Training Programs

Training That Meets Your Organization’s Cyber Needs​​

Live attacks, run by real-life hackers

Run by ex-intelligence experts, our realistic training gives your teams the opportunity to improve their teamwork and collaboration skills. Once they have completed the training exercise, participants receive detailed feedback about their performance from our Red Team hackers, who will share their offensive strategies, prioritize any weak points that have been revealed, and advise on how performance can be improved.


How it works

Our training and certification programs cover the widest array of topics and skills, creating value for every team and rank of your organization: security teams, IT and OT professionals, general employees, and executives at various management levels.

Each program is individually tailored to your security and technology configuration, the skills you require of your workforce, and a threat model built from our extensive set of cyberthreats and attack scenarios, giving special attention to the areas you wish to strengthen.

Some of our trainings portfolio


Cybersecurity Awareness - Essentials Workshop

Introduction to the key architectural and technological concepts of cybersecurity.

Security Monitoring & Management

Tools, concepts and methods used to monitor and manage the network security infrastructure


Network Security Concepts & Methodologies

Key cyber security threats, attack patterns and risks in the cyber world.

Essential Tools for Cyber Investigation

Professional tools to investigate an incident, collect initial evidence, and extract the required information for use by the incident response team

Incident Response - Principal Tactics

Tools, skills and work methods utilized by an incident response team.

Cyber Crisis Management

Skills and concepts required for successful management of a major cyber incident, based on best practices and actual case studies

Ethical Hacking & Penetration Testing Principles

Principles, methodologies and tools for ethical hacking and penetration testing.

Secure Software Development - A Basic Introduction

Principles for designing secure software architecture and developing secure code, utilizing known practices and techniques

Overview of Cyber Basics

Internal processes, mechanisms and stages of malware execution; hands-on experience in collecting evidence and performing a forensic investigation.

Graduation Boot Camp

An intensive experience, summarizing all skills, tools, concepts and techniques covered during the program