Our fun and professionnal training courses
With our trainings, we help companies raise their employees’ cybersecurity awareness, through a fun escape game, phishing or technical trainings.
Our trainings
Escape Game
During this 40-minute team-building game, 2 to 4 people will put themselves in the shoes of a hacker and will try to recover secret information about their target: Alexandre Dubois.
To do this, they will have to solve a number of challenges (badge cloning, lockpicking, etc.) to achieve their goal: obtaining the identifiers of Alexandre’s website and steal its secret content.
At the end of their test, participants will complete a short questionnaire of 10 questions related to cybersecurity and to the challenges solved. The latter will be used to understand, within the client’s organization, what are the points where the participants lack the most awareness in terms of cybersecurity (e.g. risks related to phishing, QR codes, etc.).
Target audience: Any employee.
- }Average time required: 30 people / day
- From : 30 € HT / person
Ethical hacking of Web applications
During this two-day training, a simulated attack on a vulnerable Web application will be simulated by the trainees. Thus, they will be able to familiarize themselves with the different types of attacks of the OWASP top 10.
During the first morning, the theory around existing vulnerabilities will be discussed. The remaining day and a half will be reserved for the exploitation of the presented vulnerabilities. For example, vulnerabilities such as SQL injection, XSS, CSRF or command injection will be presented.
With this training, students will become aware of the impact that could be caused if such flaws were to be present in their system.
Target audience: web developers or any other person with technical skills wanting to understand how web application hacking works.
- }Average time required (including report and mgmt): 2 days / training
- From : 500 € HT / person
Ethical hacking of internal infrastructure
During this five-day training, a simulated attack on a vulnerable (fictitious) corporate network will be simulated by the trainees. This simulation will be carried out from the point of view of an attacker who has already penetrated the network (for example, through a phishing email).
Thus, the students will be able to familiarize themselves regarding how hackers operate. In particular, they will see how recognition, exploitation, elevation of privileges and pivoting are performed. Attacks on the Active Directory will also be discussed.
The training will be approached by chapter, starting with the associated theory and then putting it into practice. Automated tools will be used such as Nmap, Nessus or Metasploit. In addition, some vulnerabilities will be exploited manually on services such as Kerberos, FTP, HTTP or SMB.
With this training, students will become aware of the impact that could be caused if such flaws were to be present in their networks.
Target audience: network engineers or any other person with technical skills wanting to understand how corporate hacking works.
- }Average time required (including report and mgmt): 5 days / training
- From : 1500 € HT / person