Training

Education is the most powerful weapon which you can use to change the world

Having trained thousands of students on the art of network and application exploitation for the past decade, it's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios.

Beginner

Beginner

This beginner's course presents you with the background information, technical skill and basic concepts required to get you going. It provides an ideal starting point for the rest of our training
Infrastructure

Infrastructure

This course looks at the methods and approaches one would take when performing internal and external network penetration tests. In our fully functional lab, your aim will be to think like an attacker and map out your target, find weaknesses and fully exploit trust relationships in place. Using scenarios along with presentations, this course is a healthy mix of thinking, strategies and the methodologies you might need for every step along the way.
Application

Application

We love owning the application layer and this course reflects that. We want to take students on a path of obtaining offensive security knowledge in the application realm. This course is meant for those who are new to penetration testing, network administrators or indeed anyone who wants to understand more about offensive testing and get their hands dirty breaking into various networks and applications.
Wireless

Wireless

This course is all about owning Wi-Fi networks and technologies. In the past few years we've released tools such as Snoopy and MANA, that look at how wireless networks are being used and how they can be exploited.
Mobile

Mobile

This course will give you insight and practical window into the methods used when attacking mobile platforms. This course is ideal for penetration testers who are new to the mobile area and need to understand how to analyze and audit applications on various mobile platforms using a variety of tools and platforms. Our mobile course uses a mixture of lectures, hands-on-labs, demonstrations, and group exercises.
Special Ops

Special Ops

Special Operations is a brand new course for individuals or small units wanting to rapidly acquire a basic, usable capability in Open Source Intelligence Gathering, Social Engineering Attacks and Computer Network Attack & Exploitation. This is not a course for CIOs, auditors or pentesters. This is a course for red team members who want to introduce Direct Digital Action as part of a broader Red Team skill set.
Developer

Developer

There’s a web application for most parts of our Internet lives and to a degree, our daily lives. With this large surface area, there’s no doubt that they are often the entry point for most breaches. If you look at some of the biggest hacks in the last 18 months, the compromises can be largely attributed to flaws in a web applications.
Master

Master

The Master course is aimed at existing penetration testers and people with a solid and technical understanding of penetration testing tools and techniques.