• Secure Coding *

  • Reverse Engineering *

  • Exploit Writing *

  • Incident Handling and Forensics Examinations

* All the topics covered in each course have practical lab at the end of the topic, and the final day includes a five hours hands-on practical implementation of every technique covered in the course.