Custom Training That Doesn’t Suck
We deliver deeply technical, engaging training for real-world offensive and defensive security. Our trainings are:
- Customizable: 1–3 weeks long, designed around your needs.
- Flexible: Delivered in-person at your facility, synchronously virtually, or asynchronously.
- Adaptable: Tailored to your team’s skill levels and objectives, our training adjusts in real-time to provide the right challenges and support, ensuring effective learning for everyone from novices to experts.
- Intense: Real exploitation. Real binaries. No PowerPoint nonsense.
Request Custom Training Proposal
Example Training — Beginner Exploitation
This five-day, in-person workshop trains students with a computer science background in the foundations of reverse engineering and program exploitation. Curriculum includes:
Request Beginner Exploitation Training
Example Training — Advanced Exploitation
This ten-day, in-person workshop builds on the beginner course and dives into advanced exploitation topics, including: