Practice makes perfect.
Practical-based learning using a CDeX solution that fully immerses in a realistic environment prepares to face an attack.
A free DEMO training session is at your fingertips!
Demo training will familiarize you with our CDeX - the cyber range training platform where security professionals can train in a realistic environment to detect and respond to real threats.
Testyour skills and knowledge of computer security in various categories: exploitation, forensics, cryptography, reverse engineering, cracking, hardening, and more
Gainhands-on experience with the identification of vulnerabilities nested on virtual machines and further exploitation of them
Performforensic investigation and try to stop live attack being performed at a selected machine
Getmotivated to further improve in the areas indicated
Builda "mindset" focused on searching for anomalies in the systems you supervise
Explorethe CDeX cyber range and its functionalities
Trackyour training results in real time
Geta final report with results after finishing demo training
Decidewhen and where you want to train - the training session will adjust to you
The demo is designed to give you a taste of the functionality of the CDeX platform, but not only! It is based on the Capture the Flag (CTF) scenario, which is an extremely attractive form of training and testing your skills.
The essence of Capture the Flag is to solve a variety of specially designed puzzles/tasks to find hidden flags. The main goal is to test your cyber security skills and knowledge. The thematic scope of all challenges is broad and includes categories such as:
A flag is nothing more than a string of characters that has a specific form (notation format). Each flag is assigned a point value, depending on the difficulty of the task.
There are many ways to hide flags. Sometimes hints as to where to look for them can be found in the content of the task. This can be in source code, a file, a compiled application, a disk image, and many others. In the jeopardy CTF format, it is important to find as many of them as possible
The CTF training is designed for all cybersecurity enthusiasts with basic knowledge of Linux:
There are two variants of Capture the Flag training, varying in difficulty and including the listed training materials:
CTF simple: a guide, a guide to connecting to VPN, example solutions
CTF advanced: a guide, a guide to connecting to a VPN
During the training you have the opportunity to keep track of the number of points you earn, and at the end of the training you will receive a full score report.
Take advantage of the free, on-demand demo training today by clicking on the button! You will receive an invitation to your email address with all the instructions you need to get started. Nothing could be simpler!