{"id":8,"date":"2026-01-02T20:12:07","date_gmt":"2026-01-02T20:12:07","guid":{"rendered":"https:\/\/m2duse.fr\/?page_id=8"},"modified":"2026-03-10T12:16:38","modified_gmt":"2026-03-10T12:16:38","slug":"formations","status":"publish","type":"page","link":"https:\/\/m2duse.fr\/index.php\/formations\/","title":{"rendered":"Formations"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">L&rsquo;organisme de formation M2duse, certifi\u00e9 Qualiopi pour la cat\u00e9gorie <strong>actions de formation<\/strong>, propose des formations techniques orient\u00e9es bas niveau (assembleur x64 offensif\/d\u00e9fensif).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"http:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/certificat-QUA009356-2026-03-10T11_16_40.615Z_0PQJ409QQ1WQY.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"391\" height=\"186\" src=\"http:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_qualiopi.png\" alt=\"\" class=\"wp-image-149\" style=\"aspect-ratio:2.102272779347625;width:201px;height:auto\" srcset=\"https:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_qualiopi.png 391w, https:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_qualiopi-300x143.png 300w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>La certification qualit\u00e9 a \u00e9t\u00e9 d\u00e9livr\u00e9e au titre <\/em><br><em>des cat\u00e9gories d&rsquo;actions suivantes: <\/em><br><em><strong>ACTIONS DE FORMATION<\/strong><\/em><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"265\" src=\"http:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_icpf.jpg\" alt=\"\" class=\"wp-image-152\" style=\"aspect-ratio:2.2640699235823747;width:200px;height:auto\" srcset=\"https:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_icpf.jpg 600w, https:\/\/m2duse.fr\/wp-content\/uploads\/2026\/03\/logo_icpf-300x133.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Assembleur x64 offensif<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\"><strong>Vous avez toujours voulu plonger au c\u0153ur des binaires, comprendre ce qui se cache derri\u00e8re un shellcode ou coder vos propres payloads ?<br>Cette formation en assembleur x64 offensif vous ouvre les portes des techniques utilis\u00e9es dans le monde offensif de la cyber-s\u00e9curit\u00e9.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Pendant 2 jours intensifs, vous apprendrez \u00e0 \u00e9crire du code en assembleur, \u00e0 analyser la structure des ex\u00e9cutables Windows (PE), \u00e0 d\u00e9boguer avec x64dbg, et \u00e0 manipuler les techniques d\u2019injection de code et de DLL. Vous irez jusqu\u2019\u00e0 cr\u00e9er et modifier vos propres shellcodes pour contourner certaines d\u00e9fenses antivirus, comme le font les attaquants r\u00e9els.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Une formation r\u00e9solument pratique, taill\u00e9e pour ceux qui veulent comprendre en profondeur le fonctionnement des programmes, et acqu\u00e9rir des comp\u00e9tences directement applicables en cybers\u00e9curit\u00e9 offensive.<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Dur\u00e9e&nbsp;:<\/strong> 2 jours<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Modalit\u00e9&nbsp;:<\/strong> Pr\u00e9sentiel (dans les locaux des entreprises clientes)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Public vis\u00e9&nbsp;:<\/strong> Professionnels de la cybers\u00e9curit\u00e9 (pentesters, analystes reverse, blue\/red teamers, etc)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Langue<\/strong>: Fran\u00e7ais<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Pr\u00e9requis&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bases en programmation (C, C++)<\/li>\n\n\n\n<li>Connaissance g\u00e9n\u00e9rale du fonctionnement d\u2019un syst\u00e8me d\u2019exploitation (Windows)<\/li>\n\n\n\n<li>Sensibilit\u00e9 \u00e0 la s\u00e9curit\u00e9 offensive ou exp\u00e9rience en pentest\/reverse engineering<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Objectifs p\u00e9dagogiques&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ecrire un programme en assembleur x64<\/li>\n\n\n\n<li>Connaitre les diff\u00e9rences fondamentales entre GNU Linux\/Windows<\/li>\n\n\n\n<li>Connaissance approfondie du format PE<\/li>\n\n\n\n<li>Analyse dynamique d&rsquo;un programme (x64dbg\/WinDbg\/gdb\/edb)<\/li>\n\n\n\n<li>Analyse statique d\u2019un programme (IDA)<\/li>\n\n\n\n<li>Mettre en \u0153uvre des techniques d\u2019injection de code\/DLL basiques<\/li>\n\n\n\n<li>Coder et analyser des shellcodes (Windows)<\/li>\n\n\n\n<li>Modifier des shellcodes existant (ex Metasploit) pour contourner certaines solutions de s\u00e9curit\u00e9<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Programme p\u00e9dagogique&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Jour 1&nbsp;:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Introduction \u00e0 l\u2019assembleur x64&nbsp;: registres, instructions de base, convention d\u2019appel, etc.