An immersive experience that immerses you in the daily life of a pentester. From reconnaissance to exploitation, this module will guide you through realistic scenarios to under...
Based on practical experience of penetration testing, this training course will will enable you to understand how professional hackers work as well as the techniques used and t...
Find out how default configurations in Active Directory can be exploited by attackers...
By following a step-by-step approach, this training aims to bring participants to understand the diƯerent aspects related to safety and their impact on the company. The variou...
The aim of this technical training is to instruct programmers in the rules to be to follow in terms of application protection. The omnipresence of AI and the proliferation of c...