Our Services

ICS/SCADA Security Training

ICS/SCADA system controls most of the critical infrastructures today. The system may seem safe due to its OT nature or the latest patching technology, but it is still penetrable. One should truly understand how to penetrate, in order to find out effective ways to defend.

Malware Analysis Training

In the current state where malware is constantly being modified to bypass all sorts of modern endpoint controls, the skills taught in this course are becoming increasingly critical for organizations to properly defend themselves.

IoT Exploitation Training

In the recent boom of IoT industry, IoT devices are now all around us. Despite the severe need, IoT developers have minimal considerations in developing higher security standard. IoT device consuming institutions and corporations do not realize their high level of security can easily be compromised through a loophole existing in IoT devices.

Penetration Test Training

Over the recent years, exploit kits are constantly being improved with powerful functions, and the latest vulnerabilities to attack all sorts of modern endpoint controls, the skills taught in this course are becoming increasingly critical for organizations to properly defend themselves.

Open Source Intelligence Training

Web contents open to the general public is only the tip of what actually exists in the web. Deep down, critical and secretive information that threaten institutions, corporations and individuals lie bare naked. To bust the complacency of these parties, monitoring and hunting down such threat is essential.