Expert-Led Cybersecurity Training • April 21-28, 2026 • On-site in Melbourne, Australia
Live Cybersecurity Training in Melbourne, Australia
Join us in Melbourne for an exclusive live training event!
We are hosting three specialized, in-person training sessions designed to give you a competitive edge. Elevate your expertise by choosing one of our three intensive, hands-on courses:
- > Offensive Mobile Reversing & Exploitation (4 days)
- > Practical AI Security: Attacks, Defenses, and Applications (2 days)
Don’t miss this chance to learn from industry leaders and transform your cybersecurity skills. Secure your spot today!
April 21 - 24, 2026: Offensive Mobile Reversing & Exploitation (4 days)
This comprehensive course offers an in-depth exploration of both iOS and Android operating systems, focusing on their internals and security features. This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam.
What You Will Learn:
– Explore mobile kernel internals and key security mitigations like PAC, CoreTrust, and PPL
– Master the latest ARM64 instruction set and its security implications
– Reverse engineer iOS and Android applications and system binaries
– Perform advanced dynamic instrumentation with Frida.
– Bypass sophisticated anti-debugging and obfuscation techniques
– Audit iOS and Android apps for critical security vulnerabilities
– Identify common bug categories, including Use-after-Free (UaF) and heap overflows
– Analyze accessibility malware and reverse engineer real-world threats like crypto-wallet stealers
– Understand and bypass device fingerprinting and anti-fraud measures
– Learn the mechanics behind modern rooting and jailbreaking techniques
– Effectively use reverse engineering tools like Ghidra and Hopper
– Symbolicate the iOS and Android kernel for deeper analysis
– Extract and decrypt boot images on Android devices
Dec 8 - 9: Applied Fuzzing & Vulnerability Analysis (2 days)
Learn to proactively find hidden software vulnerabilities using automated fuzzing techniques on Linux and Windows. This course teaches the fundamentals of fuzzing and triage analysis to help you identify and fix security flaws early in the development lifecycle.
What You Will Learn:
– Master the fundamentals and mechanics of modern fuzzing
– Implement efficient and scalable fuzzing strategies for diverse targets
– Design custom grammars to effectively test complex data formats
– Discover and analyze a wide range of software vulnerability classes
– Leverage QEMU for advanced, binary-only fuzzing scenarios
– Apply targeted fuzzing techniques to both ARM and Windows binaries
– Develop methods for capturing and triaging crashes in custom applications
– Establish persistence in intricate programs to enable deeper analysis
– Reinforce your skills through hands-on exercises using real-world software
April 27-28, 2026: Practical AI Security: Attacks, Defenses, and Applications (2 days)
This course gives you a practical, hands-on path into AI security with a strong focus on LLMpowered applications. You’ll learn how modern AI systems are built, how they fail, and how to secure them against real threats. Everything is structured around doing rather than theory, so you immediately apply what you learn.
You begin with a solid technical foundation. Through hands-on labs, you’ll build working LLM applications using the Hugging Face Transformers ecosystem, implement RAG pipelines with LangChain, LlamaIndex, and FAISS, and explore how tokenization, embeddings, and context windows shape model behavior. You’ll also learn advanced prompt engineering patterns and build your own MCP servers to automate security tasks and integrate AI into real workflows.
The security phase takes you deep into offensive and defensive techniques. You’ll practice prompt injection, multimodal exploitation, and workflow manipulation against agents and AI-generated (“vibe-coded”) applications. You’ll map these risks to Google’s Secure AI Framework and learn how to threat model, and harden RAG systems, agent logic, and custom MCP servers with proper authentication and validation.
You finish by learning how to use AI to accelerate your own work. You’ll use tools like Fabric AI, OpenRouter, and Perplexity to automate threat intelligence, research, and analysis, giving you a repeatable process to move faster with better accuracy.
By the end of the course, you’ll be able to design, assess, and secure AI-powered systems with confidence.
You’ll also be prepared for the Certified AI Security Researcher (CAISR) exam, with one exam attempt included.
Features & Bonuses
Hands-on and up-to-date
The course covers latest in security. Participants will engage in reverse engineering exercises, craft exploits, and explore real-world vulnerabilities and mitigations
In-Person Training
The training is conducted in a live format, fostering an interactive learning environment. Engage with instructors in real-time, ask questions, and receive immediate feedback
No system specifications
We provide access to emulators and cloud instances for the entire duration of the training
Resources for Future Reference
You'll receive access to custom scripts, videos, VM and detailed documentation on the labs for future reference
Certification of Completion
You’ll receive a certificate of completion validating your acquired knowledge
Post-Training Support
A Slack channel will be available after the training for ongoing support. Instructors will be accessible to answer questions and offer guidance as needed
TRUSTED TRAINING PROVIDERS
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.
















On-site Location in Melbourne, Australia
- Venue location: To be confirmed.
Drawing on our extensive training experience, we carefully choose venues with participants’ comfort in mind.
CONTACT US
Use this form to enroll your team or ask us anything about our cybersecurity training programs in Australia