Our training

Take advantage of cybersecurity training created and delivered by experienced consultants.

Our training courses are offensive security oriented, with a strong hands-on focus allowing participants to emerge having already applied the concepts covered at least once.

Contact us for details about our cybersecurity training and to find out how to participate.

    Our catalog of intrusion testing training courses

    Entry-level

    Capture The Flag (CTF) for security teams or security champions (0.5 d)

    External Pentest I : passive and active reconnaissance phases (1 d)

    Web Pentest I : passive and active reconnaissance phases (1 d)

    Web Pentest II : Information leaks & User inputs (3 d)

    Web Pentest III : Access control & Authentication / Authorization (2 d)

    Web Pentest IV : Business logic & Race conditions (1 d)

    Privilege escalations on Linux (1 d)

    Internal Pentest I : reconnaissance and quick wins (1 d)

    Advanced

    External Pentest: exploitation of misconfigurations and CVE, pivots in DMZ and internal networks (3 d)

    Pentester: job basics (1 d)

    Internal Pentest II : Active Directory attacks (2 d)

    Privilege escalations (escapes) on Docker (1 d)

    Custom / specific subject: contact us