Training Courses

applied-data-science-for-cyber-security

Applied Data Science for Cyber Security

This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation and feature engineering to machine learning and implementation.

exploit-development-bootcamp

Corelan® Exploit Development

Corelan's world-renowned "Exploit development for Windows" classes are a unique learning experience, compiling years of rich hands-on experience into meticulously designed courses. The "bootcamp" focuses on stack-based exploitation, and the "advanced" course dives deep into the fascinating world of the windows heap exploitation and memory leaks. These courses cover topics that others don't teach, share private research and practical tips & tricks to become better at writing exploits for the Windows platform, and aims at inspiring you how to perform research by yourself.

NEW-2 (1)

Full Stack Web Attack

Full Stack Web Attack is not an entry-level course. It’s designed to push you beyond what you thought was possible and set you on the path to develop your own workflow for offensive zero-day Web research. Many Web application testers and bounty hunters are focused on attacking Web applications via a blackbox approach. However, given today’s Web technology landscape, code is getting more abstracted, frameworks are being added and complexity is on the rise and as such, so are the vulnerabilities. Old techniques are being replaced with new Web attack research which is limited to a handful of world renowned experts.

windows

Tactical Exploitation: Attacking Windows/Unix

This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques.

NEW-1 (1)

Mastering Web Attacks with Full Stack Exploitation (Bug Hunting)

Modern Web applications are complex and it’s all about full-stack these days. That’s why you need to dive into full-stack exploitation if you want to master Web attacks and maximize your payouts. Say ‘No’ to classical Web application hacking. Join this unique hands-on training and become a full-stack exploitation master.

exploit-development-advanced

Physical Penetration Testing

In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, students who demonstrate hands-on proficiency in key tactics will earn a Certificate of Completion.

Looking for a course that's not here? We'd love to hear your suggestions!