2 – Environments secured by I2A

or log in to view this course.

This course aims to introduce you to the functional and technical environments secured by I2A :

  • What are the solutions and uses cases monitored by I2A ?
  • What are the main interfaces and mechanisms provided by these environments ?

At the end of each lesson, you will be able to answer a number of questions to validate your understanding

Lessons