tot vervolging en veroordeling overgaat. Alle instanties dringen in ieder geval er op aan dat voorvallen worden gemeld, om een betere kijk te krijgen op de reële cybersecurityproblematiek in onze contreien. Een wettelijke verplichting tot melding, werd door alle deelnemers aan het debat, waaronder Beltug, als niet behulpzaam gezien. Belangrijk is dat iedereen – van de overheid tot de individuele burgers – aandacht besteedt aan security en dat alle betrokken actoren – overheid, privé, de academische wereld, organisaties… – in vertrouwen samenwerken, de activiteiten en initiatieven coördineren en werken aan een beter securitybesef. Dat laatste geldt zowel de aandacht voor defensieve maatregelen (‘achteloosheid’ was een gehoorde term) als het voorkomen van problemen (onvoldoende ‘security by design’).

Source :http://datanews.knack.be

JL Gestion nv Opleiding

JL Gestion nv Opleiding

CONTACT :

JLGESTION

Belgische Onafhankelijkheidlaan 58
1081 Brussel
Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Mobiel: +32 485 212 722
Email : selossej@jlgestion.be

Onze voordelen:

Aard van de opleiding: Inter-company, intra-bedrijfs-en prive-
Training 100% flexibele en persoonlijke: U kiest de plaats, datum en trainingsprogramma
Citaat: Response in 24 uur.
50% korting voor KMO’s Brussel
Parkeergelegenheid, Gratis drankje en lunch
Toegang tot onze competence center: Syllabus, cursus, oefeningen, …

JL Gestion Informatica opleidingen

Vraag een gratis offerte door het invullen van ons online formulier

 

 

Microsoft Works cursus – België

Works vertoont vele gelijkenissen met MS Office maar brengt een vereenvoudigde versie van Word, Excel en Access samen in één pakket. Een brede waaier aan vooropgestelde wizards, biedt u de mogelijkheid om mooi ogende documenten te maken met een minimum aan basiskennis. In de nieuwere versie van Works zit ook een agenda verwerkt.
Deze opleiding wordt enkel aangeboden als bedrijfsopleiding. Meer informatie over data en prijzen kan u aanvragen via het formulier of op 03.239.54.67

Inhoud opleiding Microsoft Works

Introduction

  • Works tools
  • Opening existing documents
  • Task wizards

Word processing

  • Naming and saving
  • Viewing documents
  • Entering text
  • Text alignment
  • Correcting/deleting/copying/moving text
  • Find and replace
  • Bold/italic and underlining text
  • Sizing text
  • Fonts
  • Colouring text
  • Easy text
  • Spell-checking

Word processing; layout

  • Margins
  • Paragraphs
  • Indenting
  • Hanging indents
  • Setting tabs
  • Moving and removing tabs
  • Tab leaders
  • Page set up
  • Headers and footers
  • Page numbers
  • Printing/deleting documents

Word Processing; Miscellaneous

  • Bullet Lists
  • Word Art
  • Clip Art
  • Tables
  • Envelopes

Spreadsheet – Entering Data

  • Naming and Saving
  • Viewing Spreadsheets
  • Columns and Rows
  • Entering Data
  • Changing an Entry
  • Clearing an Entry
  • Decimal Places
  • Repeating Rows
  • Repeating Columns
  • Series of Numbers
  • Series of Dates
  • Copying Entries
  • Moving Entries
  • Aligning Entries
  • Bold
  • Change Font Size
  • Change Font of Entry
  • Change Colour of Entry
  • Form Entry as Currency
  • Number Formats
  • Date and Time

Spreadsheet – Calculations & Layout

  • Easy Calculations
  • Total a Row/Column
  • Creating Formulas
  • Cell Ranges
  • Using Functions
  • Addi
  • Changing Rows/Columns
  • Deleting Rows/Columns
  • Wrapping Text in a Cell
  • Borders and Shading
  • Page Set-up
  • Printing & Previewing
  • Headers and Footers
  • Deleting a Spreadsheet

Spreadsheet Charts

  • Creating a Chart
  • Changes to a Chart
  • Change Chart Type
  • Change Chart Title
  • Chart Colour & Pattern
  • Adding Entries
  • Chart Legends
  • Customize Chart Text
  • Printing Charts
  • Charts in Other Documents
  • Linking Charts
  • Deleting Charts

Data Base – Data Entry

  • Naming and Saving
  • Viewing
  • Adding Fields
  • Adding Records
  • Copying Data
  • Changing Data
  • Deleting Data

Data Base – Displaying Information

  • Selecting Fonts
  • Colouring Text
  • Displaying Number
  • Displaying Dates

Data Base – Getting Information

  • Sorting Data
  • Filtering Data
  • Marking Records

Data Base – Form Design

  • Form Design
  • Form Colouring
  • Tab Order
  • Using Note-Its
  • Form Label
  • WordArt
  • Using Clip Art
  • Insert a Drawing
  • Insert a Picture
  • Insert a Table or Chart

