On-Site Cybersecurity Training in Saudi Arabia
Expert-led mobile security and AI security training delivered on-site across Saudi Arabia — Riyadh, Jeddah, and beyond. We bring the labs, the instructors, and the certifications to you.
Available in: Riyadh · Jeddah · NEOM
5
Best Sellers
2–4
Days Per Course
Global
Worldwide Delivery
5
Certifications
Our Best Sellers
Our most popular courses, available for on-site delivery in Saudi Arabia. Dates and location are confirmed upon booking.
Offensive Mobile Reversing and Exploitation
Advanced mobile security covering userland and kernel exploitation across iOS and Android. Hands-on labs with Corellium cloud instances — no physical devices needed.
What You'll Learn
- iOS & Android application security and advanced exploitation
- Reverse engineering with Frida, Ghidra, and custom tooling
- Kernel exploitation techniques for iOS and Android
- Corellium cloud lab access — no physical devices needed
- Preparation for the OMSE certification exam
Practical AI Security: Attacks, Defenses, and Applications
Master the security landscape of modern AI systems — LLMs, RAG pipelines, AI agents, and MCP servers. Identify, exploit, and defend real-world AI vulnerabilities.
What You'll Learn
- LLM architecture security and prompt injection attacks
- RAG pipeline vulnerabilities and exploitation techniques
- MCP server security assessment and exploitation
- AI agent security — tool poisoning and guardrail bypasses
- Preparation for the CAISR certification exam
Offensive ARM64 Reversing and Exploitation
Understand the fundamentals of reverse engineering and exploit writing for ARM64 architecture. Essential for any security engineer working with modern mobile or embedded systems.
What You'll Learn
- ARM64 assembly language fundamentals
- Static and dynamic reverse engineering techniques
- Stack and heap exploitation on ARM64
- Real-world vulnerability analysis and exploit development
- Preparation for the CASR certification exam
Offensive Android Internals
Deep dive into Android OS internals and security architecture. Learn to reverse engineer Android binaries, APKs, and system components.
What You'll Learn
- Android OS architecture and security model
- Reverse engineering APKs and native binaries
- Android kernel and binder security
- Privilege escalation and vulnerability exploitation
- Preparation for the CMSE certification exam
Offensive iOS Internals
In-depth coverage of iOS OS internals, memory management, sandboxing, IPC, and code signing. Hands-on labs on real iOS security research techniques.
What You'll Learn
- iOS OS architecture, memory management, and sandboxing
- IPC mechanisms and XPC security
- Code signing, entitlements, and bypass techniques
- Kernel vulnerability research fundamentals
- Preparation for the CISE certification exam
Why Train With 8kSec?
Expert Instructors
Learn from researchers with published CVEs and conference presentations at Black Hat, DEF CON, and more.
Hands-On Labs
Cloud-based lab environments with Corellium access. No physical devices needed — just bring your laptop.
Industry Certifications
Every course includes a certification pathway recognised globally in the security community.
Small Class Sizes
Intimate classroom setting ensures personalized attention and direct interaction with instructors.
Bring 8kSec Training to Saudi Arabia
Tell us about your team and we'll put together a tailored training plan. We typically respond within 24 hours.
Training Enquiries
trainings@8ksec.ioResponse Time
We typically reply within 24 hours on business days.