CTF
GAMING
PWN
PvP
Hone your cybersecurity skills with exciting challenges, unique characters and competitive game modes.
Training
100% online
Theory & Practice
Career
Awareness
100% online
Beginner
Learn the first cybersecurity reflexes to protect yourself against cyberattacks.
Ethical Hacker
70 hours of training
Learn the techniques used by hackers to detect security vulnerabilities and weaknesses.
DevSecOps
109 hours of training
Learn how to integrate security into the application development and deployment processes.
CISO
67 hours of training
Learn how to protect corporate data and information systems from threats
Safety Coordinator
61 hours of training
Learn how to plan, implement and monitor security measures to protect business operations and information.
SOC Analyst
71 hours of training
Learn how to monitor and respond to security incidents on enterprise information systems.
109 hours of training
Learn how to install, configure, and maintain security tools to protect corporate data and systems.
CTF
GAMING
PWN
PvP
Hone your cybersecurity skills with exciting challenges, unique characters and competitive game modes.
Training
100% online
Theory & Practice
Career
Awareness
100% online
Beginner
Learn the first cybersecurity reflexes to protect yourself against cyberattacks.
Ethical Hacker
70 hours of training
Learn the techniques used by hackers to detect security vulnerabilities and weaknesses.
DevSecOps
109 hours of training
Learn how to integrate security into the application development and deployment processes.
CISO
67 hours of training
Learn how to protect corporate data and information systems from threats
Safety Coordinator
61 hours of training
Learn how to plan, implement and monitor security measures to protect business operations and information.
SOC Analyst
71 hours of training
Learn how to monitor and respond to security incidents on enterprise information systems.
109 hours of training
Learn how to install, configure, and maintain security tools to protect corporate data and systems.
Are you driven by the fight against cybercrime and "be close to your friends and even closer to your enemies" is a good credo for you? Are you aware that hacking can be responsible and benevolent, as long as it is used wisely? If so, why not become an ethical hacker?
Ethical Hacker training with CyberTraining
Our training programs are designed to train all technical profiles in the professional skills of the Ethical Hacker profession.
100% online
Theory & Practice
Customized by level
Cyber training platform
Follow a specific training for the Ethical Hacker profession, adapted to your pace and your level.
1
Introduction to cybersecurity
26 lessons - 14.5 h
3
The Cloud
6 lessons - 2.5 h
5
Languages and their management
11 lessons - 6 hours
7
Network infrastructures
44 lessons - 5 pm
9
Training
44 lessons - 5 pm
2
Cyber defense and attack tools
7 lessons - 2,5 h
4
The network layers
29 lessons - 11 a.m.
6
Vulnerabilities
25 lessons - 7.5 h
8
Capture The Flag
7 lessons - 5.5 h
1
Introduction to cybersecurity
26 lessons - 14.5 h
2
Cyber defense and attack tools
7 lessons - 2,5 h
3
The Cloud
6 lessons - 2.5 h
4
The network layers
29 lessons - 11 a.m.
5
Languages and their management
11 lessons - 6 hours
6
Vulnerabilities
25 lessons - 7.5 h
7
Network infrastructures
44 lessons - 5 pm
8
Capture The Flag
7 lessons - 5.5 h
9
Training
44 lessons - 5 pm
Key lessons
Updated: 01/04/2022
Time limits for accessing the service
+ 70h
Of course
25h
Training
Finance this training with your CPF
Training should never be limited by funding. We have funding options in place to get you started on your Cybersecurity career quickly. Come find out about them!
Objectives
Positioning test
In 1ʳᵉ step of your journey, you complete a one-hour placement test that will give your starting point for the training. This course is broken down into 2 levels:
Practice & training
In order to deepen your knowledge and ensure the assimilation of the new acquired notions, you will practice on practical cases throughout your training.
In TD, TP or CTF format, you will apply your new acquired knowledge during a practical case with a real situation on the CyberRange.
25 hours of training available in this course.
What is an Ethical Hacker?
An ethical hacker, also known as an "ethical hacker" or "white hacker," is an IT security professional who uses the same techniques and tools as cybercriminals to test the security of IT systems and protect against online threats.
An ethical hacker's job is primarily to simulate a computer attack using techniques and tools similar to those used by cybercriminals to test the security of the company's systems and identify potential weaknesses. Once these weaknesses are identified, the ethical hacker can recommend security measures to address them and help the company protect itself against future threats.
Ethical hackers often work in conjunction with the company's security teams and may be employed by IT security firms or work as independent consultants. They must have a thorough knowledge of computer security and the techniques used by cybercriminals, as well as coding and general computer skills.
Entry level salary
40 000€
Gross / year
Entry level salary
70 000€
Gross / year
💡 What's the difference with being a pentester?
A pentester, or "penetration tester," is also an IT security professional who tests the security of computer systems. However, unlike an ethical hacker, a pentester is usually hired by the company to test the security of its systems, not to protect against online threats. The pentester also uses techniques and tools similar to those used by cybercriminals to identify weaknesses in the company's systems and recommend security measures to address them.
In summary, the main difference between an ethical hacker and a pentester is their role within the company. An ethical hacker often works internally to protect the company from online threats, while a pentester is often hired as an external consultant to test the security of the company's systems
Activities and tasks
auditing
Analysis
Analysis
Advantages of the job