Data Base Reports

  • Creating Reports
  • Previewing & Printing Reports
  • Viewing a Report
  • Deleting a Report

Data Base Misc

  • Creating an Address Book
  • Mass Mailing/Form Letters
  • Printing Envelopes
  • Mailing Labels

Communications

  • MS Exchange & MS Fax
  • Set-up for Sending a Fax
  • Sending a Fax
  • Set-up for Receiving a Fax
  • Receiving a Fax
  • Connecting to MS Network

Microsoft Draw

  • Starting
  • Drawing Tools
  • Selecting Colours
  • Zoom
  • Bring to Front/Send to Back
  • Import
  • Update Changes
  • Sizing/Editing
  • Cut/Copy
  • Adding Text
  • Group/Ungroup
  • Rotate

Bron: http://www.ect.be/cursus/works/opleiding-works.html

Formation informatique new media

CONTACT :

JLGESTION

Belgische Onafhankelijkheidlaan 58
1081 Brussel
Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Mobiel: +32 485 212 722
Email : selossej@jlgestion.be

Onze voordelen:

Aard van de opleiding: Inter-company, intra-bedrijfs-en prive-
Training 100% flexibele en persoonlijke: U kiest de plaats, datum en trainingsprogramma
Citaat: Response in 24 uur.
50% korting voor KMO’s Brussel
Parkeergelegenheid, Gratis drankje en lunch
Toegang tot onze competence center: Syllabus, cursus, oefeningen, …

Training Securing Web Applications, Services and Servers – 4 days

Class overview :

Cybersecurity is a serious challenge today as attackers specifically target Web application vulnerabilities. These vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity.

Class goals :

  • Implement and test secure Web applications in your organization
  • Identify, diagnose and correct the most serious Web application vulnerabilities
  • Configure a Web server to encrypt Web traffic with HTTPS
  • Protect Ajax-powered Web 2.0 applications
  • Secure XML Web services with WS-Security
  • Audit Web application security with manual and automated scanning

Content of Securing Web Applications, Services and Servers

Setting the Stage

  • Defining threats to your Web assets
  • Surveying the legal landscape and privacy issues
  • Exploring common vulnerabilities

Establishing Security Fundamentals

Modeling Web security

  • Achieving Confidentiality, Integrity and Availability (CIA)
  • Performing authentication and authorization

Encrypting and hashing

  • Distinguishing public- and private-key cryptography
  • Verifying message integrity with message digests, digital signatures and digital certificates

Augmenting Web Server Security

Configuring security for HTTP services

  • Managing software updates
  • Restricting HTTP methods

Securing communication with SSL/TLS

  • Obtaining and installing server certificates
  • Enabling HTTPS on the Web server
  • Protecting the exchange of credentials

Detecting unauthorized modification of content

  • Configuring permissions correctly
  • Scanning for file-system changes

Implementing Web Application Security

Employing OWASP resources

  • The Open Web Application Security Project (OWASP) Top Ten
  • Recognizing cybersecurity risks
  • Remediating identified vulnerabilities

Securing database and application interaction

  • Uncovering and preventing SQL injection
  • Defending against an insecure direct object reference
  • Limitations of encrypting database content

Managing session authentication

  • Protecting against session ID hijacking
  • Enforcing URL access control
  • Blocking cross-site request forgery

Controlling information leakage

  • Displaying sanitized error messages to the user
  • Handling request and page faults

Performing input validation

  • Establishing trust boundaries
  • Revealing and removing the threat of cross-site scripting (XSS)
  • Exposing the dangers of client-side validation
  • Preventing E-shoplifting

Enhancing Ajax Security

Ajax features

  • Identifying core Ajax components
  • Exchanging information asynchronously

Assessing risks and evaluating threats

  • Managing unpredictable interactions
  • Exposing JSON vulnerabilities

Securing XML Web Services

Diagnosing XML vulnerabilities

  • Identifying nonterminated tags and field overflows
  • Uncovering Web service weaknesses

Protecting the SOAP message exchange

  • Validating input with an XML schema
  • Encrypting exchanges with HTTPS
  • Implementing WS-Security with a framework
  • Authenticating access to Web services

Scanning Applications for Weaknesses

Operating and configuring scanners

  • Matching patterns to identify faults
  • « Fuzzing » to discover new or unknown vulnerabilities

Detecting application flaws

  • Scanning applications remotely
  • Strategies for testing and scanning
  • Testing Web applications with Netcat, Cryptcat and Wget
  • Intercepting traffic with OWASP WebScarab

