Security Training

Practical training to develop security experts

At Cyber Defense Institute we also offer training services in a multitude of fields including hacking, digital forensics and malware analysis to name just a few.
Training content is based on our real-world experience responding to incidents and extensive penetration testing experience. We cater to a wide range of training needs, from those looking to gain a high level of technical expertise and aspiring security professionals, to cybercrime investigators.

Training Courses

Hacking

This hands-on training is designed to provide an in-depth understanding of the attacker’s point-of-view and mindset by getting to know and experience attacks aimed at web applications, physical devices, and Industrial control systems.

Incident Response / Digital Forensics

This training course is designed to teach the skills necessary for incident response and cybercrime investigations. A portion of the course will be limited to law enforcement agencies and will teach forensic techniques that can be practically utilized in criminal investigation scenarios.

Malware Analysis

Through hands-on malware analysis, this training course is designed to teach the basic reverse engineering techniques required when analyzing malware, as well as practical methods of handling incidents of suspected malware infection.

The objective is to learn the fundamentals required for malware analysis, and through hands-on analysis of specimens, acquire knowledge of practical malware analysis techniques.

Exploit Writing

This is an advanced course designed to teach "practical and useful" exploit techniques. This course is designed for security professionals to learn the knowledge and skills needed to effectively find vulnerabilities and create attack code.

Cyber Threat Intelligence

his course will cover topics on how to build an environment for OSINT, security measures required when conducting OSINT, and techniques to safely research your target without revealing information about yourself including self-anonymization and use of the Deep Web and Dark Web.

Learn how to engage with underground communities, analyze leaked data and crypto currency, and research techniques for identifying threat actors.

Consult with our specialists for your security needs.

Cyber Defense Institute's core value drive us to provide top-notch cyber security services and ensuring a secure digital environment for our clients.
Trust us with every aspect of your security strategy, from inception to execution.
For confidential inquiries, we also accept requests via email at cdiprivacy(at)protonmail.com.
Please consider using this option if necessary. ※ (at)should be replaced with @.