Contain chaos, restore business, hands-on practices
- Malware Reverse Engineering I: Tools & Techniques
Tear apart binaries, scripts, and macros in isolated labs; identify TTPs, write IOC signatures, and feed intel back to the SOC.
- Malware Reverse Engineering II: Advanced Workshop
Tackle 64-bit obfuscation, multi-stage loaders, and file-less payloads; automate triage with custom plugins and scripts.
- Smartphone Forensic Analysis In-Depth
Extract and decrypt data from Android & iOS, trace location artefacts, and reconstruct user timelines that stand up in court.
- Windows Forensic Deep Dive
Master registry, event log, prefetch, memory, and shadow-copy analysis to pinpoint lateral movement and privilege escalation.
- macOS & iOS Forensic Analysis
Acquire volatile and file-system artefacts, decode proprietary logs, and run triage on live endpoints without tipping off attackers.
- Threat Hunting Masterclass
Blend behavioural analytics with hypothesis-driven hunts across hybrid networks; pivot from theory to confirmed adversary in a single roar.