In addition to our standard courses we also offer custom content creation. This can be both content creation for in-house in topics that revolve around your own products or extensions to our existing courses in more specialised fields.
An example of extension is for example based on our LLVM course. LLVM is a general compiler and program analysis infrastructure, which has a ton of applications. We can extend this course in various directions based on your needs, such as focusing on how to leverage LLVM for automated vulnerability analysis tooling.
We have developed our own software security training platform and we offer this as a platform for content development. This means we can create self-paced training based on your content and have it scale to all of your employees. The platform has extensive features for content delivery as well as interactive learning.
We offer years of experience in integrating security automation into technology development processes and understand the need for automation to improve the software development life cycle. Security automation is relevant if you seek continuous analysis of software whether it is for DevSecOps, vulnerability analysis, malware analysis or any other program analysis problem. Security automation is increasingly adopted by both big tech companies and startups and involves both offensive security testing and defensive security monitoring and analysis. We offer years of experience building tools and techniques that solve the most complex problems in security automation.
We work in many areas of software security automation, including:
We offer research and development services. We have extensive experience in developing security products in both industry and academia. Our expertise are in the areas:
We can help in all stages of your project, such as idea generation and problem solving, implementation as well as using your product to have impact.
Assessing the security of a modern software package is a complex task that requires expertise knowledge and skills. We have years of experience and can help you audit your software package for vulnerabilities and design flaws that may exist. Whether it is a desktop application, mobile application, IoT device or something else that you have our team will help you identify the threat models of your code base, assess if the security criteria are met and help you remediate the flaws that exist.
Understanding software for which there is no source code is a complex and time-consuming task. We help you with any of your software reverse engineering needs, including for desktop applications, mobile applications, IoT devices and anything else. Whether it is software compatibility, malware analysis, protocol and file-format analysis, determining if third-party libraries are vulnerable to attacks or something else, we are here to help solve your problem.