Hunnic Cyber provides advanced training in Red Teaming, Malware Development & EDR Evasion, Phishing, Machine & Deep Learning, Exploit Development, Incident Response and more.
Delivered live with world class trainers, with access to custom tools and unique techniques - you can develop your skills mentored, by experienced hackers and defenders.
Cyber Security, both offensive and defensive moves forward at rapid pace. Only by pushing and enhancing your skills further can you keep developing.
All of our trainers are world class specialists with extensive experience delivering consulting and in-house functions for mature, complex organisations.
As part of our knowledge transfer, you will leave with custom Hunnic Cyber tools in a range of areas to use in your own assessments and the know-how to adapt.
Learn about the ICS Incident Response Chain, the Purdue Model, real world threats to ICS, ICS Incident Response and ICS Security Governance.
In our flagship 2 week training in Budapest learn how to perform complex adversary simulation assessments, build your own tools, and more.
From x86 & x64 Assembly, Stack Overflows, to developing an ASLR & DEP bypass on a Virtual Function Table Overwrite on Windows.
Learn how to perform active penetration testing against live ICS/SCADA systems, launch real attacks against our simulated ICS environment.
Learn about the concepts of Incident Response Chain, Incident Categorization, SIEM & EDR technologies, and the roles, responsbilities and skills involved.
Optimise your detection and learn Incident Response plans, EDR, SOAR, Vulerability Management, Threat Intelligence and Incident Management Toolkit engineering.