OUR TRAININGS
Training: the key to better protection
80% of cyber attacks start because of a lack of awareness. At Hackmosphere, we believe that training helps protecting you. Escape games for novices, technical training for developers, targeted sessions for system admins: each workshop is designed to reinforce skills and reduce risks for your business.
ESCAPE GAME
Try to hack your colleagues’ information
Offer your teams an immersive experience that reinforces their awareness of cybersecurity while stimulating cohesion and team spirit.
Test your employees’ hacking skills
In this 40-minute team-building game, you take on the role of hackers in teams of 2 to 4, trying to recover confidential information about your target: Alexandre Dubois. Through challenges such as badge cloning and lock-picking, your aim will be to obtain Alexander’s website credentials and access its secret content.
Improve awareness within your organization
At the end of the event, participants will complete a questionnaire based on the challenges they have solved. This questionnaire will help you take stock of your employees’ cybersecurity skills and identify any gaps.
ETHICAL HACKING OF INTERNAL INFRASTRUCTURE
Hack a corporate network
This five-day training course enables participants to simulate an attack on a fictitious corporate network, by putting themselves in the shoes of an attacker who has compromised the network via a phishing email. They’ll learn about hacker methods such as reconnaissance, exploitation and elevation of privileges, and explore techniques for attacking Active Directory. Structured in chapters, the course combines theory and practice, using tools such as Nmap, Nessus and Metasploit. Participants will manually exploit vulnerabilities in services such as Kerberos, LDAP, FTP, HTTP or SMB.
ETHICAL HACKING OF WEB APPLICATIONS
Become a web application hacker
During this two-day training course, participants will simulate an attack on a vulnerable Web application, enabling them to familiarize themselves with the OWASP top 10 attacks. The first morning will be dedicated to the theory of common vulnerabilities, including how they work and their impact. Participants will then get hands-on experience in exploiting vulnerabilities such as SQL injections, XSS and CSRF. This immersive approach will give them a concrete understanding of the risks and impact these vulnerabilities can have on their systems.