Dans le monde numérique en constante évolution d'aujourd'hui, il est essentiel de rester à jour avec les nouvelles technologies et tendances. Les Programmes Cyberium, développés par ThinkCyber, visent à combler ce fossé de connaissances. Ces programmes offrent des expériences d'apprentissage complètes dans de nombreux domaines cyber.
Intro à la Cyber
XE101


Programmes Cyberium

Programmes Cyberium

Prerequisites
-
Networking Knowledge
-
Cybersecurity Foundation
-
Linux & Windows OS
-
Programming or Scripting Experience

Duration Options
-
Self-paced: 5-10 week
-
Trainer-led: 48 hours
Core Features of Cyberium Arena
Labs
Enhance training with defense and attack tasks.
Books
Tailored coursebooks for cybersecurity studies.
Scenarios
Diverse situations mimicking real professional challenges.
Projects
Integrated projects to demonstrate acquired knowledge.
Programmes Cyberium
Scanning Techniques
Learn port scanning, version detection, and NSE scripting with Nmap.
HTTP Basics
Understand HTTP structure, methods, and status codes for security testing.
Tools for Recon
Master tools like Curl, WhatWeb, and Nikto for thorough reconnaissance.
Subdomain Enumeration
Discover subdomains and analyze DNS records for sensitive information.

Programmes Cyberium
This module bridges the gap between payload creation and advanced evasion techniques, ensuring participants can execute undetectable attacks that mimic real-world adversarial tactics.
Burp Suite Basics
Set up Burp Suite as a proxy and configure browser integration.
-
Installation and initial configuration across different operating systems
-
Setting up SSL certificates and browser compatibility
-
Understanding the interface and navigation basics
-
Configuring target scope and filter settings
Core Tools
Learn to use Proxy, Repeater, Intruder, and Scanner for effective testing.
-
Intercepting and modifying HTTP/HTTPS traffic in real-time
-
Using Repeater for request manipulation and testing
-
Mastering Intruder for automated attack patterns
-
Configuring and running vulnerability scans
-
Analyzing and validating scanner results
Advanced Features
Extend functionality with custom plugins and automate testing workflows.
-
Creating and implementing custom extensions
-
Building automated testing sequences
-
Using the Burp Suite effectively
-
Implementing custom scan checks

Programmes Cyberium


Types of XSS
Understand Reflected, Stored, and DOM-based Cross-Site Scripting attacks.
Crafting Payloads
Learn to write basic and obfuscated XSS payloads.
Testing Techniques
Identify injection points manually and with automated tools.
Defensive Measures
Implement proper input validation and secure Content Security Policies.



Understanding
Learn the difference between command injection and code injection.

Exploitation
Inject malicious commands and chain them using operators.

Bypassing
Use encoding techniques to bypass input filters.

Defense
Implement input validation and sanitization to prevent attacks.

Programmes Cyberium
Programmes Cyberium
SQL Injection Basics
Identify and exploit vulnerable inputs in web applications.
Types of SQLi
Explore Union-based, Boolean-based, and Time-based SQL injection techniques.
Advanced Exploitation
Extract sensitive data and bypass Web Application Firewalls.
Manual Exploitation
Learn to manually craft and execute SQL injection payloads.


Module 6: File Handling Vulnerabilities
File Upload Vulnerabilities
Identify and bypass file upload restrictions to execute malicious code.
Local File Inclusion (LFI)
Exploit LFI to leak sensitive files or execute scripts.
Remote File Inclusion (RFI)
Craft payloads for remote script execution and learn mitigations.
Directory Traversal
Access restricted directories and files using path traversal techniques.
Module 7: Session Management

Understanding Sessions
Learn how session tokens work and secure cookie attributes.


Common Vulnerabilities
Explore session fixation, hijacking, and insecure token management.


Secure Session Practices
Implement strong session management policies and token rotation mechanisms.
Programmes Cyberium

Access Control Flaws
Understand and exploit role-based access control bypasses.


Testing Access Control
Identify exposed endpoints and exploit Insecure Direct Object References.


Mitigation Techniques
Implement least privilege principles and secure access control checks.
Programmes Cyberium
WordPress Architecture
Understand the core structure and security landscape of WordPress.
Common Vulnerabilities
Explore vulnerabilities in plugins, themes, and configurations.
Exploitation Techniques
Use tools like WPScan and exploit file upload vulnerabilities.
WordPress Hardening
Learn to update, restrict permissions, and implement strong access controls.
