Courses

Our Courses List

Cybersecurity Awareness Program (iProtect)

Ethical Hacking and Network Penetration Testing

Reverse Engineering & Exploit Development

Cybersecurity Awareness Program (iProtect)

“iProtect” is a practical and innovative Awareness program aimed at educating employees about the essential practices and measures to ensure cybersecurity goals in the workplace.  Our aim is to enhance security awareness among employees, empower them to make correct and responsible decisions, and increase their understanding of potential security risks and threats.

Ethical Hacking and Network Penetration Testing

The Ethical hacking and Network Penetration Testing course covers a wide range of subjects that will teach you everything about penetration testing. Each section of the course covers in-depth theory and practical demonstrations of techniques, where you will be ready to practice them in a dedicated lab with different challenging exercises. 

In the course we will cover subjects such as information gathering, vulnerability assessments, privilege escalation on Windows and Linux, web application vulnerabilities, password attacks and the Metasploit Framework. 

The trainees will get an access to our online labs where beginners can make their first step into penetration testing journey. The online hacking labs contain real world scenarios with systems and devices that can be found on most company networks. You will find vulnerable Windows, Linux and Android hosts, domain controllers, webservers, mail servers, firewalls, web applications and many more systems, services and applications. Every system in the labs is uniquely configured to contribute to a specific learning experience that involves one or more attack vectors.

Reverse Engineering & Exploit Development

In cybersecurity, the only way to analyze executable code to find exploits or vulnerabilities (or sell zero-days) is by learning and practicing Reverse Engineering. It is a very important technical skill for those in the field of information security who want to start finding exploits in closed-source software.

This course is designed for beginners to learn Reverse Engineering for Windows binaries through intensive labs and challenges. It covers x86 and 32-bit ARM architectures. You will be able to perform binary analysis and discover the underlying nature of any Windows binary.

The course will explain processor architecture (including registers and memory management), 32-bit ARM, and assembly language. The labs will focus on testing binaries and executable software with known vulnerabilities. Additionally, you will learn about Stacks, its different types, and you will learn different bypassing techniques. 

We will explore IDA Pro components to effectively utilize it for Reverse Engineering and explain its secret and advanced features and functionalities. Moreover, the course will focus on conducting dynamic analysis using the WinDbg tool. With this knowledge, you’ll be equipped to identify vulnerabilities using both static and dynamic analysis, and then debug and reverse engineer them.