Specialized Information Security Solutions
Attack Research
  • Home
  • About Us
    • JOBS
  • Services
  • Industries
  • Training
    • Free Class
    • Calendar
  • Blog
  • Contact
Picture

Learn the attacker's perspective

Many classes focus on using tools that are really designed for auditing.  Most real attackers don't use tools that are easy to detect or that make noise that will get them caught.   At Attack Research, all of our classes offer:
  • Hands-on with a Virtual Enterprise Network or Virtual Machine
  • Few to no specialized "hacker tools"
  • Techniques that we see real attackers use and techniques we use on our own engagements

tactical exploitation: attacking unix

Due to COVID-19, no courses are scheduled at this time.  Please check back and add yourself to our mailing list for updates on future classes and dates.
Tactical Exploitation: Attacking UNIX  focuses on the UNIX portion of our most popular multi-platform class.  For two days, students will become immersed in a unique offensive school of thought at the post-exploitation stage, a mindset seen in real-world attacks vs penetration testing. Students will learn how to compromise systems without depending on standard exploits and how to avoid discovery. By abusing features provided by standard UNIX tools and trusts, students get hands-on experience attacking a virtual enterprise network. This class, which has been presented at security conferences such as Black Hat, BruCon, and Countermeasure, is designed to help students achieve success in any environment.

While this focuses on the UNIX environment, we believe that a successful attacker must be well versed in all operating systems. Therefore, we highly recommend also taking Tactical Exploitation: Attacking Windows.  We have purposely scheduled them consecutively for a full four-day class of our Tactical Exploitation series.

Tactical exploitation: attacking windows

Due to COVID-19, no courses are scheduled at this time.  Please check back and add yourself to our mailing list for updates on future classes and dates.​
Tactical Exploitation: Attacking Windows focuses on the Windows portion of our most popular multi-platform class. For two days, students will become immersed in a unique offensive school of thought at the post-exploitation stage, a mindset seen in real-world attacks vs penetration testing. Students will learn how to compromise systems without depending on standard exploits and how to avoid discovery. By abusing features provided by standard Windows tools, students get hands-on experience attacking a virtual enterprise network. This class, which has been presented at security conferences such as Black Hat, BruCon, and Countermeasure, is designed to help students learn how to become effective in any environment, regardless of Windows versions.

While this focuses on the Windows environment, we believe that a successful attacker must be well versed in all operating systems. Therefore, we highly recommend also taking Tactical Exploitation: Attacking UNIX.  We have purposely scheduled them consecutively for a full four-day class of our Tactical Exploitation series.

Secure Software Development

Due to COVID-19, no courses are scheduled at this time.  Please check back and add yourself to our mailing list for updates on future classes and dates.​
Secure Software Development is designed to provide students with a deep understanding of secure coding practices from an attacker's perspective. The primary objectives of the course are: 
  • Learning and implementing best practices
  • Use of code security tools
  • Recognizing and correcting insecure functions
  • Input validation techniques
  • Understanding attacker methodologies

Introduction to malware reverse engineering

Due to COVID-19, no courses are scheduled at this time.  Please check back and add yourself to our mailing list for updates on future classes and dates.​
​Introduction to Malware Reverse Engineering focuses on rapid understanding and analysis of malware without in-depth knowledge of assembly or development. This hands-on, multi-discipline class brings together topics involved with basic reverse engineering as well as malware triage, incident response, and indicator of compromise development. Attack Research’s decades of computer security experience teaches students a range of techniques from low-level tools to nation-state actors. 

Tactical response

Due to COVID-19, no courses are scheduled at this time.  Please check back and add yourself to our mailing list for updates on future classes and dates.​
​Tactical Response provides a basic overview of incident response, from creating an IR program, to communicating with management, to first-tier triage of malicious files. This course will explain the roles and responsibilities on an IR team as well as discuss various philosophies and approaches to response. Additionally, this course will instruct the student in basic log, host, and network analysis. Finally, strategies for creating and presenting effective and useful IR reports will be covered. 

Sign Up and Get Training Updates!

* indicates required