OUR TRAINING

Tailored Courses

Command Five regularly runs training courses in Canberra, Sydney, and Perth. The courses can also be tailored to your needs and/or run in a location convenient for you.

We can arrange to run training on your premises for a more open learning environment in which proprietary or otherwise sensitive information can be discussed in confidence. Our instructors are willing to sign non-disclosure agreements where appropriate.

Please contact us to discuss your specific requirements.

IT Security Awareness Briefing

This short, effective briefing is designed to enhance an organisation's resilience to social engineering attacks. It does this by building the security awareness of all staff members through targeted real-world examples and a live hacking demonstration. This briefing is run on-demand and can be delivered at your premises (minimum numbers required).

 

Course Details/Book Now

 

Running time: 1 hour.

Introduction to Reverse Engineering

This course is designed for experienced Windows programmers with a working knowledge of the Windows API and the ability to write code in C using Microsoft Visual Studio. Expected outcomes include a solid understanding of the PE file structure and the ability to analyse simple binaries using both static and dynamic analytical techniques.

 

Course Details/Book Now

 

Running time: 3 days.

IT Security Fundamentals

This course is designed for those without a relevant background who want, or need, an understanding of the fundamentals of IT security but do not have the time to attend a multi-day training course. Typical attendees include managers of IT areas, analysts, lawyers, and journalists.

 

Course Details/Book Now

 

Running time: 1 day.

Intermediate Reverse Engineering

This course is designed for graduates of the Introduction to Reverse Engineering course. Expected outcomes include the ability to identify and overcome common anti-reverse engineering and binary obfuscation techniques including binary packers, self-modifying code, and anti-debugging mechanisms.

 

Course Details/Book Now

 

Running time: 3 days.

Introduction to Intrusion Analysis

This course is designed to build a solid foundation of knowledge for junior intrusion analysts. Expected outcomes include knowledge of common indicators of malicious activity, knowledge of different approaches, and familiarity with popular intrusion analysis tools.

 

Course Details/Book Now

 

Running time: 2 days.

Shadow Warrior Reverse Engineering

This course is available by invitation only to graduates of the Intermediate Reverse Engineering course. Students who complete this course receive a limited edition "Shadow Warrior RE" coin. Impress your friends. Scare your enemies.

 

Course Details/Book Now

 

Running time: 3 days.