Cyberpark by Check Point

Juegos Disponibles

Check Point Cyberpark

Broken Access Control Cyber Range

Most computer systems are designed for use with multiple users. Privilege escalation means a user receives privileges they are not entitled…
Check Point Cyberpark

Broken Authentication - Cyber Range

Broken Authentication involves all kinds of flaws that are caused by errors in implementation of authentication and/or session management.…
Check Point Cyberpark

Sensitive Data Exposure 1 Cyber Range

Sensitive Data Exposure occurs when an application does not adequately protect sensitive information. The data can vary and anything from…
Check Point Cyberpark

Cryptographic Issues Cyber Range

Protecting sensitive data with cryptography has become a key part of most applications. Simply failing to encrypt sensitive data is very…
Check Point Cyberpark

Serverless

The process of application development begins with recognition of a need that a technology or service will fulfil, with security merely…
Check Point Cyberpark

Game of Clouds

Use CloudGuard IaaS, Dome9 and LOG.IC and assist a game studio that has suffered a breach on its newly set up cloud infrastructure.…
Check Point Cyberpark

The Wizard of OS

Your task is to save the world from the nuclear threat of a secluded evil dictatorship. Perform reconnaissance, find vulnerabilities to…
Check Point Cyberpark

Lord of the Pings

We will help you get access to a sensitive laptop that contains the keys to bringing down the nuclear facility. Perform many OffSec…
Check Point Cyberpark

Santa's Red Hat Cyber Range

We have received intelligence reports that Santa's new supplier is going to deliver horrible gifts for him to deliver. Our intelligence is…
Check Point Cyberpark

APPocalyps Now

We need collect relevant data from the Nuclear facility in this campaign. We'll help you gain access through a Trojan, but after that, it…
Check Point Cyberpark

Sour Lemon

Focused on Check Point advanced technologies, including Harmony Endpoint and SmartConsole, which are part of the Check Point Infinity…
Check Point Cyberpark

Cloudy for CxO

The company has migrated to Office 365, and all of the employees are insured by Hanson & Wood Insurance. Because the Company is already in…
Check Point Cyberpark

Anatomy of Attack - Part 1 Cyber Range

Join “Javelin”, an elite Penetration Testing team, as it executes an attack on the smart city of Redford. Learn the hacker’s state of mind…
Check Point Cyberpark

Anatomy of Attack - Part 2 Cyber Range

The second campaign of the “Javelin” Penetration Testing team series. This time the team is testing the security posture of a leading…
Check Point Cyberpark

Catch me if you can - Part 1 Cyber Range

Stop a gang of sophisticated cyber bank robbers that have hit your town (part 1 of 2). Activity Details Type Game Level Intermediate Team…
Check Point Cyberpark

Recording Crucial Error (RCE) Cyber Range

Because of recent news about a very severe vulnerability that turns out to exist in a lot of applications, our company was hired to perform…
 

SOLUCIONES SEGURAS
Empresas Protegidas, Empresas Tranquilas
Panamá | Costa Rica | Guatemala | El Salvador | Honduras

[email protected]

Oficinas & Contactos

Instagram
Facebook
Facebook
Facebook
Facebook