{"id":2622,"date":"2024-10-22T15:22:37","date_gmt":"2024-10-22T15:22:37","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/our-training-courses\/"},"modified":"2026-03-31T15:04:42","modified_gmt":"2026-03-31T15:04:42","slug":"our-training-courses","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/our-training-courses\/","title":{"rendered":"Our training courses"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;137deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/PATTERN-HEADER.png&#8221; background_position=&#8221;top_left&#8221; background_horizontal_offset=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;8vw||8vw||false|false&#8221; custom_padding_tablet=&#8221;15vw||15vw||true|false&#8221; custom_padding_phone=&#8221;20vw||20vw||true|false&#8221; bottom_divider_style=&#8221;asymmetric&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_phone=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c4d64208-0f63-40a8-bbdd-efdc4f45c38b&#8221; header_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||||false|false&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>OUR TRAININGS<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Training: the key to better protection<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;77%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;|-49px||||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Escape games for novices, technical training for developers, targeted sessions for system administrators&#8230;<\/p>\n<p style=\"text-align: justify;\">Each workshop is designed to enhance employee skills and reduce risk to your business.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAifX0=@&#8221; button_text=&#8221;Contact us&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2072&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_icon_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#1A1A31&#8243; button_icon_color__hover=&#8221;#1A1A31&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_2_text_align=&#8221;center&#8221; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_2_text_align_tablet=&#8221;left&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; text_font_size=&#8221;24px&#8221;]<\/p>\n<h2><span style=\"font-size: x-large;\">ESCAPE GAME CYBERSECURITY<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3><span style=\"font-weight: 400;\">Play the role of a hacker and try to steal a competitor&#8217;s secret formula.<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;70%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Offer your teams an immersive experience to reinforce their knowledge and raise their awareness of cybersecurity, while stimulating cohesion and team spirit.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Test your employees&#8217; hacking skills<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">In this 40-minute team-building game, you take on the role of hackers in teams of 2 to 4, trying to recover confidential information about their target: Alexandre Dubois. Through challenges such as badge cloning and lock-picking, your aim will be to obtain Alexandre&#8217;s website credentials and access his secret content. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;||||true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Improve awareness in your organization<br \/><\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">At the end of the event, participants will complete a questionnaire based on the challenges they have solved. This questionnaire will enable you to take stock of the cybersecurity skills acquired, and identify the overall gaps in your employees&#8217; knowledge. This will enable you to draw up a clear awareness-raising plan.  <\/p>\n<ul>\n<li style=\"text-align: justify;\">Time required: 1 hour \/ employee<\/li>\n<li style=\"text-align: justify;\">Rates: \u20ac30 excl. tax \/ employee<\/li>\n<li style=\"text-align: justify;\">Adaptation for disabled situations: <a href=\"https:\/\/www.hackmosphere.fr\/en\/contact\/\">Contact us<\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/06\/TeaserCyberEscape.mp4&#8243; url_new_window=&#8221;on&#8221; button_text=&#8221;Watch the escape game video&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FCFCFC&#8221; button_bg_color=&#8221;#0B4650&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#FCFCFC&#8221; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#1A1A31&#8243; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/formations-2.jpg&#8221; alt=&#8221;Our training courses: ETHICAL HACKING OF INTERNAL INFRASTRUCTURE&#8221; title_text=&#8221;training&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FCFCFC&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"font-size: x-large;\">PENTEST TRAINING &#8211; INFRASTRUCTURE &amp; AD<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Hack a corporate network<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Participants simulate an attack on a fictitious corporate network, putting themselves in the shoes of an attacker who has compromised the network via a phishing email. They will learn hacker methods such as reconnaissance, exploitation and elevation of privileges, and explore Active Directory attack techniques. <\/p>\n<p style=\"text-align: justify;\">Structured in chapters, the course combines theory and practice, using tools such as Nmap, Nessus and Metasploit. Participants will manually exploit vulnerabilities in services such as Kerberos, FTP, HTTP or SMB. <\/p>\n<ul>\n<li style=\"text-align: justify;\">Time required: 3 to 8 days<\/li>\n<li style=\"text-align: justify;\">Rates : From \u20ac2400 excl.<\/li>\n<li>Adaptation for disabled situations: <a href=\"https:\/\/www.hackmosphere.fr\/en\/contact\/\">Contact us<\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"font-size: x-large;\">PENTEST TRAINING &#8211; WEB APPLICATION<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Become a web application hacker<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">During this two-day course, participants will simulate an attack on a vulnerable Web application, enabling them to familiarize themselves with the attacks in the OWASP top 10. The first morning will be dedicated to theory on common vulnerabilities, including how they work and their impact. Participants will then get hands-on experience of how to exploit vulnerabilities such as SQL, XSS and CSRF injections. This immersive approach will give them a concrete understanding of the risks and impact these vulnerabilities can have on their systems.   <\/p>\n<ul>\n<li style=\"text-align: justify;\">Training time: 2 days<\/li>\n<li style=\"text-align: justify;\">Prices : From \u20ac1,600 excl.<\/li>\n<li>Adaptation for disabled situations: <a href=\"https:\/\/www.hackmosphere.fr\/en\/contact\/\">Contact us<\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/formations-2-1.jpg&#8221; alt=&#8221;Our training courses: ETHICAL HACKING OF INTERNAL INFRASTRUCTURE&#8221; title_text=&#8221;training-2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;50px||50px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(252,252,252,0.15)&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/CTA.png&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_tablet=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_phone=&#8221;30px|20px|30px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"font-weight: 400;\">You&#8217;re a trained hacker, what about you?<br \/><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAifX0=@&#8221; button_text=&#8221;Contact us&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2072&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_icon_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#1A1A31&#8243; button_icon_color__hover=&#8221;#1A1A31&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OUR TRAININGSTraining: the key to better protectionEscape games for novices, technical training for developers, targeted sessions for system administrators&#8230; Each workshop is designed to enhance employee skills and reduce risk to your business.ESCAPE GAME CYBERSECURITYPlay the role of a hacker and try to steal a competitor&#8217;s secret formula.Offer your teams an immersive experience to reinforce [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"Take part in our training courses and raise your employees' awareness","_seopress_titles_desc":"With our training courses, we raise your employees' awareness by reinforcing their skills while putting them in the shoes of a hacker.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2622","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2622"}],"version-history":[{"count":13,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2622\/revisions"}],"predecessor-version":[{"id":3876,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2622\/revisions\/3876"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}