SlideShare une entreprise Scribd logo
ATTESTATION DE SUIVI
« Je sousigné, M. Olivier Levillain, responsable du centre de formation de l'Agence nationale de sécurité
des systèmes d'information (ANSSI), atteste que M. YOUSSEF CHELLY a suivi avec succès les cours des quatre modules
du MOOC SecNumacadémie et obtenu les scores suivants aux évaluations :
MODULES DATE DE L'ÉVALUATION SCORE
PANORAMA DE LA SSI 09/04/2018 86%
SÉCURITÉ DE L'AUTHENTIFICATION 10/04/2018 84%
SÉCURITÉ SUR INTERNET 09/04/2018 92%
SÉCURITÉ DU POSTE DE TRAVAIL ET NOMADISME 10/04/2018 84%
www.secnumacademie.gouv.fr
Fait le 10 Avril 2018
Olivier Levillain
Powered by TCPDF (www.tcpdf.org)

Contenu connexe

Tendances

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra
 
Cybersec requirements implementation by OKI (KMU 518)
Cybersec requirements implementation by OKI (KMU 518)Cybersec requirements implementation by OKI (KMU 518)
Cybersec requirements implementation by OKI (KMU 518)
Anastasiia Konoplova
 
랜섬웨어
랜섬웨어랜섬웨어
랜섬웨어
JihyeonLee01
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
 
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
Leonardo Nve Egea
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
zhihaochen
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
Shamsherkhan36
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
Priyanka Aash
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
 
2017 DevSecCon ZAP Scripting Workshop
2017 DevSecCon ZAP Scripting Workshop2017 DevSecCon ZAP Scripting Workshop
2017 DevSecCon ZAP Scripting Workshop
Simon Bennetts
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Sécurité des applications web: attaque et défense
Sécurité des applications web: attaque et défenseSécurité des applications web: attaque et défense
Sécurité des applications web: attaque et défense
Antonio Fontes
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
Netwax Lab
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
Ivanti
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
Wail Hassan
 
DNS güvenliği
DNS güvenliğiDNS güvenliği
DNS güvenliği
Alper Başaran
 

Tendances (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cybersec requirements implementation by OKI (KMU 518)
Cybersec requirements implementation by OKI (KMU 518)Cybersec requirements implementation by OKI (KMU 518)
Cybersec requirements implementation by OKI (KMU 518)
 
랜섬웨어
랜섬웨어랜섬웨어
랜섬웨어
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
 
2017 DevSecCon ZAP Scripting Workshop
2017 DevSecCon ZAP Scripting Workshop2017 DevSecCon ZAP Scripting Workshop
2017 DevSecCon ZAP Scripting Workshop
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
DLL Injection
DLL InjectionDLL Injection
DLL Injection
 
Sécurité des applications web: attaque et défense
Sécurité des applications web: attaque et défenseSécurité des applications web: attaque et défense
Sécurité des applications web: attaque et défense
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
DNS güvenliği
DNS güvenliğiDNS güvenliği
DNS güvenliği
 

Plus de Youssef Chelly

ISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead AuditorISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead Auditor
Youssef Chelly
 
Attestation RGPD
Attestation RGPDAttestation RGPD
Attestation RGPD
Youssef Chelly
 
ISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead ImplementerISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead Implementer
Youssef Chelly
 
Expert Auditor in Computer Security
Expert Auditor in Computer SecurityExpert Auditor in Computer Security
Expert Auditor in Computer Security
Youssef Chelly
 
ISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead AuditorISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead Auditor
Youssef Chelly
 
ITIL® Foundation Certificate in IT Service Management
ITIL® Foundation Certificate in IT Service ManagementITIL® Foundation Certificate in IT Service Management
ITIL® Foundation Certificate in IT Service Management
Youssef Chelly
 
ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)
Youssef Chelly
 

Plus de Youssef Chelly (7)

ISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead AuditorISO 27001 Senior Lead Auditor
ISO 27001 Senior Lead Auditor
 
Attestation RGPD
Attestation RGPDAttestation RGPD
Attestation RGPD
 
ISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead ImplementerISO 27001 Senior Lead Implementer
ISO 27001 Senior Lead Implementer
 
Expert Auditor in Computer Security
Expert Auditor in Computer SecurityExpert Auditor in Computer Security
Expert Auditor in Computer Security
 
ISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead AuditorISO IEC 27001 Lead Auditor
ISO IEC 27001 Lead Auditor
 
ITIL® Foundation Certificate in IT Service Management
ITIL® Foundation Certificate in IT Service ManagementITIL® Foundation Certificate in IT Service Management
ITIL® Foundation Certificate in IT Service Management
 
ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)ISO 27001 Lead Implementer (PECB)
ISO 27001 Lead Implementer (PECB)
 

Attestation SecNumacademie

  • 1. ATTESTATION DE SUIVI « Je sousigné, M. Olivier Levillain, responsable du centre de formation de l'Agence nationale de sécurité des systèmes d'information (ANSSI), atteste que M. YOUSSEF CHELLY a suivi avec succès les cours des quatre modules du MOOC SecNumacadémie et obtenu les scores suivants aux évaluations : MODULES DATE DE L'ÉVALUATION SCORE PANORAMA DE LA SSI 09/04/2018 86% SÉCURITÉ DE L'AUTHENTIFICATION 10/04/2018 84% SÉCURITÉ SUR INTERNET 09/04/2018 92% SÉCURITÉ DU POSTE DE TRAVAIL ET NOMADISME 10/04/2018 84% www.secnumacademie.gouv.fr Fait le 10 Avril 2018 Olivier Levillain Powered by TCPDF (www.tcpdf.org)