Our Training

Security Training Courses & Workshops

The Professional Hacker

A technical penetration testing course for software engineers, testers, system admins, and anyone wants to get into security.

Course structure:

  • Know where and how to start: Learn where and how to start, how to perform reconnaissance and how to prioritise your tasks as a security professional.
  • Create a hacker mindset: Learn how to think like a hacker during this novel module.
  • Infrastructure hacking 101 and 201 (testing): Learn the foundation of hacking and master teachniques to perform network hacking.
  • Web application hacking 101 and 201 (testing): Learn the Whys of web application vulnerabilities and practice identifying and exploiting today's modern application security issues.
  • Exploitation (Proof of Concept): Create an exploit for a vulnerability. Essential to understanding the impact of a vulnerability, many beginners have difficulty creating exploits
  • Patch vulnerabilities effectively: Learn what constitutes an effective patch and how to patch a vulnerability in a real environment.
  • Hand-over: Learn how to perform a risk assessment, map security vulnerabilities to business impact, and close down a security assessment project.

Objective: Upon completion of the course, students will be able to execute a basic penetration test using fundamental techniques and a field-proven testing methodology.

Level: Beginner to Intermediate

Duration: 3 to 5 days

Instructor: Dr. Pedram Hayati

Attend a free demo session or
Register for this course



Secure Programming in Java

A technical secure programming course aimed at the modern Java developer, presenting exciting information and concepts on security attack and defense that cannot be found elsewhere.

Course highlights:

  • Become a security champion for your team.
  • Learn secure programming with hands-on attack and defense exercises.
  • Attempt novel attack-based unit tests that measure your defensive capability against others in the class.
  • See new vulnerability classes not covered in OWASP Top 10 trainings.
  • Deep dive into technology and framework security for the embedded, mobile, and web space.
  • Empower your team with new knowledge using security-focussed code review techniques.

Objective: Upon completion of the course, students will be able to apply secure programming techniques to new and existing codebases, mitigating security issues at their root cause.

Level: Intermediate to Advanced

Duration: 1 to 3 days

Instructor: Daniel Hodson

Register for this course



Practical Threat Modelling

Threat Modelling is the process of assessing a target application or organisation and then building a model that represents the perceived threats it may be facing.

While there’s been a couple of books and presentations on Threat Modelling, there is limited resources and guidance for applying the concepts in the real-world. It can be a daunting and overwhelming tasks to jump into a new Threat Model, so this training spends a day sharing the theory, war-stories, and approaches from years of Threat Modelling work and includes hand-on exercises.​

This training is designed to be accessible to a wide audience and works best with a mix of perspectives and backgrounds. Open discussion is encouraged throughout the day with a relaxed atmosphere. While there are components that can delve into technical and intricate subjects, it’s structured to at minimum promote the concepts and thought processes along the way.​

Suited for:

  • Software architects, developers, testers​
  • Penetration testers and security specialists​​
  • IT management

Level: Beginner

Duration: 1 day

Instructor: Matt Jones

Schedule a demo day or Register for a course

Contact Us