Education

Education is the most powerful weapon used to change the world

Having trained thousands of students on the art of network and application exploitation for the past decade, it's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios.

Education Services

Having trained thousands of students on the art of network and application exploitation for the past decade, it's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios.

Tactics, Techniques and Procedures

Our introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical skills and basic concepts required to those desiring a foundation in the world of information security.

Infrastructure

Internal networks are attractive to attackers as they are often the least secure component of a company’s infrastructure. This hands-on course mimics what attackers and criminals are doing – compromising networks, hunting down key accounts and business-critical information. The student will be trained in the methods and approaches taken when performing internal and external network penetration tests in a fully functional lab.

Application

This hands-on course teaches the student the fundamentals of how applications are built and where vulnerabilities are introduced in the development process. Designed for those new to penetration testing, network administrators or who want to understand more about offensive testing by breaking into various networks and applications, this course follows both the OWASP Top 10 and the OWASP Application Security Verification Standard (ASVS).

Wireless

This course teaches the student the techniques used when owning Wi-Fi networks and technologies. Over two days, the student will learn the basics of Wi-Fi attack scenarios and become familiar with breaking and exploiting WEP/WPA/WPA PSK in many real-world situations from detecting wireless users and probe requests, to targeted wireless attacks against specific users or infrastructure.

Mobile

Ideal for penetration testers who are new to the mobile arena and need to understand how to analyse and audit applications on various mobile platforms. Our mobile course combines lectures, hands-on-labs, demonstrations, and group exercises offering insights and practical windows into the methods used when attacking mobile platforms.

Developer / SecDevOps

Designed for developers and those involved in the development process to assist with creating more secure applications by utilising numerous tools and standards. The aim of the course is to enable those involved in an agile-like development process to add security testing into an already pressured short iteration cycle by introducing increased information security knowledge and awareness of how modern applications are targeted, attacked and breached.

Master / BlackOps

Intended for existing penetration testers with a solid and technical understanding of penetration testing tools and techniques, this course teaches students how to hack like criminal network operatives. With a strong offensive focus drawing on the techniques employed in recent industry hacks, the student is taught about new vulnerabilities (current year – 3 years) and how to use them to their full potential.

Open-Source Intelligence (OSINT)

Open-Source Intelligence (OSINT) is publicly available information including radio, television, newspapers, journals, the Internet, commercial databases, videos, graphics, and drawings. We can mine and correlate this information to profile a person or company in order to find or track an individual, look for affiliations or look for relationships between people or companies.