A critical part of our business is our hacking training facility, which we deliver via SensePost, the specialist pen testing arm of Orange Cyberdefense.
SensePost have trained thousands of students on the art of network and application exploitation for the past decade. It’s safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios. As one of Black Hat briefings longstanding training partners, our courses have taught thousands of students about the art of offensive and defensive approaches.
We would like to invite you to discover our trainings at Black Hat USA 2022. As you might know, SensePost has been training at BlackHat since 2002. We pride ourselves on ensuring our content, our training environment and trainers are all epic in every way possible.
The trainers you will meet are working penetration testers, responsible for numerous tools, talks and 0day releases. This provides you with real experiences from the field along with actual practitioners who will be able to support you in a wide range of real-world security discussions.
Our introductory course for those starting the journey into hacking.
View brochureUnderstand the fundamentals of how web applications are built and controlled.
View brochureAimed at beginner penetration testers wanting to understand infrastructure.
View brochureIf you want to learn how to understand and compromise modern Wi-Fi networks.
View brochureIf you want to understand how criminals run hacking campaigns, and emulate them, this course is for you.
By the end of the course, you will have a good grasp of how vulnerabilities and exploits work, how attackers think about networks and systems and have compromised several of them from infrastructure to web applications to Wi-Fi.
Request informationThis course is all about compromising companies through their infrastructure. Aimed at beginner penetration testers and technically included people wanting to understand how to go about compromising their companies through their infrastructure and how to defend it, this course will take you on a journey from learning about an organisation right through to stealthy exploitation of their critical infrastructure.
Request informationIf you want to learn how to understand and compromise Wi-Fi networks, this is your course. If you want to really understand what’s going on and master the attacks in such a way that you can vary them when you encounter real-world complexities, this course will teach you what you need to know.
Request informationIntended for existing penetration testers with a solid and technical understanding of penetration testing tools and techniques, this course teaches students how to hack like criminal network operatives. With a strong offensive focus drawing on the techniques employed in recent industry hacks, the student is taught about new vulnerabilities (current year – 3 years) and how to use them to their full potential.
Request informationThis course will teach you how to analyze web applications for vulnerabilities and exploit them. SensePost has been conducting penetration tests against web applications for nearly two decades and has distilled its approach into this course. Providing a thorough and scientific approach, techniques to maximize coverage of an application will be taught. Whether you’re a developer looking to better understand how to defend your applications or a penetration tester looking to enhance your web application
Request informationIT Security Analyst
I learned how to set-up a Kali Linux system to test internal systems for vulnerabilities. The course demonstrated how businesses must be constantly vigilant and ensure we update our systems. No system is fool-proof.
CTO
Taking this course was an eye opener. Being placed in the attackers' “skin” makes you suddenly realise that preparation for attacks has to be “in-depth defence ” and this mindset requires constant persistence throughout everything we do to protect against an attack.