Your browser is not optimized for viewing this website.

More information »



We build and deliver training courses that explore how to think like an attacker; how an attacker might target and exploit an organization’s systems, networks, or devices. Courses are "hands-on" and made for developers, engineers, penetration testers, forensic investigators, vulnerability researchers, security auditors, and general IT professionals

Check back later!

We don't have anything available for registration right now. Check back later!

Forgot password?
Staff Log In