SPECIALIZED CYBERSECURITY TRAINING
Advanced Training in Hardware Hacking and Embedded Exploitation
Linux Cyber Bootcamp
Are you new to Linux? Has it been a while since you were on the Linux command line, and do you need a refresher? Are you transitioning from an IT role into cybersecurity?
This course is designed for you!
LEARN MOREHow to Write Shellcode
If you have ever struggled with writing shellcode or were just curious how a hacker writes shellcode to exploit a vulnerability, then you're in the right place!
LEARN MOREHardware Hacking Workshop
Have you ever wanted to reverse engineer a piece of electronics, but didn’t know where to begin? Do you lack the knowledge to troubleshoot hardware hacking problems? Did your Internet resources lack the “how to” hands-on instruction?
Wouldn’t it be nice if someone could take you by the hand and elevate your hardware reverse engineering knowledge from zero to hero in a logical, well organized manner?
Well ... the search is over because we have developed this hardware reverse engineering course to do just that!
LEARN MOREIoT Firmware Exploitation
This course is designed for white hat hackers, tinkerers, and hobbyists with limited experience and an interest in embedded systems analysis and firmware exploitation techniques.
LEARN MOREExploiting Real Time Operating Systems
This course will teach students how to analyze, reverse engineer, debug, and exploit embedded RTOS firmware.
Hands-on experience with a variety of real-world devices, RTOS’s, and architectures equip students with the practical knowledge and skills necessary to be proficient in RTOS vulnerability analysis, firmware evaluation, and exploitation.
LEARN MORE