Cyber Security Training
Our Cyber Security related training and consulting services cover a diverse range of scenarios, protocols, hardware, software stacks, and operating systems.
We excel at transferring deep technical skills, as well as both offensive and defensive doctrines.
Our super skilled low-profile experts have been involved in anything from reverse engineering, injections and forensics, to building secure hardware and software, advising to red and blue teams, as well as training CERTs, and building long term government and defense sectors cyber security training programs.
We work with governments, Aerospace and Defense sector organizations, banks, insurance companies, SoC vendors, OEM's, ODM's, and an impressive list of Fortune 500 companies.
Our network consists of the most talented lone wolves, as well as well established penetration testing and InfoSec companies, and we are able to build and customize your organization training needs on anything on ground, seas, air, or the outer space. We have done it all.
When successfully completing a training, we will be happy to provide your organization with continuous support and consulting.
To book a training - contact us today!
Given the sensitivity of some of our customer's activities, we will naturally not reveal all of our listings. In the case of Cyber Security, we will in fact not reveal the vast majority of those. Sorry. If you need something, we will make sure you get it, as long as you are a legit organization and expect no 0-days.
Some of our courses follow (other courses are listed in the respective Linux Internals and Android Internals sections):
Beginner-Intermediate level (very partial list, mostly software oriented):
- Malware Analysis (4 days)
- The Art of (Linux) Reverse Engineering (2 days)
- Advanced Linux Security (5 days)
- Web and Mobile Web Application Security (5 days)
- Extensive Application Security (4-7 days)
- iOS Application Security Research (3 days)
- Web Application Security Research (5 days)
- Introduction to Applied Cryptography (2-3 days)
- Security for Embedded Systems (2 days)
- Our Public Android Internals and Security course collection
- Our Public Linux Internals and Security course collection
- Introduction to SCADA Security (1-5 days) - contact us for details.
- Mathematical Foundations of Cryptography - contact us for specific constructs and discussion.
- For more courses - contact us
Intermediate-Advanced levels (very partial list, mostly exploitation and embedded oriented):
- Linux Reverse Engineering via Malware Analysis (3-5 days, ARM, aarch64, X86, x86_64, MIPS, PowerPC)
- Windows Reverse Engineering via Malware Analysis (3-5 days)
- ARM Exploitation (3-4 days, ARM, aarch64 - similar curriculum is available for X86, x86_64, MIPS, PowerPC)
- Our Public Android Internals and Security course collection
- Our Public Linux Internals and Security course collection
- SCADA Assessment and Exploitation (3-8 days) - contact us for details.
- Reverse Engineering, IDA and Binary exploitation (13 days) - contact us for details.
- iOS Internals by Reverse Engineering (5 days) - contact us for details.
- iOS Jailbreaking and exploitation (3 days) - contact us for details.
- ARM TrustZone Exploitation (3 days) - contact us for details.
- ARM Mbed exploitation - contact us for details.
- Windows Forensics - contact us for details.
- MacOS Forensics - contact us for details.
- Linux Forensics - contact us for details.
- Android Forensics - contact us for details.
- Certified ARM, Intel FPGA, MicroSemi, NXP, STMicroelectronics, and Linux Foundation training - contact us for details.
- For more courses and custom training - contact us.
Please note that we have very basic to very advanced level courses of Reverse Engineering and Exploitation for all of the leading platforms. While there is a slight bias towards Linux and ARM in the subset of courses listed above, the very same courses are available for any combination of Architecture (X86_64, x86, MIPS, ARM/64, PowerPC) and Operating Systems (Windows, Linux, MacOS, Android, QNX, VxWorks, Integrity, FreeRTOS, ThreadX. ARM Mbed), as well as bare metal implementations.
Also, note that everything is can be customized to the customer's need, in the topics and the number of days, and it is not uncommon that we give 1-2 day theoretical, awareness courses for decision makers.
If you know what you need - talk to us and we'll make sure you get it. If you don't - talk to us, and we'll make sure you'll know what you need - and then you'll get it.
We are the best Cyber Security training provider. Period. Know someone better? They are probably working with us anyway.
The PSCG hosts both open enrollment and corporate onsite classes, as well as online (virtual, remote) instructor led training. Our classes are taught in English, Spanish and Hebrew, and can be customized to the customer's request (extra charges apply).
To book a training - contact us today!