Training & Workshops Calendar
During the ongoing COVID-19 pandemic, we have on-site training protocol in accordance with CDC guidance as well as state and local laws to ensure the safety of our staff and customers. Find the protocol below:
This interactive course will teach security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately, uncover valuable insights. You will learn how to read data in common formats and write scripts to analyze and visualize that data. Topics range from data preparation and machine learning to model evaluation, optimization and implementation—at scale. Learn more →
HackerOne bug hunters have earned over $100 million in bug bounties thus far. Some of HackerOne customers include the United States DoD, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the top all-time HackerOne bug hunters.
Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks and maximize your payouts. Say ‘No’ to classical web application hacking. Join this unique hands-on training and become a full stack exploitation master.
Click here to watch 3 exclusive videos (~1 hour) and get a feel for this live online training.
Learn more about this live online training.
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application and the supporting architecture. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.
This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques. Learn more →
Cyber warriors, unite! This workshop brings the industry’s foremost cyber security experts together for a deep dive into mission-critical topics—from data analytic techniques and abusing trust between systems to uncovering a burglar’s tactics and how to use JWT tokens to bypass authentication schemes.