We build and deliver training courses that explore how to think like an attacker; how an attacker might target and exploit an organization’s systems, networks, or devices. Courses are "hands-on" and made for developers, engineers, penetration testers, forensic investigators, vulnerability researchers, security auditors, and general IT professionals
Check back later!
We don't have anything available for registration right now. Check back later!