Skip to main content

CYBER TRAINING & EXERCISES

OUR TRAININGS

Hands-On training for any level

DIATEAM training list casque

EXPERT LEVEL

OFFENSIVE ADVERSARY OPERATIONS

(OAO) is essential to understand how to simulate real threats and mimic malicious offensive actors to be the ideal sparring partner for red team vs blue team exercises…

  • 8 Days
  • 95% Practice
  • 5 to 10
SYLLABUS
DIATEAM training list box

PROFICIENT LEVEL

RED TEAM VS ​BLUE TEAM​ TRAINING

Training/testing of technical and organisational defence mechanisms through an exercise of increasing difficulty in a secured and sandboxed environment.

  • 4-5 days
  • 95% Practice
  • 5 to 10
SYLLABUS
Link to training
DIATEAM training list engrenage

COMPETENT LEVEL

INTRODUCTION TO CYBERSECURITY​

The world of Network and Cyber Security is extensive, with many fields. By design, this training will provide you not only the fundamentals of Cyber Security, but with in-depth knowledge as well.​​

  • 3 days
  • 50% Practice
  • 5 to 10
SYLLABUS
DIATEAM training list microscope

EXPERT LEVEL

OFFENSIVE DEV 101

How to develop your own custom malware for the latest versions of Microsoft Windows such as creating a dropper for any payload, injecting your shellcodes into remote processes, creating backdoors

  • 3 days
  • 90% Practice
  • 5 to 10
SYLLABUS
DIATEAM training list loupe

PROFICIENT LEVEL

CTI/MALWARE ANALYSIS

Knowledge of open source investigation methodology and techniques is essential to navigate the current information landscape and developing effective capabilities to obtain intelligence.​

  • 3 days
  • 95% Practice
  • 5 to 10
SYLLABUS
lien vers contact
DIATEAM training list reseaux

COMPETENT LEVEL

OSINT FUNDAMENTALS

Today’s world is flooded with public informations. Whether it’s pictures, videos, posts on social media, news articles, or paid databases, it’s necessary to know how to set intelligence requirements, assess veracity of informations

  •  4 days
  • 40% Practice
  • 5 to 10
SYLLABUS

We Train As We Fight !

Hands-on Cyber Training  is definitely the key to ensuring that your operators remain in safe operating conditions. Our team accompanies you to develop the skills of your operators and this, regularly.

« I hear and I forget, I see and I remember, I do and I understand »

Confucius (551–479 BC)

Check Our Training Catalog

You need players and different teams to lead valuable cyber training and exercises.

DIATEAM deploys two types of Cyber Range Training & Exercises :

  • On Premises
  • On Line

Common trainees’ expectations :

  • Experiencing real-world threats in a safe environment
  • Learning how to recognize and handle threats
  • Team building & Process validation
SI VIS PACEM PARA CYBER BELLUM

CYBER TRAINING

Train your operational teams within hyper realistic scenarios.

A Good cyber training results in the capacity of each team to play its part.

Check Our Training Catalog
OT (aka Operational Technology) refers to an infrastructure composed of hardware or software bricks that detects or operates through direct monitoring and/or control of changes on systems, industrial automation within an organization’s supply chain.
IT (aka Information Technologies) covers all the digital tools used to process information, including software, hardware, communication technologies, etc.
The task of the Blue Team is to defend. Through the Cyber Range, members of a Blue Team are trained to detect, respond to, and mitigate Red Team attacks. Blue Team members must stop malicious activity by mitigating potential vulnerabilities and their impacts. The technical and organizational capabilities of the Blue Team strongly influence the conduct of an exercise.
Traffic generation is the responsibility of the White Team in charge of designing and building the scenario used for the exercises. It is essential for the White Team to ensure that the exercise is conducted in accordance with the scenario’s objectives.
The RED TEAM is often composed of a small number of experts whose mission is to attack or compromise the simulated and/or virtualized system, organization or infrastructure. They must be well aware of the so-called TTP (Tactics, Techniques & Procedures) used by attackers in real life.
A team of operators is responsible for the supervision of the entire Cyber Range. It is in charge of the session follow-up.
Check Our Training Catalog

KEY FACTORS FOR A SUCCESSFUL TRAINING

Check Our Training Catalog

Realism

Like in Flight Simulator, the highest level of realism is necessary for an immersive exercise

Variety of opponents

We test you on all of your surfaces of attack

Regularity

Threats are evolving so regular training is highly recommended

Threat Knowledge

Being prepared means knowing the state of the art in terms of threats

Mastering of tools

Putting your defence tools into situation - SIEM, IDS, etc -

Cyber-MAR project has received funding from the European Union’s horizon 2020 research and innovation programme under grant agreement No. 833389. Content reflects only the authors’ view and European Commission is not responsible for any use that may be made of the information it contains

CYBER AWARENESS

Cyber Risks & Threats : Raise awareness within your operational teams !

Contact Us
Defining the role of each cell

CRISIS EXERCISES

  1. Serious Game + Table Top
  2. Technical operational Exercise – Blue Team VS Red Team –

>> Full Stack Exercise mixing  operational & decision-making cells

Contact Us

A lesson seems clear.
Wargaming, in terms of extensive tactical simulators, is no longer a luxury.
It is an essential element of combat team training.

Admiral Thomas Hayward, 1990Cyber Range

It’s a real privilege for Thales to contribute to raise the global level of Cyber awareness of IT and cyber workforces in Oman with DIATEAM, a partner of choice for developing and providing valuable Cyber Range platforms and contents.

Pierre JEANNE, Vice President, Cybersecurity Technologies and Solutions at Thales

The Oman Public Authority’s Advanced Cyber Academy is teaching national cadres how to protect & defend networks against Cyber Attacks using Thales Cyber Range, a platform developed and powered by our partner DIATEAM

ThalesCyber Security Department

I truly recommend DIATEAM if you want to test/diagnosis your cyberattack resilience or even just to train your teams.

Steven Le RouxOVH

Strengthen your Human Firewall!

DIATEAM ⋅ Made in France / fabriqué en France