Use CloudGuard IaaS, Dome9 and LOG.IC and assist a game studio that has suffered a breach on its newly set up cloud infrastructure.
OS Vulnerabilities Intro.
Save the world from the nuclear threat of a secluded evil dictatorship.
Part 1 – perform reconnaissance and gain a foothold in the target network.
Application Vulnerabilities Intro. Next phase of the Soar of the Phoenix series – use a Trojan to access the nuclear program network.
Web Vulnerabilities Intro. The grand finale of the Soar of the Phoenix series – take down the nuclear weapons facility!
Web Vulnerabilities Intro. Play a Penetration Tester in a stealth penetration testing exercise. Exploit vulnerabilities, execute a Phishing attack and understand the “Hacker’s State of Mind”.
Defend your organization against an insider attack using Check Point Advanced Technologies. Experience a real-life cyber attack!
Defend your organization against an insider attack using Check Point Advanced Technologies. Experience a real-life cyber attack and complete a full malware analysis process.
GamificationEngaging learning environment with exciting game mechanics
FlexibilityFlexible training platform fully adaptive per users’ level and needs
In The CloudCloud-based infrastructure (on- premise installation optional)
SimulationLife-like cybernetic and physical simulated environment
Advanced LearningBuilt-in learning process with debriefing and progression tracking
Have Additional Questions?
We’re here to help. Contact us to learn more about Cyber Challenge.
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.