<\/li>\n\n\n\n<li>Prise en main des outils (Visual Studio, MASM, IDA, x64dbg, etc.)<\/li>\n\n\n\n<li>Structure d\u2019un ex\u00e9cutable Windows (PE)<\/li>\n\n\n\n<li>Techniques de debugging et d\u2019analyse dynamique<\/li>\n\n\n\n<li>Exercices pratiques&nbsp;: premiers programmes en assembleur (Windows\/Linux)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Jour 2&nbsp;:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Injections de code\/DLL&nbsp;: th\u00e9orie et mise en pratique<\/li>\n\n\n\n<li>Shellcodes&nbsp;: fonctionnement, analyse et \u00e9criture<\/li>\n\n\n\n<li>Modification de shellcodes existants (Metasploit) pour \u00e9vasion AV<\/li>\n\n\n\n<li>Mise en situation finale&nbsp;: d\u00e9veloppement et ex\u00e9cution d\u2019un shellcode personnalis\u00e9.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>M\u00e9thodes p\u00e9dagogiques&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Alternance d\u2019apports th\u00e9oriques et de travaux pratiques sur machine<\/li>\n\n\n\n<li>Etudes de cas et exercices inspir\u00e9s de sc\u00e9narios r\u00e9els<\/li>\n\n\n\n<li>Supports fournis&nbsp;: slides, PDF, machines virtuelles pr\u00eates \u00e0 l\u2019emploi<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Moyens techniques et mat\u00e9riels&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ordinateurs portables avec 8-16Go de RAM minimum pour permettre de faire tourner en m\u00eame temps une VM Windows et une VM GNU Linux<\/li>\n\n\n\n<li>Syst\u00e8mes d&rsquo;exploitations:\n<ul class=\"wp-block-list\">\n<li>1 VM Windows 11 avec suite de d\u00e9veloppement C++ Visual Studio install\u00e9<\/li>\n\n\n\n<li>1 VM GNU Linux avec Metasploit install\u00e9<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Une liste d&rsquo;outils compl\u00e9mentaires \u00e0 installer sera fournie en amont<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Modalit\u00e9s d\u2019\u00e9valuation&nbsp;:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Quiz final (connaissances th\u00e9oriques)<\/li>\n\n\n\n<li>Exercices pratiques validant les comp\u00e9tences acquises<\/li>\n\n\n\n<li>Attestation de r\u00e9ussite en fin de formation<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Accessibilit\u00e9&nbsp;:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La formation se d\u00e9roulant dans les locaux des entreprises clientes, l\u2019accessibilit\u00e9 repose sur leurs installations. Le rythme et le support p\u00e9dagogique peuvent \u00eatre adapt\u00e9s si n\u00e9cessaire (support \u00e9crit, explication suppl\u00e9mentaires, flexibilit\u00e9 horaire)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Tarif:<\/strong> <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2350 \u20ac TTC\/personne (5-12 personnes)<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Prise de contact:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>voir la section Contact<\/em><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>T\u00e9moignage et retours clients<\/strong>:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>A venir&#8230;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assembleur x64 d\u00e9fensif<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>A venir<\/em><\/strong>&#8230;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;organisme de formation M2duse, certifi\u00e9 Qualiopi pour la cat\u00e9gorie actions de formation, propose des formations techniques orient\u00e9es bas niveau (assembleur x64 offensif\/d\u00e9fensif). Assembleur x64 offensif Vous avez toujours voulu plonger au c\u0153ur des binaires, comprendre ce qui se cache derri\u00e8re un shellcode ou coder vos propres payloads ?Cette formation en assembleur x64 offensif vous ouvre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":24,"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":154,"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions\/154"}],"wp:attachment":[{"href":"https:\/\/m2duse.fr\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}