Expert-Led Cybersecurity Training  •  December 2-11, 2025  •  On-site in Melbourne, Australia

Live Cybersecurity Training in Melbourne, Australia

Join us in Melbourne for an exclusive live training event!

We are hosting three specialized, in-person training sessions designed to give you a competitive edge. Elevate your expertise by choosing one of our three intensive, hands-on courses:

  • > Offensive Mobile Reversing & Exploitation (4 days)
  • > Applied Fuzzing & Vulnerability Analysis (2 days)
  • > Advanced AI for Cybersecurity Professionals (2 days)
 

Don’t miss this chance to learn from industry leaders and transform your cybersecurity skills. Secure your spot today!

Dec 2 - 5: Offensive Mobile Reversing & Exploitation (4 days)

This comprehensive course offers an in-depth exploration of both iOS and Android operating systems, focusing on their internals and security features. This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam.

What You Will Learn:

– Explore mobile kernel internals and key security mitigations like PAC, CoreTrust, and PPL
– Master the latest ARM64 instruction set and its security implications
– Reverse engineer iOS and Android applications and system binaries
– Perform advanced dynamic instrumentation with Frida.
– Bypass sophisticated anti-debugging and obfuscation techniques
– Audit iOS and Android apps for critical security vulnerabilities
– Identify common bug categories, including Use-after-Free (UaF) and heap overflows
– Analyze accessibility malware and reverse engineer real-world threats like crypto-wallet stealers
– Understand and bypass device fingerprinting and anti-fraud measures
– Learn the mechanics behind modern rooting and jailbreaking techniques
– Effectively use reverse engineering tools like Ghidra and Hopper
– Symbolicate the iOS and Android kernel for deeper analysis
– Extract and decrypt boot images on Android devices

Dec 8 - 9: Applied Fuzzing & Vulnerability Analysis (2 days)

Learn to proactively find hidden software vulnerabilities using automated fuzzing techniques on Linux and Windows. This course teaches the fundamentals of fuzzing and triage analysis to help you identify and fix security flaws early in the development lifecycle.

What You Will Learn:

– Master the fundamentals and mechanics of modern fuzzing
– Implement efficient and scalable fuzzing strategies for diverse targets
– Design custom grammars to effectively test complex data formats
– Discover and analyze a wide range of software vulnerability classes
– Leverage QEMU for advanced, binary-only fuzzing scenarios
– Apply targeted fuzzing techniques to both ARM and Windows binaries
– Develop methods for capturing and triaging crashes in custom applications
– Establish persistence in intricate programs to enable deeper analysis
– Reinforce your skills through hands-on exercises using real-world software

Dec 10 - 11: Advanced AI for Cybersecurity Professionals (2 days)

This intensive course is designed for cybersecurity practitioners looking to leverage advanced AI. You will gain a thorough understanding of machine learning, neural networks, and Large Language Models (LLMs) to strengthen cybersecurity frameworks. The course provides hands-on experience in building AI-powered security solutions to proactively protect digital assets from emerging cyber threats.

What You Will Learn:

Foundations of Machine Learning
– Master the fundamentals of model training, testing, and validation
– Optimize model performance by reducing loss with techniques like Stochastic Gradient Descent
– Utilize key data science libraries, including Pandas, Scikit-learn, and Statsmodels
– Implement anomaly detection systems in hands-on labs and develop strategies for working with extremely large datasets

Deep Dive into Large Language Models (LLMs)
– Explore the architecture of Neural Networks and understand how LLMs operate
– Evaluate popular open-source LLMs and identify their practical cybersecurity use cases
– Address the unique security challenges inherent in LLM applications

Building AI-Powered Security Tools
– Construct intelligent applications using modern frameworks like LangChain and LlamaIndex
– Implement Retrieval-Augmented Generation (RAG) and fine-tune models with custom data
– Manage and query complex information using vector databases and multiple data sources
– Develop and deploy a complete, full-stack AI application with an interactive Streamlit interface
– Examine the future trajectory and emerging trends in Artificial Intelligence

Features & Bonuses

Hands-on and up-to-date

The course covers latest in security. Participants will engage in reverse engineering exercises, craft exploits, and explore real-world vulnerabilities and mitigations

In-Person Training

The training is conducted in a live format, fostering an interactive learning environment. Engage with instructors in real-time, ask questions, and receive immediate feedback

No system specifications

We provide access to emulators and cloud instances for the entire duration of the training

Resources for Future Reference

You'll receive access to custom scripts, videos, VM and detailed documentation on the labs for future reference

Certification of Completion

You’ll receive a certificate of completion validating your acquired knowledge

Post-Training Support

A Slack channel will be available after the training for ongoing support. Instructors will be accessible to answer questions and offer guidance as needed

TRUSTED TRAINING PROVIDERS

Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.

On-site Location in Melbourne, Australia

Drawing on our extensive training experience, we carefully choose venues with participants’ comfort in mind.

Interactive discussion in a mobile security training session at BlackHat

CONTACT US

Use this form to enroll your team or ask us anything about our cybersecurity training programs in Australia