Available courses
This beginner-friendly course introduces students to the mindset, methods, and tools used by real-world threat actors. Through the lens of Threat Intelligence and APT analysis, participants will learn how hackers operate, how attacks are structured, and how to identify adversary fingerprints in the wild.
A three-day intensive course covering the attack surface of modern cloud environments across AWS, Azure, and GCP. Students will explore cloud misconfigurations, identity abuse, lateral movement, and detection engineering using real-world adversary techniques and hands-on lab exercises.
A focused one-day hands-on course introducing the complete Blue Team toolkit — SysInternals, Wireshark, Wazuh, Bunker WAF, and OPNSense. Students set up and navigate each tool's lab environment, and operate under realistic training rules of engagement that mirror professional SOC and incident response standards.