Join us for 3 courses of hands-on, full-immersion training lead by industry experts
Hands On Hacking Fundamentals
Dig into the basics of hacking and develop a fundamental understanding of concept and techniques with hands-on training
Mimic what criminal hackers do and how they infiltrate enterprises when you are given a fully fledged infrastructure to attack
Fuzzing & Vulnerability Discovery
Learn Fuzzing and the process of building a successful fuzzer to automate vulnerability discovery and discount 0-days
From Black Hat To Dubai - 6 Days Of Ultimate Hacker Training
When you attend the Hackers Academy Boot Camp, you'll be given access to your own training environment allowing for maximum hax0ry and experimentation.
In especially designed education labs, you will attack a fully-fledged infrastructure for the ultimate experience in hands-on hacker training.
Our full-immersion boot camp is designed to fast-track your learning and provide even the complete beginners with expert knowledge and skills.
Even if you are completely new to hacking, these course will provide you with practical training to prepare you for real world scenarios
Jump start your penetration testing or cyber security career with our immersive 6-Day Boot Camp led by world class trainers from SensePost and Zero Day Initiative.
Hands-on Hacking Fundamentals
Want to understand the basic concepts of hacking? If so, then the Hands-on Hacking Fundamentals course is for you!
The course will teach you why vulnerabilities exist, how you can find them and how you can exploit them. This beginner's course is designed to provide you with a solid foundation of knowledge to easily build on.
Attention will be focused on approaching vulnerabilities with the hacker mindset - making this an excellent course for anyone interested in a career in cyber security.
In this dynamic course you will learn:
How the internet is constructed and fundamentals of information security
Common network architectures and web applications
How to assess web applications, infrastructure and wireless networks for the most common vulnerabilities
You will work with Windows and Linux command line and receive a solid introduction to Kali Linux.
Who Should Attend
Attend this course if you are interested in the field of penetration testing or if you have a professional position that requires you to understand what hackers do. This course provides ideal training for SOC engineers, network engineers, security analysts and GRC professionals.
This course is taught by SensePost
Without question, the best way to stop criminal hackers is to understand how they operate. In this hand-on course, you will learn the exact methods attackers are using to breach networks and gain access to business-critical information.
Training will take place in SensePost's fully functional lab where you will learn how to approach and execute internal and external network penetration tests. You will need to channel your inner hacker to map out your target, find vulnerability and exploit existing trust relationships.
This is a solid two-day, network level course with maximum hand-on training and minimal theory. Topics covered in this course include:
How to discover and exploit vulnerabilities
How attackers target Windows, Linux, Databases and App Servers
How attackers bypass security restrictions and move laterally
Methods used for post exploitation
Methods used for attacking active directory
How to get to the crown jewels: Exfiltraing Data
Who Should Attend
This course is perfect for system administrator, network engineers, security analysts and penetration testers. You'll gain deep insight into techniques used by criminal hackers and learn advanced offensive techniques to thwart cyber-attack on your network or up your offensive skills.
This course is taught by SensePost
Practical Vulnerability Discovery With Fuzzing
The ability to find vulnerabilities in software, operating systems and network is critical to maintaining security. This course is designed to introduce you to the concept of vulnerability discovery through fuzzing; a testing technique used to discover coding errors and security bugs.
You will learn how to identify common patterns that produce vulnerable conditions and how to respond. You will also learn how to determine the exploitability of crashing conditions.
The course will explore public fuzzing and teach you the process of building a successful fuzzer. Your training will be reinforced by real world case studies that demonstrate typical concepts.
Some of the topics covered are:
Mutational and grammar-based input generation
Target monitoring using custom developed test harness
Best practices in analyzing software exceptions
Tips and guidance on how to discover 0-day vulnerabilities
Who Should Attend
You should attend this course if you want to understand how to use fuzzing to automate the discover of vulnerabilities or if you are interested in finding zero-day vulnerabilities. It is the perfect course for security researches, bug bounty hunters and advanced penetration testers.
This course is taught by Brian Gorenc and Abdul-aziz Hariri
Download the full Boot Camp training syllabus
From Black Hat to Dubai
Hackers Academy is proudly partnering with the experts from SensePost and Zero Day Initiative who will lead the boot camp instructional program.
The trainers at SensePost have been providing exceptional training at Black Hat since 2001. They are trusted for their practical approach to teaching the art of network and application exploitation.
During our 6-day Boot Camp, SensePost instructors will lead hands-on courses and draw on their experience to illustrate real world scenarios. They will be available to answer questions and share their extensive knowledge.
Senior Manager of Vulnerability Research, Trend Micro
As the senior manager of Vulnerability Research with Trend Micro, Brian Gorenc leads the Zero Day Initiative (ZDI) program, which is the world’s largest vendor-agnostic bug bounty program, and works to expose and remediate weaknesses in the world's most popular software.
Since 2012, Gorenc has been working with ZDI to discover new vulnerabilities, analyze attack techniques, and identify vulnerability trends.
In his senior role, Gorenc is focused on analyzing and performing root cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.
Under his leadership, the Zero Day Initiative program has coordinated the disclosure of over 2,000 zero-day vulnerabilities.
His work has led to the discovery and remediation of numerous critical vulnerabilities in Microsoft, Adobe, Oracle, open-source, SCADA systems, and embedded devices.
He has presented at numerous security conferences including Black Hat, DEF CON, Breakpoint, Ruxcon, PacSec, REcon and RSA.
Led the team that was awarded the Microsoft Mitigation Bypass Bounty and Blue Hat Bonus for Defense Bounty, resulting in $125,000 donation to STEM program
Abdul-Aziz Hariri Security researcher, Zero Day Initiative
As a Security Researcher with the Zero Day Initiative (ZDI), Abdul-Aziz Hariri reviews hundreds of vulnerabilities submitted to the ZDI Program. In this role, he focuses his talents on root-cause analysis, fuzzing, and exploit development.
Prior to joining ZDI, Hariri was an independent security researcher and threat analyst working with the Morgan Stanley emergency response team.
2015 Microsoft Bounty Program.
Part of the research team that submitted "Breaking Silent Mitigations - Gaining code execution on Isolated Heap and MemoryProtection hardened Internet Explorer" to the Microsoft Bounty Program. The submission netted the program’s highest payout to date. Proceeds went to many STEM organizations.
2012 Wired Magazine: Profiled in the article, Portrait of a Full-Time Bug Hunter.
Hacking Fundamentals 27-28 Jan
Infrastructure Hacking 29-30 Jan
Vuln Discovery With Fuzzing 31 Jan - 1 Feb
Address Hotel Dubai Mall
Preferred Vendor *
Mobile Number *
What is your biggest challenge in info sec? *
For pricing information please submit the form on the left. You will receive the full syllabus shortly after.
Student in the GCC? Click Here
Certificate of completion
Select the type of content for your learning unit.