Expert-Led Cybersecurity Training  •  April 21-28, 2026  •  On-site in Melbourne, Australia

Live Cybersecurity Training in Melbourne, Australia

Join us in Melbourne for an exclusive live training event!

We are hosting three specialized, in-person training sessions designed to give you a competitive edge. Elevate your expertise by choosing one of our three intensive, hands-on courses:

  • > Offensive Mobile Reversing & Exploitation (4 days)
  • Practical AI Security: Attacks, Defenses, and Applications (2 days)
 

Don’t miss this chance to learn from industry leaders and transform your cybersecurity skills. Secure your spot today!

April 21 - 24, 2026: Offensive Mobile Reversing & Exploitation (4 days)

This comprehensive course offers an in-depth exploration of both iOS and Android operating systems, focusing on their internals and security features. This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam.

What You Will Learn:

– Explore mobile kernel internals and key security mitigations like PAC, CoreTrust, and PPL
– Master the latest ARM64 instruction set and its security implications
– Reverse engineer iOS and Android applications and system binaries
– Perform advanced dynamic instrumentation with Frida.
– Bypass sophisticated anti-debugging and obfuscation techniques
– Audit iOS and Android apps for critical security vulnerabilities
– Identify common bug categories, including Use-after-Free (UaF) and heap overflows
– Analyze accessibility malware and reverse engineer real-world threats like crypto-wallet stealers
– Understand and bypass device fingerprinting and anti-fraud measures
– Learn the mechanics behind modern rooting and jailbreaking techniques
– Effectively use reverse engineering tools like Ghidra and Hopper
– Symbolicate the iOS and Android kernel for deeper analysis
– Extract and decrypt boot images on Android devices

Dec 8 - 9: Applied Fuzzing & Vulnerability Analysis (2 days)

Learn to proactively find hidden software vulnerabilities using automated fuzzing techniques on Linux and Windows. This course teaches the fundamentals of fuzzing and triage analysis to help you identify and fix security flaws early in the development lifecycle.

What You Will Learn:

– Master the fundamentals and mechanics of modern fuzzing
– Implement efficient and scalable fuzzing strategies for diverse targets
– Design custom grammars to effectively test complex data formats
– Discover and analyze a wide range of software vulnerability classes
– Leverage QEMU for advanced, binary-only fuzzing scenarios
– Apply targeted fuzzing techniques to both ARM and Windows binaries
– Develop methods for capturing and triaging crashes in custom applications
– Establish persistence in intricate programs to enable deeper analysis
– Reinforce your skills through hands-on exercises using real-world software

April 27-28, 2026: Practical AI Security: Attacks, Defenses, and Applications (2 days)

This course gives you a practical, hands-on path into AI security with a strong focus on LLMpowered applications. You’ll learn how modern AI systems are built, how they fail, and how to secure them against real threats. Everything is structured around doing rather than theory, so you immediately apply what you learn.

You begin with a solid technical foundation. Through hands-on labs, you’ll build working LLM applications using the Hugging Face Transformers ecosystem, implement RAG pipelines with LangChain, LlamaIndex, and FAISS, and explore how tokenization, embeddings, and context windows shape model behavior. You’ll also learn advanced prompt engineering patterns and build your own MCP servers to automate security tasks and integrate AI into real workflows.

The security phase takes you deep into offensive and defensive techniques. You’ll practice prompt injection, multimodal exploitation, and workflow manipulation against agents and AI-generated (“vibe-coded”) applications. You’ll map these risks to Google’s Secure AI Framework and learn how to threat model, and harden RAG systems, agent logic, and custom MCP servers with proper authentication and validation.

You finish by learning how to use AI to accelerate your own work. You’ll use tools like Fabric AI, OpenRouter, and Perplexity to automate threat intelligence, research, and analysis, giving you a repeatable process to move faster with better accuracy.

By the end of the course, you’ll be able to design, assess, and secure AI-powered systems with confidence.

You’ll also be prepared for the Certified AI Security Researcher (CAISR) exam, with one exam attempt included.

Features & Bonuses

Hands-on and up-to-date

The course covers latest in security. Participants will engage in reverse engineering exercises, craft exploits, and explore real-world vulnerabilities and mitigations

In-Person Training

The training is conducted in a live format, fostering an interactive learning environment. Engage with instructors in real-time, ask questions, and receive immediate feedback

No system specifications

We provide access to emulators and cloud instances for the entire duration of the training

Resources for Future Reference

You'll receive access to custom scripts, videos, VM and detailed documentation on the labs for future reference

Certification of Completion

You’ll receive a certificate of completion validating your acquired knowledge

Post-Training Support

A Slack channel will be available after the training for ongoing support. Instructors will be accessible to answer questions and offer guidance as needed

TRUSTED TRAINING PROVIDERS

Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.

On-site Location in Melbourne, Australia

Drawing on our extensive training experience, we carefully choose venues with participants’ comfort in mind.

Interactive discussion in a mobile security training session at BlackHat

CONTACT US

Use this form to enroll your team or ask us anything about our cybersecurity training programs in Australia