Challenge yourself in a gamified hacking environment, solving real life problems. Develop creative thinking and team work, while playing an engaging and challenging game. Trainees will play independently or in a group while experiencing Check Point Emerging Technologies (real hands-on) and Gen V attacks.

Gamification

Engaging learning environment with exciting game mechanics

Flexibility

Flexible training platform fully adaptive per users’ level and needs

In The Cloud

Cloud-based infrastructure (on- premise installation optional)

Simulation

Life-like cybernetic and physical simulated environment

Advanced Learning

Built-in learning process with debriefing and progression tracking

Real-life Problem Solving

The creative storyline and real-life training space maximizes immersion, encourages students’ out-of-the-box thinking and shapes a steep learning curve.

Unmatched Learning Environment

Our unique implementation of challenges, scores, badges and leaderboards motivates students to achieve their educational goals and leverage their strengths.

Become a Check Point Warrior

The Wizard of OS

Challenge level: Beginner
Challenge Duration: 4 hours
Type: Red Team (Attack) Scenario
Topics: This challenge will cover the basics of:

OS Vulnerability Exploitation
Code Injection
Privilege Escalation

Soar of the Phoenix Part 1 – The Wizard of OS
(OS Vulnerabilities Intro)

Description:
Soar of the Phoenix is a series of intro scenarios to Ethical Hacking. You are part of a UN cyber operations team tasked with saving the world from the nuclear threat of an evil dictatorship. In this first chapter, The Wizard of OS, you will perform reconnaissance and gain a foothold in the target network. You will train in hands-on penetration techniques such as OS Vulnerability Exploitation, Code Injection, Privilege Escalation and more. Tools and technologies used include Nmap, Metasploit, Linux shell and SSH client.

Who is this training intended for?
SOC analysts, entry level penetration testers, network engineers, security enthusiasts, anyone who wants to experience Ethical Hacking hands-on

Prerequisites:
Basic familiarity with Operating Systems and elementary hacking techniques

Required Equipment:
PC/Laptop with Chrome browser installed

APPocalypse NOW

Challenge level: Beginner
Challenge Duration: 4 hours
Type: Red Team (Attack) Scenario
Topics: This challenge will cover the basics of:

Buffer Overflow
Reversing
Brute Force Attacks
Fuzzing

Soar of the Phoenix Part 2 – APPocalypse Now
(Application Vulnerabilities Intro)

Description:
Soar of the Phoenix is a series of intro scenarios to Ethical Hacking. You are part of a UN cyber operations team tasked with saving the world from the nuclear threat of an evil dictatorship. In this second chapter, APPocalypse Now, you will use a Trojan to access the nuclear program network. You will train in hands-on penetration techniques including Buffer Overflow, Reversing, Brute Force Attacks and Fuzzing. Tools and technologies used include Linux shell, Disassembler, Dictionary based web crawler, Web form dictionary cracker, Web requests generator.

Who is this training intended for?
SOC analysts, entry level penetration testers, network engineers, security enthusiasts, anyone who wants to experience Ethical Hacking hands-on

Prerequisites:
Basic familiarity with application security (OWASP) and elementary hacking techniques

Required Equipment:
PC/Laptop with Chrome browser installed

  • In Red Team scenarios, you play an attacker role. This will allow you to experience Ethical Hacking techniques, understand the hacker's state of mind and basically "know the enemy".
  • In Blue Team scenarios, you play a defender role (SOC analyst / IR). You will experience defense missions against cyber-attacks using real defense tools and systems.

Have Additional Questions?

We’re here to help. Contact us to learn more about Cyber Challenge.
This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO