Choose your language...
Support & Services
Use CloudGuard IaaS, Dome9 and LOG.IC and assist a game studio that has suffered a breach on its newly set up cloud infrastructure.
OS Vulnerabilities Intro.
Save the world from the nuclear threat of a secluded evil dictatorship.
Part 1 – perform reconnaissance and gain a foothold in the target network.
Application Vulnerabilities Intro.
Next phase of the Soar of the Phoenix series – use a Trojan to access the nuclear program network.
Web Vulnerabilities Intro.
The grand finale of the Soar of the Phoenix series - take down the nuclear weapons facility!
Defend your organization against an insider attack using Check Point Advanced Technologies. Experience a real-life cyber attack!
Play a Penetration Tester in a stealth penetration testing exercise. Exploit vulnerabilities, execute a Phishing attack and understand the “Hacker’s State of Mind”.
Defend your organization against an insider attack using Check Point Advanced Technologies. Experience a real-life cyber attack and complete a full malware analysis process.
Engaging learning environment with exciting game mechanics
Flexible training platform fully adaptive per users’ level and needs
In The Cloud
Cloud-based infrastructure (on- premise installation optional)
Life-like cybernetic and physical simulated environment
Built-in learning process with debriefing and progression tracking
Have Additional Questions?
We’re here to help. Contact us to learn more about Cyber Challenge.
Need Help Coronavirus
Hello! How can I help you?
Got it, Thanks!
Questions? Let us help.