Budapest

Training

Specialist training to help you develop advanced technical security skills.

Hunnic Cyber provides advanced training in Red Teaming, Malware Development & EDR Evasion, Phishing, Machine & Deep Learning, Exploit Development, Incident Response and more.

Delivered live with world class trainers, with access to custom tools and unique techniques - you can develop your skills mentored, by experienced hackers and defenders.



image line-img

Hunnic Cyber - Tooling

Develop

Cyber Security, both offensive and defensive moves forward at rapid pace. Only by pushing and enhancing your skills further can you keep developing.


 Hunnic Cyber - Tooling

Experts

All of our trainers are world class specialists with extensive experience delivering consulting and in-house functions for mature, complex organisations.


Hunnic Cyber - Tooling

Software

As part of our knowledge transfer, you will leave with custom Hunnic Cyber tools in a range of areas to use in your own assessments and the know-how to adapt.


Available

Courses

image

ICS/SCADA Incident Management

Learn about the ICS Incident Response Chain, the Purdue Model, real world threats to ICS, ICS Incident Response and ICS Security Governance.



Coming Soon
image

Adversary Simulation

In our flagship 2 week training in Budapest learn how to perform complex adversary simulation assessments, build your own tools, and more.



AVAILABLE
image

Exploit Development on Windows

From x86 & x64 Assembly, Stack Overflows, to developing an ASLR & DEP bypass on a Virtual Function Table Overwrite on Windows.



Coming Soon
image

ICS/SCADA Hacking

Learn how to perform active penetration testing against live ICS/SCADA systems, launch real attacks against our simulated ICS environment.



Coming Soon
image

Incident Detection & Response

Learn about the concepts of Incident Response Chain, Incident Categorization, SIEM & EDR technologies, and the roles, responsbilities and skills involved.



Coming Soon
image

Next-Gen IT SOC

Optimise your detection and learn Incident Response plans, EDR, SOAR, Vulerability Management, Threat Intelligence and Incident Management Toolkit engineering.



Coming Soon


IN MEMORIAM - Czakó Emerencia Ágnes