Learn in-demand software security skills
The focus of our courses is to be pragmatic and in-depth. We offer training courses that future-proof the skills of our students to solve real world problems.
Online Courses On-Premise Courses
Software Security
Online courses

Would you like to take our courses at your own pace and at any time that fits your schedule? Online training is a great way to study advanced software security topics around regular everyday commitments, and are also there for binging when you have the time.

With our online-based courses you get the same value as instructor-led courses with all material available whenever and wherever. You can go through every part as many times you want and you can skip through and refresh parts. You can also reach out to an instructor for any queries, and will receive personalised feedback on assignments. If you put in the time with your course, you will graduate with a strong knowledge of the subject and well equipped to solve problems that the world is facing right now.

Our Online Courses
Applied Source Code Fuzzing
Course Description :

Fuzzing is gaining massive popularity in the security community for one simple reason: fuzzing has proven itself to be very effective in discovering bugs and vulnerabilities in software systems. This course is a rigorous introduction to the subject. We will take you through fuzzing native systems as well as managed languages, show in-depth how fuzzing works and much more. This is a comprehensive course and at the end of the course you will be able to fuzz professionally across many targets.

LLVM In-Depth For Security Engineering And Program Analysis
Course Description :

LLVM is a collection of modules and software packages for program analysis and compiler technologies that is used to write security-aware compilers, sophisticated fuzzers, large-scale vulnerability discovery techniques, symbolic executors and much more. This course is centred around two core parts. First, it will cover the internals of LLVM and how to write applications that use LLVM to solve program analysis problems. Second, it will introduce the student to several important open-source state-of-the-art security tools that use LLVM.

Foundations Of Reverse Engineering
Course Description :

In this foundational course you dive into the fundamentals of computer systems and the principles on which software is designed and executed on computers. With this knowledge you are introduced to the toolchain used to reverse engineer binary applications. The theoretical material in this course opens up a lot of doors for you in the world of software security, and you will be capable of utilizing this in other disciplines in software security as well.

Understanding Code Injections From Beginner To Advanced
Course Description :

Code injection is a technique that is becoming increasingly prevalent in attacks and data breaches. Both malware writers and dedicated penetration teams rely on these techniques to bypass defenses and achieve persistence. This course gives a comprehensive coverage of code injection techniques and will teach the student how to analyse, reverse engineer and write applications that use code injections. As such, this course is focused on both defensive and offensive techniques as well as development and code analysis.

On-premise courses

Would you like a training course delivered on your own premises? We offer technical software security classroom courses held at a location of your choosing. Our instructor will go through the material with the students and assist with the practical training exercises. All your students have to bring is laptop with sufficient computing power to run the necessary tools, and ADA Logics will make sure every student has access to all necessary material to learn.

Our On-premise courses
Automating RE With Outside-The-Box Full-System Dynamic Analysis
Course Description :

This is an advanced course that teaches the student how to automate reverse engineering tasks using full-system analysis by way of emulation. This course teaches powerful techniques that are at the forefront of security research and is relevant for all domains in software analysis, e.g. malware analysis, reverse engineering, vulnerability discovery, root-cause analysis and much more.

Are you a business looking to educate teams?

Get access to all of our content for your entire team.

Contact Us