OUR TRAININGS

Training: the key to better protection

80% of cyber attacks start because of a lack of awareness. At Hackmosphere, we believe that training helps protecting you. Escape games for novices, technical training for developers, targeted sessions for system admins: each workshop is designed to reinforce skills and reduce risks for your business.

ESCAPE GAME

Try to hack your colleagues’ information

Offer your teams an immersive experience that reinforces their awareness of cybersecurity while stimulating cohesion and team spirit.

Test your employees’ hacking skills

In this 40-minute team-building game, you take on the role of hackers in teams of 2 to 4, trying to recover confidential information about your target: Alexandre Dubois. Through challenges such as badge cloning and lock-picking, your aim will be to obtain Alexander’s website credentials and access its secret content.

Improve awareness within your organization

At the end of the event, participants will complete a questionnaire based on the challenges they have solved. This questionnaire will help you take stock of your employees’ cybersecurity skills and identify any gaps.

Our training courses: ETHICAL HACKING OF INTERNAL INFRASTRUCTURE

ETHICAL HACKING OF INTERNAL INFRASTRUCTURE

Hack a corporate network

This five-day training course enables participants to simulate an attack on a fictitious corporate network, by putting themselves in the shoes of an attacker who has compromised the network via a phishing email. They’ll learn about hacker methods such as reconnaissance, exploitation and elevation of privileges, and explore techniques for attacking Active Directory. Structured in chapters, the course combines theory and practice, using tools such as Nmap, Nessus and Metasploit. Participants will manually exploit vulnerabilities in services such as Kerberos, LDAP, FTP, HTTP or SMB.

ETHICAL HACKING OF WEB APPLICATIONS

Become a web application hacker

During this two-day training course, participants will simulate an attack on a vulnerable Web application, enabling them to familiarize themselves with the OWASP top 10 attacks. The first morning will be dedicated to the theory of common vulnerabilities, including how they work and their impact. Participants will then get hands-on experience in exploiting vulnerabilities such as SQL injections, XSS and CSRF. This immersive approach will give them a concrete understanding of the risks and impact these vulnerabilities can have on their systems.

Our training courses: ETHICAL HACKING OF INTERNAL INFRASTRUCTURE

We care about training you. what about you?