Defensive Security

Training Workshops

In & Out - Network Data Exfiltration Techniques - RED Edition

This training class has been designed to present students modern, emerging tools and techniques available for network data exfiltration, testing and bypassing DLP/IDS/IPS/FW systems, protocol tunneling, hiding, pivoting and generating malicious network events.

Detection of In & Out - Network Data Exfiltration Techniques - BLUE Edition

The main goal of this training is to achieve better detection of post-exploitation activities and more effective incident handling, thus allowing to reduce the number of false positives in the SOC environment. Highly technical content and only a hands-on practical approach guaranteed.

Open Source Defensive Security

Advanced IT Security workshop dedicated to IT professionals in mind who need to close the gaps within Web, Linux & Network Security knowledge (A Trinity of Tactics). Very extensive and up to date training content with a focus especially on blue vs red team actions.

Docker Security - from 0 to hero

Highly technical, fully practical, based on real attack and defense scenarios. The main goal of this training is to give you confidence, you do things right and properly accordingly to Docker security aspects.