Publication date : 04/05/2024

Course : Hacking and security with CyberRange

Practical course - 5d - 35h00 - Ref. HCR
Price : 3120 € E.T.

Hacking and security with CyberRange




This advanced training course will teach you the techniques you need to measure the security level of your information system. Following these attacks, you'll learn how to trigger the appropriate response and raise the security level of your network.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. HCR
  5d - 35h00
3120 € E.T.




This advanced training course will teach you the techniques you need to measure the security level of your information system. Following these attacks, you'll learn how to trigger the appropriate response and raise the security level of your network.


Teaching objectives
At the end of the training, the participant will be able to:
Understand hacker techniques and counter their attacks
Measure the security level of your information system
Perform a penetration test
Defining the impact and scope of a vulnerability

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of IS security, networks, systems (especially Linux) and programming. Or knowledge equivalent to that acquired in the course "System and network security" (ref. SCR).

Practical details
Hands-on work
Airbus CyberSecurity's CyberRange is used to create and play out realistic scenarios involving real cyber-attacks.

Course schedule

1
Hacking and security

  • Forms of attack.
  • Operating procedures.
  • Players and issues.

2
Sniffing, interception, analysis, network injection

  • Packet anatomy, tcpdump, Wireshark, tshark.
  • Hijacking and interception of communications (man-in-the-middle, VLAN attacks, honeypots).
  • Packages: sniffing, reading/analysis from a pcap, extraction of useful data, graphical representations.
  • Scapy: architecture, capabilities, use.
  • Scenarios and tools available on CyberRange.
Hands-on work
Listen to the network with sniffers. Use scapy (command line, python script): injections, interception, pcap reading, scanning, DoS, man-in-the-middle (MITM).

3
Recognition, scanning and enumeration

  • Intelligence gathering, hot reading, darknet exploitation, social engineering.
  • Service, system, topology and architecture recognition.
  • Types of scans, filtering detection, firewalking, fuzzing.
  • Camouflage by spoofing and bouncing, path identification with traceroute, source routing.
  • IDS and IPS evasion: fragmentations, covert channels.
  • Nmap: scan and export results, options.
  • Other scanners: Nessus, OpenVAS.
  • Scenarios and tools available on CyberRange.
Hands-on work
Using the nmap tool and detecting filtering on the CyberRange platform.

4
Web attacks

  • OWASP: organization, chapters, Top10, manuals, tools.
  • Discover the infrastructure and associated technologies, strengths and weaknesses.
  • Client-side: clickjacking, CSRF, cookie theft, XSS, components (Flash, Java). New vectors.
  • Server side: authentication, session theft, injections (SQL, LDAP, files, commands).
  • Inclusion of local and remote files, cryptographic attacks and vectors.
  • Protection evasion and circumvention: WAF bypass techniques.
  • Burp Suite, ZAP, SQLmap, BeEF tools.
  • Scenarios available on CyberRange.
Hands-on work
Implementation of different web attacks under real conditions on both server and client sides using CyberRange.

5
Application attacks

  • Metasploit: architecture, features, interfaces, workspaces.
  • Exploit writing, shell code generation.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 20 Apr., 27 July, 2 Nov.

PARIS LA DÉFENSE
2026 : 13 Apr., 20 July, 26 Oct.