• Cyber Warfare
    • Cyber Warfare
    • Cyber Warfare

    • R11,999.00
    • This training is an advanced course that covers topics in the Red-Team Cyber Warfare methodologies. The participants will get an in-depth look into the mind of a Black-Hat hacker. The training includes defense and offense and takes a deep dive into its practical world using the CYBERIUM ARENA simulator. Students will learn the different information-gathering tools and security bypassing products…
    • Add to basket
  • Exploit Development Advanced
    • Exploit Development Advanced
    • Exploit Development Advanced

    • R11,999.00
    • In this course, students who participated in the introductory course (RT433) will further deepen their knowledge and understanding of exploit research and development . This comprehensive course is designed to turn the students into high-level security experts. They will learn how to find critical vulnerabilities everywhere in the platforms an exploit them. This training is a must-have knowledge for anyone…
    • Add to basket
  • Exploit Development Intermediate
    • Exploit Development Intermediate
    • Exploit Development Intermediate

    • R11,999.00
    • During This Course, participants will Learn programming languages and Shellcode writing. They will acknowledge in program structure and execution patterns for the cause of knowing how to find vulnerabilities and exploit in programs and codes to gain control of target systems and applications. This course covers how to write shellcodes, programs, and tools, essential skills for advanced penetration testers and…
    • Add to basket
  • IoT Exploitation
    • IoT Exploitation
    • IoT Exploitation

    • R11,999.00
    • IoT or the Internet of Things is one of the most upcoming trends. However, within the growth of many new devices coming up every few months, not much attention has been paid to its security until now. The course will be based on both theoretical and practical use of vulnerabilities in IoT devices, IoT devices architecture, identifying attack surfaces, and…
    • Add to basket
  • Offensive Python
    • Offensive Python
    • Offensive Python

    • R11,999.00
    • The world of information security consists of a multitude of complex issues and techniques on how to deal with the many environments that can be vulnerable to global cyber-attacks. The groups that get stronger are not only the hackers who try to hurt you but also the defense groups in the organizations, the more known the attacks, the more definite…
    • Add to basket
  • Web Application Security Intermediate
    • Web Application Security Intermediate
    • Web Application Security Intermediate

    • R11,999.00
    • The Web Application security course will help participants understand major web application flaws and their exploitation, as well as learn a proven process for locating these flaws consistently. This training program's primary goal is to help security specialists understand web application risks in their organization and learn how to conduct web app security assessments, mitigate the vulnerabilities, and write technical…
    • Add to basket
  • WebApp Security Advanced
    • WebApp Security Advanced
    • WebApp Security Advanced

    • R11,999.00
    • During this training, students will get knowledge and skills of the pentesters procedure to detect security vulnerabilities in web applications using a combination of manual and automated techniques and methods. Testing web-application security is not intuitive, and to be useful, you need an understanding of web application design, HTTP, JavaScript, browser behavior, and potentially other technologies. Duration: 40 Hours Target…
    • Add to basket
  • Windows Exploitation
    • Windows Exploitation
    • Windows Exploitation

    • R11,999.00
    • Microsoft Windows is one of the most popular operating systems ever used. This operating system can be found on any device, such as computers, phones, banking machines, and many more. In this training, you will learn about Windows operating system, and you will experience in both offensive and defensive methods, knowing how to break into the system is not the…
    • Add to basket