Expert-Led Cybersecurity Training • December 2-11, 2025 • On-site in Melbourne, Australia
Live Cybersecurity Training in Melbourne, Australia
Join us in Melbourne for an exclusive live training event!
We are hosting three specialized, in-person training sessions designed to give you a competitive edge. Elevate your expertise by choosing one of our three intensive, hands-on courses:
- > Offensive Mobile Reversing & Exploitation (4 days)
- > Applied Fuzzing & Vulnerability Analysis (2 days)
- > Advanced AI for Cybersecurity Professionals (2 days)
Don’t miss this chance to learn from industry leaders and transform your cybersecurity skills. Secure your spot today!
Dec 2 - 5: Offensive Mobile Reversing & Exploitation (4 days)
This comprehensive course offers an in-depth exploration of both iOS and Android operating systems, focusing on their internals and security features. This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam.
What You Will Learn:
– Explore mobile kernel internals and key security mitigations like PAC, CoreTrust, and PPL
– Master the latest ARM64 instruction set and its security implications
– Reverse engineer iOS and Android applications and system binaries
– Perform advanced dynamic instrumentation with Frida.
– Bypass sophisticated anti-debugging and obfuscation techniques
– Audit iOS and Android apps for critical security vulnerabilities
– Identify common bug categories, including Use-after-Free (UaF) and heap overflows
– Analyze accessibility malware and reverse engineer real-world threats like crypto-wallet stealers
– Understand and bypass device fingerprinting and anti-fraud measures
– Learn the mechanics behind modern rooting and jailbreaking techniques
– Effectively use reverse engineering tools like Ghidra and Hopper
– Symbolicate the iOS and Android kernel for deeper analysis
– Extract and decrypt boot images on Android devices
Dec 8 - 9: Applied Fuzzing & Vulnerability Analysis (2 days)
Learn to proactively find hidden software vulnerabilities using automated fuzzing techniques on Linux and Windows. This course teaches the fundamentals of fuzzing and triage analysis to help you identify and fix security flaws early in the development lifecycle.
What You Will Learn:
– Master the fundamentals and mechanics of modern fuzzing
– Implement efficient and scalable fuzzing strategies for diverse targets
– Design custom grammars to effectively test complex data formats
– Discover and analyze a wide range of software vulnerability classes
– Leverage QEMU for advanced, binary-only fuzzing scenarios
– Apply targeted fuzzing techniques to both ARM and Windows binaries
– Develop methods for capturing and triaging crashes in custom applications
– Establish persistence in intricate programs to enable deeper analysis
– Reinforce your skills through hands-on exercises using real-world software
Dec 10 - 11: Advanced AI for Cybersecurity Professionals (2 days)
This intensive course is designed for cybersecurity practitioners looking to leverage advanced AI. You will gain a thorough understanding of machine learning, neural networks, and Large Language Models (LLMs) to strengthen cybersecurity frameworks. The course provides hands-on experience in building AI-powered security solutions to proactively protect digital assets from emerging cyber threats.
What You Will Learn:
Foundations of Machine Learning
– Master the fundamentals of model training, testing, and validation
– Optimize model performance by reducing loss with techniques like Stochastic Gradient Descent
– Utilize key data science libraries, including Pandas, Scikit-learn, and Statsmodels
– Implement anomaly detection systems in hands-on labs and develop strategies for working with extremely large datasets
Deep Dive into Large Language Models (LLMs)
– Explore the architecture of Neural Networks and understand how LLMs operate
– Evaluate popular open-source LLMs and identify their practical cybersecurity use cases
– Address the unique security challenges inherent in LLM applications
Building AI-Powered Security Tools
– Construct intelligent applications using modern frameworks like LangChain and LlamaIndex
– Implement Retrieval-Augmented Generation (RAG) and fine-tune models with custom data
– Manage and query complex information using vector databases and multiple data sources
– Develop and deploy a complete, full-stack AI application with an interactive Streamlit interface
– Examine the future trajectory and emerging trends in Artificial Intelligence
Features & Bonuses
Hands-on and up-to-date
The course covers latest in security. Participants will engage in reverse engineering exercises, craft exploits, and explore real-world vulnerabilities and mitigations
In-Person Training
The training is conducted in a live format, fostering an interactive learning environment. Engage with instructors in real-time, ask questions, and receive immediate feedback
No system specifications
We provide access to emulators and cloud instances for the entire duration of the training
Resources for Future Reference
You'll receive access to custom scripts, videos, VM and detailed documentation on the labs for future reference
Certification of Completion
You’ll receive a certificate of completion validating your acquired knowledge
Post-Training Support
A Slack channel will be available after the training for ongoing support. Instructors will be accessible to answer questions and offer guidance as needed
TRUSTED TRAINING PROVIDERS
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.















On-site Location in Melbourne, Australia
- Venue location: To be confirmed.
Drawing on our extensive training experience, we carefully choose venues with participants’ comfort in mind.

CONTACT US
Use this form to enroll your team or ask us anything about our cybersecurity training programs in Australia