Schedule

Training & Workshops Calendar

San Francisco, CA - March 8-11, 2021
Columbia, MD - July 19-22, 2021

This interactive course will teach security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately, uncover valuable insights. You will learn how to read data in common formats and write scripts to analyze and visualize that data. Topics range from data preparation and machine learning to model evaluation, optimization and implementation—at scale. Learn more

This CEH Certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. CEH students will be immersed into an interactive network hacking environment where they will be shown how to scan, test, hack and secure their own systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks. CEH students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Learn the art of penetration testing (pen testing) in order to create a network intrusion vulnerability prevention strategy.
The Official (ISC)² CSSLP training provides a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment. This training course will help students review and refresh their knowledge and identify areas they need to study for the CSSLP exam.
The Official (ISC)² CSSLP training provides a comprehensive review of the knowledge required to incorporate security practices – authentication, authorization and auditing – into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment. This training course will help students review and refresh their knowledge and identify areas they need to study for the CSSLP exam.
Bootcamp - November 5-8, 2018
Advanced - January 28-31, 2019
Bootcamp - July 22-25, 2019
Advanced (Columbia, MD) - September 23-26, 2019
Bootcamp (Columbia, MD) - September 15-18, 2020
Advanced (Columbia, MD) - September 21-24, 2020
Bootcamp (San Francisco, CA) - March 8-11, 2021
Advanced (San Francisco, CA) - May 17-20, 2021
February 24-27, 2020
San Francisco, CA. - December 1-4, 2020

Corelan's world-renowned "Exploit development for Windows" classes are a unique learning experience, compiling years of rich hands-on experience into meticulously designed courses. 

Modern Web applications are complex and it’s all about full-stack these days. That’s why you need to dive into full-stack exploitation if you want to master Web attacks and maximize your payouts. Say ‘No’ to classical Web application hacking. Join this unique hands-on training and become a full-stack exploitation master.

Learn more →

Modern Web applications are complex and it’s all about full-stack these days. That’s why you need to dive into full-stack exploitation if you want to master Web attacks and maximize your payouts. Say ‘No’ to classical Web application hacking. Join this unique hands-on training and become a full-stack exploitation master.

Learn more →

Is a pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials.
Is a pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials.
The ability to write Python scripts is extremely valuable for security professionals. With a solid understanding of Python, you can automate repetitive tasks, exact and analyze otherwise inaccessible data and much more. This course is intended for people who have an understanding of data science but have never coded before. By the end of the course, participants will be able to write basic analytic scripts.
The ability to write Python scripts is extremely valuable for security professionals. With a solid understanding of Python, you can automate repetitive tasks, exact and analyze otherwise inaccessible data and much more. This course is intended for people who have an understanding of data science but have never coded before. By the end of the course, participants will be able to write basic analytic scripts.
The ability to write Python scripts is extremely valuable for security professionals. With a solid understanding of Python, you can automate repetitive tasks, exact and analyze otherwise inaccessible data and much more. This course is intended for people who have an understanding of data science but have never coded before. By the end of the course, participants will be able to write basic analytic scripts.

This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques. Learn more

Cyber warriors, unite! This workshop brings the industry’s foremost cyber security experts together for a deep dive into mission-critical topics—from data analytic techniques and abusing trust between systems to uncovering a burglar’s tactics and how to use JWT tokens to bypass authentication schemes.