Schedule

Training & Workshops Calendar

This interactive course will teach security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately, uncover valuable insights. You will learn how to read data in common formats and write scripts to analyze and visualize that data. Topics range from data preparation and machine learning to model evaluation, optimization and implementation—at scale. Learn more

February 24-28 July 28 - August 1
Bootcamp - November 5-8, 2018
Advanced - January 28-31, 2019
Bootcamp - July 22-25, 2019
Advanced (Columbia, MD) - September 23-26, 2019 Bootcamp (Columbia, MD) - March 8-11, 2021
Advanced (Columbia, MD) - May 17-20, 2021
Bootcamp (Columbia, MD) - June 14-17, 2021
Advanced (Columbia, MD) - July 19-22, 2021
Corelan Bootcamp ā€“ Stack Exploitation: March 10-13, 2025 Corelan Advanced ā€“ Heap Exploitation: June 2-5 2025 Corelan Bootcamp ā€“ Stack Exploitation: August 25-28, 2025 Corelan Advanced ā€“ Heap Exploitation: October 20-23, 2025
November 25-27, 2024

100% Hands-On. HackerOne bug hunters have earned over $100 million in bug bounties thus far. Some of HackerOne customers include the United States DoD, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the top all-time HackerOne bug hunters.

Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks and maximize your payouts. Say ‘No’ to classical web application hacking. Join this unique hands-on training and become a full stack exploitation master.

Click here to watch 3 exclusive videos (~1 hour) and get a feel for this live online training.

Learn more about this live online training.

 

Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application and the supporting architecture. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.

(Hybrid Format that is spread out throughout 4 days) TBA
In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, participants will receive instruction from the foremost covert entry industry authorities. This course will challenge students to maneuver their way through real-world scenarios. Students who demonstrate proficiency will receive a Certificate of Completion.

This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques. Learn more

Training conducted on private basis (please inquire)
Public session - Sept/Oct 2024 (specific date TBA) and also conducted on private basis (please inquire)
Training conducted on private basis (please inquire)
Public session - July/Aug 2024 (specific date TBA) and also conducted on private basis (please inquire)
Training conducted on a private basis (please inquire)
Training conducted on private basis (please inquire)
Public and private sessions available