Mastering the art of offensive and defensive security
A critical part of our business is our hacking training facility, which we deliver via SensePost, the specialist pen testing arm of Orange Cyberdefense.
SensePost have trained thousands of students on the art of network and application exploitation for the past decade. It’s safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios. As one of Black Hat briefings longstanding training partners, our courses have taught thousands of students about the art of offensive and defensive approaches.
Trainings for all levels
Hands on Fundamentals
Our introductory course for those starting the journey into hacking
Web Application Hacking
Understand the fundamentals of how web applications are built and controlled
Aimed at beginner penetration testers wanting to understand infrastructure
Intended for existing penetration testers with technical understanding
Modern WiFi Hacking
If you want to learn how to understand and compromise modern Wi-Fi networks
Hands on Hacking Fundamentals
This course mimics attackers
If you want to understand how criminals run hacking campaigns, and emulate them, this course is for you.
By the end of the course, you will have a good grasp of how vulnerabilities and exploits work, how attackers think about networks and systems and have compromised several of them from infrastructure to web applications to Wi-Fi.Get in touch
Enterprise Infrastructure Hacking
Aimed at beginner penetration testers
This course is all about compromising companies through their infrastructure. Aimed at beginner penetration testers and technically included people wanting to understand how to go about compromising their companies through their infrastructure and how to defend it, this course will take you on a journey from learning about an organisation right through to stealthy exploitation of their critical infrastructure.Get in touch
Unplugged: Modern WiFi Hacking
Learn to attack and defend Wi-Fi networks
If you want to learn how to understand and compromise Wi-Fi networks, this is your course. If you want to really understand what’s going on and master the attacks in such a way that you can vary them when you encounter real-world complexities, this course will teach you what you need to know.Get in touch
Solid and technical understanding
Intended for existing penetration testers with a solid and technical understanding of penetration testing tools and techniques, this course teaches students how to hack like criminal network operatives. With a strong offensive focus drawing on the techniques employed in recent industry hacks, the student is taught about new vulnerabilities (current year – 3 years) and how to use them to their full potential.Get in touch
Web Application Hacking
Designed for those new to penetration testing
This course will teach you how to analyze web applications for vulnerabilities and exploit them. SensePost has been conducting penetration tests against web applications for nearly two decades and has distilled its approach into this course. Providing a thorough and scientific approach, techniques to maximize coverage of an application will be taught. Whether you’re a developer looking to better understand how to defend your applications or a penetration tester looking to enhance your web applicationGet in touch
What customers say
South East Water
IT Security Analyst
I learned how to set-up a Kali Linux system to test internal systems for vulnerabilities. The course demonstrated how businesses must be constantly vigilant and ensure we update our systems. No system is fool-proof.
Global Oil, Petroleum products trading organisation
Taking this course was an eye opener. Being placed in the attackers' “skin” makes you suddenly realise that preparation for attacks has to be “in-depth defence ” and this mindset requires constant persistence throughout everything we do to protect against an attack.
Fight smarter, not harder!
To get ahead of the storm, one has to know the weather. And for long-term planning, it is inevitable to get expert insight into climate changes.
Though the cyber threat landscape appears to be volatile, fast-changing and chaotic at first glance, it is driven by systemic forces. Reading these forces will result in better, more effective prevention, detection and response.
That is why intelligence is at the heart of everything we do.What experts recommend