Trainings

Trainings that help you understand the world of attack simulations and security testing. Led by practitioners with experience at many levels — from management to hands-on execution — across multiple industries, including regulated ones.

Attack Simulations

Red teaming, purple teaming — from process to execution

How to organize and conduct attack simulations. Red teaming process, purple teaming process, hands-on execution. Regulatory requirements (TIBER, DORA, TLPT) and their real-world implementation.

For: Red teams, Blue teams, CISOs, Security managers

SDLC Security

Security in the software development lifecycle

Organizing the SDLC process with built-in security. Secure coding practices that work in real teams. How to integrate security without slowing down delivery.

For: Developers, Tech leads, Security champions, Architects

Malware Development

Building payloads like attackers

Creating malicious payloads to simulate adversary behavior. Evasion techniques, persistence, exfiltration. Offensive knowledge for better threat understanding.

For: Red teams, Threat hunters, SOC analysts

Cyber Project Management

Delivering projects in cybersecurity

Cyber project management specifics — from compliance to red teaming. How to deliver what needs to be delivered in security reality. Stakeholder management, scope, timeline, budget.

For: Security managers, Project managers, CISOs, Team leads

Interested in a specific module? We deliver trainings as private sessions for teams and on-demand. Get in touch to define scope, format and timing.

Inquire about a training