{"id":18955,"date":"2022-06-01T15:25:01","date_gmt":"2022-06-01T13:25:01","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=18955"},"modified":"2022-06-01T15:25:01","modified_gmt":"2022-06-01T13:25:01","slug":"incident-response-training","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/incident-response-training\/18955\/","title":{"rendered":"Les comp\u00e9tences essentielles pour r\u00e9pondre \u00e0 un incident"},"content":{"rendered":"<p>Lorsqu\u2019une entreprise est victime d\u2019une attaque informatique, ou que des donn\u00e9es professionnelles sont divulgu\u00e9es, celle-ci essaie d\u00e9sesp\u00e9r\u00e9ment de r\u00e9soudre deux probl\u00e8mes\u00a0: minimiser les d\u00e9g\u00e2ts et reprendre un flux de travail normal d\u00e8s que possible. La charge de travail qui d\u00e9coule de la r\u00e9solution de ces probl\u00e8mes affecte principalement l\u2019\u00e9quipe de r\u00e9ponse aux incidents.<\/p>\n<p>L\u2019efficacit\u00e9 de leurs actions affecte la rapidit\u00e9 de d\u00e9tection de l\u2019origine du probl\u00e8me et le niveau de protection de l\u2019entreprise dans le cas o\u00f9 l\u2019incident se reproduirait. Apr\u00e8s tout, les cybercriminels essaient d\u2019entraver l\u2019enqu\u00eate et d\u2019effacer les traces de leur pr\u00e9sence dans l\u2019infrastructure de la victime pour qu\u2019il soit impossible d\u2019avoir une identification pr\u00e9cise et que l\u2019\u00e9quipe ne puisse pas identifier l\u2019ensemble de la cha\u00eene d\u2019attaque. Ainsi, si les escrocs utilisent les m\u00eames m\u00e9thodes d\u2019attaque, la protection de l\u2019entreprise ne peut pas \u00eatre garantie.<\/p>\n<p>Nos experts ont identifi\u00e9 un ensemble de comp\u00e9tences essentielles pour un sp\u00e9cialiste en r\u00e9ponse aux incidents :<\/p>\n<ul>\n<li>D\u00e9tection de l\u2019incident<\/li>\n<li>Obtention des preuves<\/li>\n<li>Analyse du journal<\/li>\n<li>Analyse du r\u00e9seau<\/li>\n<li>Cr\u00e9ation des indicateurs de compromission<\/li>\n<li>M\u00e9moire judiciaire<\/li>\n<\/ul>\n<p>Pour perfectionner les comp\u00e9tences de l\u2019\u00e9quipe de r\u00e9ponse aux incidents informatiques, Kaspersky a cr\u00e9\u00e9 la formation en ligne <em>Windows Incident Response<\/em>. Elle s\u2019appuie sur l\u2019exp\u00e9rience des experts de notre \u00e9quipe <em>Global Emergency Response Team<\/em> (GERT) qui se battent contre les menaces informatiques avanc\u00e9es du monde entier depuis 12 ans.<\/p>\n<p>Cette formation est dispens\u00e9e par deux experts certifi\u00e9s de l\u2019\u00e9quipe GERT qui partagent leur exp\u00e9rience personnelle. Entre autres, les \u00e9tudiants seront capables d\u2019explorer le processus d\u2019identification d\u2019un incident en prenant le cas pratique du ransomware REvil.<\/p>\n<p>Les personnes inscrites \u00e0 la formation auront acc\u00e8s \u00e0 40 cours vid\u00e9o, pourront acqu\u00e9rir des comp\u00e9tences pratiques dans un environnement virtuel et ma\u00eetriseront tous les outils n\u00e9cessaires comme ELK Stack, PowerShell, Suricata, YARA et autres. Cette formation dure environ 15 heures, mais les participants disposeront de 100 heures d\u2019acc\u00e8s au laboratoire virtuel et de six mois pour compl\u00e9ter la formation.<\/p>\n<p>Ce cours s\u2019adresse aux professionnels ayant des connaissances et une exp\u00e9rience de base dans la r\u00e9solution de probl\u00e8mes Windows. Ils devraient aussi conna\u00eetre les commandes du syst\u00e8me d\u2019exploitation Linux. Vous pouvez obtenir plus de renseignements sur la formation <em>Windows Incident Response<\/em> sur le <a href=\"https:\/\/xtraining.kaspersky.com\/courses\/windows-incident-response?icid=fr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">portail de formation des experts de Kaspersky<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qu\u2019est-ce qu\u2019un sp\u00e9cialiste en r\u00e9ponse aux incidents devrait savoir faire et comment peut-il am\u00e9liorer ses comp\u00e9tences ?<\/p>\n","protected":false},"author":2581,"featured_media":18957,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2112,3150],"tags":[3031,2476,4284],"class_list":{"0":"post-18955","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-formation","10":"tag-reponse-aux-incidents","11":"tag-xtraining"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/incident-response-training\/18955\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/incident-response-training\/24203\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/incident-response-training\/19685\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/incident-response-training\/26528\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/incident-response-training\/24486\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/incident-response-training\/24840\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/incident-response-training\/27210\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/incident-response-training\/33219\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/incident-response-training\/44414\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/incident-response-training\/19504\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/incident-response-training\/25064\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/incident-response-training\/30566\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/incident-response-training\/30315\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/reponse-aux-incidents\/","name":"r\u00e9ponse aux incidents"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=18955"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18955\/revisions"}],"predecessor-version":[{"id":18959,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18955\/revisions\/18959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/18957"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=18955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=18955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=18955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}