State-of-the-art low-level security research, reverse engineering, system internals, and exploit development knowledge
In the field of computer security, zero day engineering stands for the process of research and development of cutting edge offensive technologies that bypass all the defenses, by design.
We like to indulge in the complex, dynamic, and highly adversarial nature of challenges in this space, while sharing the knowledge and insights collected in the process in an ethically neutral way.More
State-of-the-art zero day vulnerability and low-level security research, reverse engineering, and exploit development
Cutting edge deep technical offensive security research is always a priority and the primary source of the expertise, knowledge, and insights offered in our products. >>
With professional security researchers being the core audience of our trainings, we take it a step further to adjust the content of our trainings for arbitrary technical audiences, from beginners to seasoned experts, from e-sports players to professional white-hat hackers, and from software engineers to CTO. >>
Tap into multi-decades practical experience of a leading offensive security researcher to build safer systems, better offensive strategies, and solve your technical challenges trivially. >>
The world's only comprehensive training course on low-level hacking and security research, created by a Pwn2Own-qualified vulnerability researcher with over two decades of professional experience.
Learn the basic concepts and skills needed to reverse-engineer binary software and firmware, find bugs in code, fuzz programs and write exploits. >>
We first explore the subject at such depth where there is no distinction yet between operating systems, software implementations, and programming languages. We then proceed to apply that universal knowledge in practice to very specific technical case studies that are both modern and impactful. >>
We'll mix fundamental theoretical concepts and background knowledge with practical exercises and labs that teach you essential skills in multiple high-value specializations, while challenging you to learn more, participate in bug bounty programs and competitions. >>
|Event||Type||Length||Topic||Timezone||Date & Time||Venue||Availability|
|Big Picture of Cybersecurity||livestream||1 hour||Tech Leadership||Europe & Asia||July 3rd, 2022, 13:00 UTC||online||open access|
|Zero Day Engineering||training||4 days||Vulnerability Research & Exploit Development||Europe & Asia||July 9/16/23/30th, 2022, 09-17 UTC||online||registration closed|
|Hypervisor Security Research 101||mini-class||4 hours||Virtualization Security||Europe & Asia||September 9th, 2022, 13-17 UTC||online||registration closed|
|Hypervisor Vulnerability Research||training||4 days||Virtualization Security||Europe & Asia||September 26-29th, 2022, 09-17 UTC||online||registration closed|
|Advanced Hypervisor Exploitation||training||4 days||Virtualization Security||Europe & Asia||October 24-27th, 2022, 09-17 UTC||online||registration open|
Notes: 1. The schedule is optimized for desktop website. 2. The schedule is not final, and may be changed at our discretion.