Searching for vulnerabilities with fuzzing
Training in modern fuzzing-based methods, techniques and approaches for software vulnerability research
IoT Vulnerability Research and Exploitation
Training in IoT vulnerability research
Digital Forensics and Incident Response in ICS
Training in the proper response to cybersecurity incidents at industrial enterprises and in incident investigation techniques