Trainings
Upcoming sessions in Paris (FR):
-
17 nov (5d) - Windows Forensic
-
5 feb (2d) - Kubernetes Intrusion Tactics
-
9 feb (2d) - AWS Intrusion Tactics
-
16 mar (5d) - Linux Forensic
-
mar (5d)
-
(5d)
-
15 jun (5d) - Windows Forensic
Upcoming online session (EN):
-
9 feb (3d) - Windows Malware Analysis (UTC+1)
-
9 mar (5d) - Linux Forensic (UTC+1)
-
23 mar (3d) - Cloud Forensics in Azure (UTC+1)
-
30 mar (3d) - Cloud Forensics in AWS (UTC+1)
-
13 apr (3d) - Windows Malware Analysis (UTC+1)
-
18 may (5d) - Ransomware investigation (UTC+1)
Price: 2d 2500€ / 3d 3500€ / 5d 4800€ / individual excl. taxes
Contact: sales@synacktiv.com
5 boulevard Montmartre 75002 Paris

Métro Grands Boulevards
Synacktiv is committed to sharing of its experience in cybersecurity, acquired over the years, by providing intercompany training. Combining theoretical teaching and practical work, our training courses have been designed to offer a unique and enriching learning experience, and are mainly aimed at information security professionals: pentesters, reverse-engineering experts, SOC analysts, CSIRT analysts, system administrators, security architects, developers, etc.
Each session is led by two experienced trainers who will ensure optimal understanding while providing concrete feedback. All the material necessary for the realization of the practical work will be provided to the students and each will have an individual environment in order to ensure an immersive learning experience. The course materials will be transmitted in PDF format, allowing participants to consult them at any time and use them as a reference.
The trainings take place in our Parisian offices, in a professional and comfortable environment which will promote the concentration of learners. Lunches and drinks are included, as well as a restaurant meal on the last day of training.
-
2 experienced trainers
-
7 to 12 participants
-
Minimum 50% practice
-
Practical work in individual labs
-
Equipment provided ( laptops )
-
Course materials provided
-
In our offices 5 bd Montmartre, Paris 75002
-
Meals and drinks included
Our trainings
Pentest
Obtain the skills needed to understand the main phases of an intrusion. Reconnaissance, web applications, Linux and Windows systems, post-exploitation steps, this training provides an essential base for any security professional.
Discover the fundamentals of security in Active Directory environments through this offensive training. From anonymous access to the complete compromise of infrastructures, become autonomous in intruding corporate networks.
Master intrusion techniques on Linux infrastructures through this offensive training. From anonymous access to complete compromise of the environment, become autonomous in intruding corporate networks.
Deepen your intrusion skills in Active Directory environments with this advanced level training. Learn advanced exploitation techniques and master the compromise of complex corporate networks.
Learn about modern network compromise with this cloud infrastructure training. GCP, AWS, Azure and Kubernetes, discover the characteristic mechanisms of these recent technologies, with the posture of an attacker.
Refine your intrusion skills on Azure with this advanced training. Dive into Entra ID, M365 services, Azure resources, CI/CD with Azure DevOps, Intune management, and hybrid environments through subtle and realistic exploitation scenarios.
Get introduced to compromising containerized platforms with this course dedicated to Kubernetes. Understand Kubernetes-specific authentication, authorization, networking, and escape mechanisms by adopting an attacker’s mindset to identify vulnerabilities and remediation paths.
Get started with compromising AWS environments with this course focused on offensive cloud techniques. Understand IAM, EC2 metadata exploitation, S3 abuse, Lambda techniques, and lateral movement, adopting an attacker’s mindset to identify vulnerabilities and remediation paths.
Learn about modern web application security mechanisms and advanced exploit methods to circumvent them. PHP, Java, Python and Perl, master the compromise of complex web applications.
Obtain the skills needed to search for Java, PHP and .NET web vulnerabilities. Study of static and dynamic analysis frameworks and tools, this training allows pentesters and developers to optimize their search for vulnerabilities in white box.
Discover methodologies and techniques for analyzing Android applications. Architecture, entry points, static and dynamic analyses, master the pentesting methodology of the Android environment.
Study methods for optimizing password cracking with John and Hashcat tools. Mutation rules, masks, prince and siga attacks, become a real password expert.
Forensic
This course is designed to provide you with the essential technical know-how and investigation methodology to analyze and respond to security incidents in the AWS cloud.
This course has been designed to bring you the essential technical know-how and investigation methodology to analyze and respond to security incidents in the cloud.
Master the digital investigation of Windows 10 and 11 systems by learning to identify and characterize the associated malicious actions, both in the context of a security incident and a search for compromise (removal of doubt, hunting).
Master the digital investigation of Linux systems by learning to identify and characterize the associated malicious actions, both in the context of a security incident and a search for compromise (removal of doubt, hunting).
Discover the digital investigation of Android and iOS mobile operating systems by studying data acquisition techniques, the discovery of malicious applications and phone artifacts.
Discover the analysis of malicious code in the context of a security incident through various situations and real cases of attackers' operating methods.
Understand first aid and emergency measures for a ransomware incident. Continue your understanding of the situation with investigation methods adapted to this threat and start remediation.
Reverse
Discover the internals of the Android operating system and its security mechanisms with the help of practical exercises.
Discover the internals of the iOS operating system and its security mechanisms with the help of practical exercises.
Familiarize yourself with the advanced features of IDA, its API and its ecosystem. Learn how to develop scripts and plugins to extend its functionalities.
Gain the essential methodology for security assessment of embedded Linux systems. Hardware analysis, emulation, fuzzing and vulnerability exploitation: this course covers the complete vulnerability discovery process and provides a foundational skillset for any offensive security professional.
Learn to tame a PCB: recognize components, identify testpads, infer and then interact with protocols (UART, JTAG/SWD, SDIO, SPI). Use the active/passive tools and materials (analyzer logic, FT2232H, JTAGulator, OpenOCD).