Training

This page provides an overview of the security training courses we offer. Our courses focus on teaching software security concepts in a clear manner and on reinforcing these concepts through hands-on training. Each course comes with a large amount of practical work such that students of varying skill-level will not run idle during the course. The majority of our courses cover advanced topics in software security and program analysis and these courses are all designed to be led by an instructor. We also offer courses in foundational areas of software security that are accessible through an online version as well as led by an instructor.

Online training

We offer the following training courses:

Foundations Of Reverse Engineering

100% online
Self-paced
Hands-on exercises
Lecture videos
Lecture notes

Keywords: x86-64, assembly, instructions, debuggers, disassemblers, Ghidra, binary analysis, bits and bytes, hexademical.

Launch price:
399£

Applied Source Code Fuzzing

100% online
Self-paced
Hands-on exercises
Lecture videos
Lecture notes

Keywords: Memory corruption, Vulnerability analysis, LibFuzzer, Sanitizers, Coverage-guided fuzzing, Mutations, Instrumentation, LLVM.

Early bird price:
399£

Understanding Code Injections From Beginner To Advanced

100% online
Self-paced
Hands-on exercises
Lecture videos
Lecture notes

Keywords: Process injection, evasion, full-system propagation, AV-bypass, code-reuse attacks, ROP, malware analysis, reverse engineering, malware unpacking, import table destruction, dynamic analysis, end-point protection, red-teaming.

Early bird price:
399£

On-site training

We offer the following training courses:

LLVM In-Depth For Security Engineering And Program Analysis

Keywords: Clang, program transformation, compiler passes, abstract-syntax tree, intermediate-representation, LLVM IR, exploit mitigation, software hardening, software analysis, program analysis.

Automating RE With Outside-The-Box Full-System Dynamic Analysis

Keywords: Full-system emulation, reverse engineering, malware analysis, root-cause analysis, record-and-replay, QEMU, PANDA, dynamic taint analysis, intermediate representations, program analysis, dynamic analysis, static analysis.

Have a question about our training?

Let us know if you need any further information on our technical cyber security training.