Cyber Security Services & Training

As cyber security threats continue to evolve, so must your approach to the identification, assessment and mitigation of risk.

Our unparalleled suite of technical security services and training enable organisations to be resilient, adapt to change, provide peace of mind and stay secure.

We’re in security to prevent insecurity.

Technical Services

Whether your requirements involve internal network, perimeter, application, password or human element testing, we’ve got you covered.

Penetration Testing

Find out more

Our penetration testing service involves intensive manual testing to assess the security posture of your infrastructure, networks and applications.

Vulnerability Assessment

Find out more

We’ll identify the potential attack surface of your internal & external assets so you can see which areas of your organisation are most at risk.

Build Review

Find out more

We’ll assess your server, workstation and device builds, identifying flaws that could allow for elevated privileges or host compromise.

Red Team

Find out more

Red team engagements allow your organisation to benchmark your current security posture against a determined threat model.

Password Audit

Find out more

Our password audits test the resiliency of your passwords against attack, identifying the accounts most at risk of compromise.

Phishing Assessment

Find out more

We’ll identify your levels of perimeter security and awareness, helping you reduce the chances of opening the door for an attacker.

Hacking Training

Our popular Hacking Enterprises training is taught internationally at global security conferences including Black Hat. Deeply immersive and hands-on, it will arm you with the knowledge and skills to progress.

Make sure your passwords are resilient to attack

ITWorld Canada covers our co-founder Will Hunt’s talk at SecTor – Security Education Conference in Toronto, providing some secure password guidance for a non-technical audience.

Using ELK to detect out of band DNS exfiltration

DNS is a necessity and its traffic is nearly always allowed out of networks. Would you know if your data was being stolen using DNS instead of traditional channels?

See how you can stay one step ahead and visualise some indicators of compromise using ELK.

Events

Don’t miss our upcoming events, training, talks and workshops.

Training

22/09/20 – 23/09/20

Hacking Enterprises – 2020 Release

  • Duration: 2 Days
  • Location: Virtual
  • Provider / Conference: Wild West Hackin’ Fest
Find out more

Training

29/09/20 – 30/09/20

Hacking Enterprises – 2020 Release

  • Duration: 2 days
  • Location: Virtual
  • Provider / Conference: Black Hat Asia
Find out more

Training

14/10/20 – 16/10/20

Hacking Enterprises Bootcamp

  • Duration: 3 days
  • Location: Virtual
  • Provider / Conference: QA
Find out more