Our Training

Training & Workshops

We teach how to design and develop secure software.

Our training courses are aligned with Secure Software Development Lifecycle.


Learn how to think like a hacker, build a threat model for upcoming features, and address security threats during the design phase.

Covered in:

  • Professional Hacker
  • Practical Threat Modelling

Learn how to identify insecure code patterns, test and verify their impact, and finally mitigate them during the development phase.

Covered in:

  • Secure Programming in Java

Learn how to test for security vulnerabilities, and measure their impacts during the testing phase.

Covered in:

  • Professional Hacker
  • Secure Programming in Java

Professional Hacker

In this course you will learn fundamentals of a security mindset and how to identify threats during the software design phase. You will master how to test software for common vulnerabilities via dynamic analysis and measure their impact.

Level: Beginner

Duration: 2 days

Register View Sample

Secure Programming in Java

In this course you will learn vulnerability types specific to Java and how to identify and test insecure coding patterns using static and dynamic analysis. Additionally, it covers security challenges facing Java web development.

Level: Intermediate

Duration: 1 day

Register View Sample

Practical Threat Modelling

In this course you will learn how to build effective threat models. Through practical exercises you will be able to identify attack surface, assess data-flows and use-case threats, and prioritise counter-measures to minimise the threats.

Level: Beginner

Duration: 1 day


Upcoming Public Training & Workshops

We run public training courses and community workshops where you can meet our instructors.

Public Courses

Along with our private classes, we periodically run public training classes.


Lunch'n'Learn Workshops

We run regular seminars and workshops of some of our training modules and research.

Melbourne Sydney

Why Our Training?

Seasoned instructors

Our training instructors get their first-hand experience by working on security assessment projects in the industry.

Real world examples

Examples are inspired from findings we come across during our security assessment projects.

Live content

Our training content is continuously evolving as we do research and receive feedback from our customers.

Not sure yet?

Contact us for more information or to schedule a demo.