Training

Education is the most powerful weapon which you can use to change the world

Having trained thousands of students on the art of network and application exploitation for the past decade, it's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios.

Beginner

Beginner

This beginner's course presents you with the background information, technical skill and basic concepts required to get you going. It provides an ideal starting point for the rest of our training
Infrastructure

Infrastructure

Targeting and owning internal networks is as popular as it has ever been. Internal networks are attractive to attackers as they are often the least secure of a companies infrastructure. This course mimics what attackers and criminals are doing - compromising networks and hunting down key players and information.
Wireless

Wireless

This course is all about owning Wi-Fi networks and technologies. In the past few years we've released tools such as Snoopy and MANA, that look at how wireless networks are being used and how they can be exploited.
Application

Application

We love owning the application layer and this course reflects that. We want to take students on a path of obtaining offensive security knowledge in the application realm. This course is meant for those who are new to penetration testing, network administrators or indeed anyone who wants to understand more about offensive testing and get their hands dirty breaking into various networks and applications.
Mobile

Mobile

This course will give you insight and practical window into the methods used when attacking mobile platforms. This course is ideal for penetration testers who are new to the mobile area and need to understand how to analyze and audit applications on various mobile platforms using a variety of tools and platforms. Our mobile course uses a mixture of lectures, hands-on-labs, demonstrations, and group exercises.
Special Ops

Special Ops

Special Operations is a brand new course for individuals or small units wanting to rapidly acquire a basic, usable capability in Open Source Intelligence Gathering, Social Engineering Attacks and Computer Network Attack & Exploitation. This is not a course for CIOs, auditors or pentesters. This is a course for red team members who want to introduce Direct Digital Action as part of a broader Red Team skill set.
Developer

Developer

There’s a web application for most parts of our Internet lives and to a degree, our daily lives. With this large surface area, there’s no doubt that they are often the entry point for most breaches. If you look at some of the biggest hacks in the last 18 months, the compromises can be largely attributed to flaws in a web applications.
Master

Master

Our Master course is aimed at existing penetration testers and people with a solid and technical understanding of penetration testing tools and techniques. Using Nmap, metasploit and getting a webshell should not be new concepts.
OSINT

OSINT

Open-Source Intelligence (OSINT) is publicly available information including radio, television, newspapers, journals, the Internet, commercial databases, videos, graphics, and drawings. We can mine and correlate this information to profile a person or company in order to find or track an individual, look for affiliations or look for relationships between people or companies.