Best Practices for Web Security

Adopting standards

  • Reducing risk by implementing proven architectures
  • Handling personal and financial data
  • Developing guidelines for logging

Managing network security

  • Modeling threats to reduce risk
  • Integrating applications with your network architecture
Securing Web Applications, Services and Servers

Training Securing Web Applications, Services and Servers

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Téléchargement : les trois meilleurs logiciels de la semaine

  • Norton Internet Security

    La nouvelle version 2013 de Norton Internet Security offre de nouvelles prestations toujours plus poussées. Vous découvrez notamment les cinq couches de protection contre les virus qui bloquent l’accès des trojans, spywares, et toutes sortes de menaces. Parmi les nouveautés les plus attendues : Norton Management qui permet de contrôler votre antivirus dans le Cloud, Insight qui analyse les fichiers inconnus, Norton Pulse Updates qui met à jour votre système toutes les cinq à quinze minutes… L’analyse comportementale Sonar, la détection des sites de phishing, la protection proactive de votre navigateur, les mises à jour de version et de signature de virus font également partie des points forts de ce millésime 2013.

     

  • AVG Antivirus Free Edition

AVG Antivirus Free Edition est une solution antivirus permettant de protéger de façon fiable votre ordinateur et vos données. Légère en ressources et simple d’utilisation, l’application propose une protection en temps réel afin de bloquer les virus, vers et trojans dès l’ouverture de documents ou le lancement des programmes.
Note : cette version gratuite ne comporte aucun support technique de la part de l’éditeur.

  • Screenpresso

    Gérez de manière quasi professionnelle vos captures d’écran en images et en vidéos grâce à Screenpresso. Très fonctionnel, ce logiciel vous donne la possibilité de choisir quelle partie de l’écran vous souhaitez copier comme l’écran dans sa totalité ou une partie bien spécifique que vous délimitez vous-même. La capture d’écran(screenshot) ou vidéo (screencast) s’effectue alors rapidement et Screenpresso vous propose de retoucher vos images directement depuis son interface, d’ajouter des effets, du texte, de rogner, de redimensionner, etc. Enfin, une option vous donne l’opportunité de visualiser l’historique de toutes vos captures et de les partager sur vos réseaux sociaux favoris.

Training Ethical Hacker – 5 days

Class overview :

This program  prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Class goals :

• Developing the hacker’s mind. • Network surveying. • Port scanning. • System identification/OS fingerprinting. • Vulnerability research and verification. • Service identification. • Internet application testing. • Document grinding. • Recognizing security issues within an organization. • Performing legal assessments on remote/foreign networks. • Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor. • Implementing the right tools for each task of the Methodology • Competitive Intelligence. • Exploiting vulnerabilities remotely. • Examining appropriate countermeasures to thwart malicious hacking.

Content of Ethical Hacker

This class will immerse the student into an interactive environment where they will be shown how to scan, test, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about intrusion detection, policy creation, social engineering, open source intelligence, incident handling, and log interpretation.

Ethical Hacker

Training Ethical Hacker

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This program  prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Training VMware vSphere 4: Manage and design for security – 3 days

Class overview :

This course shows you how to follow best practices for secure design, deployment, and operation of a VMware vSphere environment. Through lecture, discussion, and hands-on practice, you will gain the knowledge and skills necessary to meet the security and compliance goals of your organization.

Class goals :

After completing this course, you should be able to:

  • Identify vulnerabilities in the current design of a vSphere environment and recommend corrective actions
  • Harden vSphere components as described in vSphere Hardening Guide
  • Recommend configuration and change management policies, processes, and systems

Content of VMware vSphere 4: Manage and Design for Security

Course Introduction

  • Introductions and course logistics
  • Online resources for security and compliance

Security in a Virtual Environment

  • Review of information security and risk management concepts
  • How virtualization affects security and compliance
  • Top vulnerabilities in a virtual environment
  • Basic guidelines for securing a virtual environment
  • Security tools and technologies

Secure Virtual Networking

  • vNetwork security architecture
  • Network segmentation and traffic isolation
  • Secure virtual network configuration
  • Traffic isolation with private VLANs

Protecting the Management Environment

  • vCenter Server authentication, authorization, and accounting
  • Working with SSL certificates
  • Hardening the vCenter Server system

Protecting VMware ESX/ESXi Host Systems

  • ESX and ESXi security architecture
  • Controlling access to storage
  • Hardening ESX and ESXi hosts

Hardening Virtual Machines

  • Virtual machine security architecture
  • Configuring security parameters

Configuration and Change Management

  • Configuration and change management goals and guidelines
  • Maintaining the proper configuration of vSphere components
  • Monitoring logs for security-related events
  • Configuration and change management tools and technologies
VMware VSphere 4

Training VMware VSphere 4

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …