{"id":3341,"date":"2023-03-31T10:14:49","date_gmt":"2023-03-31T08:14:49","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?page_id=3341"},"modified":"2024-07-19T10:07:42","modified_gmt":"2024-07-19T08:07:42","slug":"training-penetration-tests-pentest-lyon","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/training-penetration-tests-pentest-lyon\/","title":{"rendered":"Cybersecurity training &#8211; Pentest courses"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Our training&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; title_font=&#8221;Titillium Web||||||||&#8221; title_font_size=&#8221;66px&#8221; title_line_height=&#8221;1.5em&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;2em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(16,21,53,0) 50%|#101535 100%&#8221; background_color_gradient_start=&#8221;rgba(16,21,53,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;13px&#8221; button_one_text_color=&#8221;#4328b7&#8243; button_one_bg_color=&#8221;#ffffff&#8221; button_one_border_width=&#8221;10px&#8221; button_one_border_color=&#8221;#ffffff&#8221; button_one_border_radius=&#8221;0px&#8221; button_one_letter_spacing=&#8221;2px&#8221; button_one_font=&#8221;Titillium Web|700||on|||||&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;13px&#8221; button_two_text_color=&#8221;#4328b7&#8243; button_two_bg_color=&#8221;#ffffff&#8221; button_two_border_width=&#8221;10px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0px&#8221; button_two_letter_spacing=&#8221;2px&#8221; button_two_font=&#8221;Titillium Web|700||on|||||&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|||&#8221; child_filter_blur=&#8221;-2px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;2%&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;15px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset3&#8243; border_radii_image=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style_image=&#8221;preset6&#8243; button_one_letter_spacing_hover=&#8221;2px&#8221; button_two_letter_spacing_hover=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2px&#8221; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2px&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_one_text__hover_enabled=&#8221;off|desktop&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Description 2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_starting_opacity=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Take advantage of <strong>cybersecurity training<\/strong> created and delivered by experienced consultants.<\/p>\n<p style=\"text-align: justify;\">Our training courses are <strong>offensive security oriented<\/strong>, with a <strong>strong hands-on focus<\/strong> allowing participants to emerge having already applied the concepts covered at least once.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\" title=\"Information about cyber training\">Contact us<\/a> for details about our cybersecurity training and to find out how to participate.<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf501;||fa||900&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;15%||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Phases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-04.png&#8221; background_size=&#8221;initial&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||26px||false|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#191d52&#8243; custom_margin=&#8221;||1%||false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"description-de-l-offre-test-d-intrusion-site-web\">Our catalog of intrusion testing training courses<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#191d52&#8243; custom_margin=&#8221;||50px||false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||5%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;Titillium Web||||||||&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 id=\"description-de-l-offre-test-d-intrusion-site-web\">Entry-level<\/h3>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Capture The Flag<\/strong> (CTF) for security teams or security champions <em>(0.5 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>External Pentest I<\/strong> : passive and active reconnaissance phases <em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Web Pentest I<\/strong> : passive and active reconnaissance phases <em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Web Pentest II<\/strong> : Information leaks &amp; User inputs <em>(3 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Web Pentest III<\/strong> : Access control &amp; Authentication \/ Authorization <em>(2 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Web Pentest IV<\/strong> : Business logic &amp; Race conditions <em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Privilege escalations on Linux <\/strong><em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Internal Pentest I : <\/strong>reconnaissance and quick wins <em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;Titillium Web||||||||&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 id=\"description-de-l-offre-test-d-intrusion-site-web\">Advanced<\/h3>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>External Pentest<\/strong>: exploitation of misconfigurations and CVE, pivots in DMZ and internal networks <em>(3 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Pentester<\/strong>: job basics <em>(1 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Internal Pentest II<\/strong> : Active Directory attacks <em>(2 d)<\/em><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Privilege escalations (escapes) on Docker <\/strong><em>(1 d)<\/em><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#livrables\" target=\"_blank\" rel=\"noopener\" title=\"Description of DSecBypass audit deliverables\"><\/a><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe03c;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Custom \/ specific subject<\/strong>: <a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\" title=\"Contact us for information about our pentest trainging courses\">contact us<\/a><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#101535&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#12163d 0%|#2b2996 100%&#8221; background_color_gradient_start=&#8221;#12163d&#8221; background_color_gradient_end=&#8221;#2b2996&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; min_height=&#8221;234px&#8221; top_divider_style=&#8221;arrow2&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Take advantage of cybersecurity training created and delivered by experienced consultants. Our training courses are offensive security oriented, with a strong hands-on focus allowing participants to emerge having already applied the concepts covered at least once. Contact us for details about our cybersecurity training and to find out how to participate. Our catalog of intrusion [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3341","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/3341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=3341"}],"version-history":[{"count":17,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/3341\/revisions"}],"predecessor-version":[{"id":3556,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/3341\/revisions\/3556"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=3341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}