Search

SensePost trainings

Mastering the art of offensive and defensive security

A critical part of our business is our hacking training facility, which we deliver via SensePost, the specialist pen testing arm of Orange Cyberdefense.

SensePost have trained thousands of students on the art of network and application exploitation for the past decade. It’s safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios. As one of Black Hat briefings longstanding training partners, our courses have taught thousands of students about the art of offensive and defensive approaches.

Trainings at Black Hat USA, August 6-9

 

We would like to invite you to discover our trainings at Black Hat USA 2022. As you might know, SensePost has been training at BlackHat since 2002. We pride ourselves on ensuring our content, our training environment and trainers are all epic in every way possible. 

The trainers you will meet are working penetration testers, responsible for numerous tools, talks and 0day releases. This provides you with real experiences from the field along with actual practitioners who will be able to support you in a wide range of real-world security discussions.

Trainings for all levels

Hands-on Hacking Fundamentals

Our introductory course for those starting the journey into hacking.

View brochure

Applied Web Application Hacking

Understand the fundamentals of how web applications are built and controlled.

View brochure

Enterprise Infrastructure Hacking

Aimed at beginner penetration testers wanting to understand infrastructure.

View brochure

Red Teaming

Intended for existing penetration testers with technical understanding.

View brochure

Modern WiFi Hacking

If you want to learn how to understand and compromise modern Wi-Fi networks.

View brochure

Flagship Courses

Hands on Hacking Fundamentals

This course mimics attackers

If you want to understand how criminals run hacking campaigns, and emulate them, this course is for you.

By the end of the course, you will have a good grasp of how vulnerabilities and exploits work, how attackers think about networks and systems and have compromised several of them from infrastructure to web applications to Wi-Fi.

Request information

Enterprise Infrastructure Hacking

Aimed at beginner penetration testers

This course is all about compromising companies through their infrastructure. Aimed at beginner penetration testers and technically included people wanting to understand how to go about compromising their companies through their infrastructure and how to defend it, this course will take you on a journey from learning about an organisation right through to stealthy exploitation of their critical infrastructure.

Request information

Unplugged: Modern WiFi Hacking

Learn to attack and defend Wi-Fi networks

If you want to learn how to understand and compromise Wi-Fi networks, this is your course. If you want to really understand what’s going on and master the attacks in such a way that you can vary them when you encounter real-world complexities, this course will teach you what you need to know.

Request information

Red Teaming

Solid and technical understanding

Intended for existing penetration testers with a solid and technical understanding of penetration testing tools and techniques, this course teaches students how to hack like criminal network operatives. With a strong offensive focus drawing on the techniques employed in recent industry hacks, the student is taught about new vulnerabilities (current year – 3 years) and how to use them to their full potential.

Request information

Applied Web Application Hacking

Designed for those new to penetration testing

This course will teach you how to analyze web applications for vulnerabilities and exploit them. SensePost has been conducting penetration tests against web applications for nearly two decades and has distilled its approach into this course. Providing a thorough and scientific approach, techniques to maximize coverage of an application will be taught. Whether you’re a developer looking to better understand how to defend your applications or a penetration tester looking to enhance your web application

Request information

What customers say

South East Water

IT Security Analyst

I learned how to set-up a Kali Linux system to test internal systems for vulnerabilities. The course demonstrated how businesses must be constantly vigilant and ensure we update our systems. No system is fool-proof.

Global Oil, Petroleum products trading organisation

CTO

Taking this course was an eye opener. Being placed in the attackers' “skin” makes you suddenly realise that preparation for attacks has to be “in-depth defence ” and this mindset requires constant persistence throughout everything we do to protect against an attack.

Get in touch for more information

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.

CSIRT