Trainings that help you understand the world of attack simulations and security testing. Led by practitioners with experience at many levels — from management to hands-on execution — across multiple industries, including regulated ones.
Attack Simulations
Red teaming, purple teaming — from process to execution
How to organize and conduct attack simulations. Red teaming process, purple teaming process, hands-on execution. Regulatory requirements (TIBER, DORA, TLPT) and their real-world implementation.
For: Red teams, Blue teams, CISOs, Security managers
SDLC Security
Security in the software development lifecycle
Organizing the SDLC process with built-in security. Secure coding practices that work in real teams. How to integrate security without slowing down delivery.
Creating malicious payloads to simulate adversary behavior. Evasion techniques, persistence, exfiltration. Offensive knowledge for better threat understanding.
For: Red teams, Threat hunters, SOC analysts
Cyber Project Management
Delivering projects in cybersecurity
Cyber project management specifics — from compliance to red teaming. How to deliver what needs to be delivered in security reality. Stakeholder management, scope, timeline, budget.
For: Security managers, Project managers, CISOs, Team leads
Interested in a specific module? We deliver trainings as private sessions for teams and on-demand. Get in touch to define scope, format and timing.