Our Training

Training Courses & Workshops

The Professional Hacker

A technical penetration testing course for software engineers, testers, system admins, and anyone who wants to get into security.

Learning Objectives: Upon completion of the course, participants will be able to execute a basic penetration test using fundamental techniques and a field-proven testing methodology.

Course Highlights:

  • Know where and how to start: Learn where and how to start, how to perform reconnaissance and how to prioritise your tasks as a security professional.
  • Create a hacker mindset: Learn how to think like a hacker during this novel module.
  • Identify and exploit: Build your hands-on skill in identification and exploitation of today's modern application security vulnerabilities.
  • Patch vulnerabilities effectively: Learn what constitutes an effective patch and how to patch a vulnerability in a real environment.
  • Hand-over: Learn how to perform a risk assessment, and map security vulnerabilities to business impact.

Level: Beginner to Intermediate

Duration: 2 to 4 days

Instructor: Dr. Pedram Hayati

Secure Programming in Java

A technical secure programming course aimed at the modern Java developer, presenting exciting information and concepts on security attack and defence that cannot be found elsewhere.

Learning Objectives: Upon completion of the course, participants will be able to apply secure programming techniques to new and existing codebases, mitigating security issues at their root cause.

Course Highlights:

  • Become a security champion for your team.
  • Learn secure programming with hands-on attack and defense exercises.
  • Attempt novel attack-based unit tests that measure your defensive capability against others in the class.
  • See new vulnerability classes not covered in OWASP Top 10 trainings.
  • Deep dive into technology and framework security for the embedded, mobile, and web space.
  • Empower your team with new knowledge using security-focussed code review techniques.

Level: Intermediate to Advanced

Duration: 1 to 3 Days

Instructor: Daniel Hodson

Practical Threat Modelling

While there are a few books and presentations on Threat Modelling, resources and guidance is limited when it comes to applying these concepts in the real-world. It can be very daunting and overwhelming when tasked with constucting a new threat model, hence this training is not just about learning the theory, but also about sharing the war-stories and approaches from the instructor's years of threat modelling work. Along with that, this course also includes practical hands-on exercises to consolodate the concepts taught.

Learning Objectives: Upon completion of this course, participants will have gained an excellent understanding of Threat Modelling concepts, and be able to apply those concepts to effectively model threats that face an application, or organisation.

Course Highlights:

  • Designed to be accessible to a wide audience.
  • Taught with a relaxed atmosphere, and open discussion is encouraged.
  • Premotes the understanding of threat modelling concepts, with technical details kept to a minimum.

Level: Beginner

Duration: 1 day

Instructor: Matt Jones

Secure Application Growth & Enablement Program

The Secure Application Growth & Enablement (SAGE) training program has been specifically designed to uplift the security culture and awareness of your organisation. SAGE aims to improve your organisations ability to efficiently and effectively maintain a secure software development lifecycle, as well as build a sustainable application security program that scales with your existing resources.

Training Testimonials

Upcoming Public Training Courses

No public training courses are currently scheduled.