Security Courses

designed to last

Deep Learning by design

State-of-the-art learning techniques help ensure students understand and retain more knowledge than any other course—and retain the knowledge long after classes end.

Unique learning aids

Use unique Azeria Labs tools to quickly learn and retain complex security concepts. If you want to try out our online assembler AZM, visit azm.azerialabs.com.

Target real devices

Reverse-engineer and exploit real-world devices and hardened programs like those you'll see outside of the classroom. The specific type of target devices used depend on the course (IoT or mobile exploitation).

Zero-hassle labs

Lose no time on complicated installations, managing dependencies, or troubleshooting configuration problems on software before class or on the first day—all exploitation development tools and targets come pre-configured and ready-to-use on a purpose-built Azeria Labs virtual machine.

Companion workbooks

Comprehensive 90+ page training workbooks take students step-by-step through every concept taught in class to reinforce learning and ensure no step is missed.

Public Training


in partnership with industry-leading conferences

Infiltrate® MiamiSold out

April 29 - May 1, 2019

Black Hat® USASold out

August 5 - 6, 2019

Black Hat® Tokyo

October 24 - 25, 2019
INFILTRATE® is a deeply technical conference that focuses entirely on offensive security issues. Groundbreaking researchers demonstrate techniques that you cannot find elsewhere. Learn computer and network exploitation, vulnerability discovery, and rootkit & trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of hard-core thought-provoking technical meat.
Our fast-paced 3-day course for students to go from zero to advanced ARM exploit development. Based around two emulated real-world IoT targets, the labs teach students the process of building and debugging an exploit from an initial memory-corruption crash, bypassing exploit mitigations such as NX and ASLR, and creating reliable ROP chains via mprotect(). The last day of this course introduces information leaks and heap-based exploitation.
Black Hat USA logo
Now in its 22nd year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2019 opens with four days of technical Trainings (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.
Our condensed 2-day course for students to go from zero to a complex and stealthy mprotect() ROP chain exploit on ARM. Targeting two emulated real-world IoT targets, the labs teach students the process of building and debugging an exploit from an initial memory-corruption crash on real-world devices, bypassing exploit mitigations such as NX and ASLR along the way. Students will build a reliable ROP chain that marks the stack executable and enables them to take full control of the process directly.
Black Hat Asia logo
Black Hat returns to Tokyo, Japan for the first time since 2008 for a two-day 'Trainings Only' event, to be held on October 24-25, 2019 at the Solasta Shibuya Conference Center. Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available anywhere. From infrastructure hacking to incident response, there's a course for hackers and security pros of all experience levels.
Our condensed 2-day course for students to go from zero to a complex and stealthy mprotect() ROP chain exploit on ARM. Targeting two emulated real-world IoT targets, the labs teach students the process of building and debugging an exploit from an initial memory-corruption crash on real-world devices, bypassing exploit mitigations such as NX and ASLR along the way. Students will build a reliable ROP chain that marks the stack executable and enables them to take full control of the process directly.



Enhance your skills while attending a conference with Azeria Labs intensive short workshops

The Kaspersky Security Analyst Summit (SAS) is an annual event that attracts high-caliber anti-malware researchers, global law enforcement agencies and CERTs and senior executives from financial services, technology, healthcare, academia and government agencies.

The conference provides an exclusive atmosphere that encourages debate, information sharing and display of cutting-edge research, new technologies, and ways to improve collaboration in the fight against cyber-crime.
Hack In The Box Security Conference is an annual must-attend event in the calendars of security researchers and professionals around the world. HITBSecConf is a platform for the discussion and dissemination of next-generation computer-security issues. HITBSecConf events feature two days of trainings and a two-day multi-track conference featuring cutting-edge hardcore technical talks delivered by some of the most respected names in the computer security industry. HITBSecConf is a place where ideas are exchanged, talent discovered and genius celebrated.
Blackhoodie is a free reverse-engineering bootcamp for women, creating an environment to learn dive into technical topics like reverse engineering and exploitation and network with other likeminded women in InfoSec. Blackhoodie is being offered multiple times per year at changing locations in the US as well as Europe.
Arm TechCon is the only comprehensive event that showcases the latest advances in Arm's world class technology including silicon design and software development to security, IoT solutions and artificial intelligence.
In three action-packed hours, workshop attendees will learn how hackers break into Arm-based IoT devices using memory-corruption vulnerabilities such as buffer overflows, how to defend against these types of attacks using "exploit mitigations", and what the limits of these mitigations are. During the labs, attendees will get to play as the hacker, writing their own exploits against vulnerable software, and learn how to use compiler and OS-based exploit mitigations to improve the security of their own programs.
View a list of archived trainings, workshops, and public talks

Kaspersky SAS SingaporeFull

April 8 - 11, 2019

HITBSecConf AmsterdamFull

May 6 - 10 2019

BlackHoodie AmsterdamFull

May 6 - 10 2019

ArmTechCon 2019

October 8 - 10, 2019

View archived workshops


Training Courses

Bespoke multi-day advanced courses for corporate clients. Minimum 10 participants.

Internet of Things

Exploit Development

Learn IoT-security and memory-corruption basics by hacking IoT devices running on Arm®'s 32-bit processors.

Based around two real-world IoT targets that we will emulate, this course gets students to learn the process of building and debugging a memory-corruption exploit from scratch, bypassing exploit mitigations such as NX and ASLR along the way.

Our course begins with an introduction into the Arm architecture and assembly language, and how to build shellcode that can be used in exploits against Arm targets. Students then learn about the theory and practice of attacking memory-corruption exploits by finding and exploiting a stack-overflow vulnerability. Students then learn about exploit mitigations, what they are, and how to bypass them, and how to take over the process using both ret2libc, as well as complex ROP-chains to run in-memory only shellcode directly in the target process.

The second day of the course focuses on exploiting two real-world routers, including the process of how to emulate, debug and trigger vulnerabilities on real-world devices, and how to adapt exploits from one target to work on a different target, even when the devices use identical library versions.

The third day of the course provides a deeper study of exploit categories and techniques to make exploits reliable. Students will cover vulnerability discovery and use of “information leaks” to stabilize memory-corruption exploits, and learn about the ASLR and stack canary exploit mitigations, and how to exploit format-string vulnerabilities to bypass these mitigations.

For four-day courses, the final day is a deep-dive into the process of heap exploitation, and using heap vulnerabilities to construct exploitation primitives that can be engineered together to build powerful and reliable exploits, bypassing NX, ASLR and GCC’s in-built exploit mitigations. We begin with a review of how the glibc heap works, and begin writing an exploit against a network service containing a heap linear buffer overflow. Students will learn how to turn this buffer overflow into a reliable relative read exploit primitive to bypass ASLR, how to construct arbitrary read primitives to search target memory for useful binaries, and how to exploit and construct malicious vtables to fully take control of the target device.

  • Go from zero-to-hero, building complex memory-corruption exploits in just 4 days
  • Build your own shellcode for Arm® 32-bit
  • Debug real world processes and write exploits for real-world IoT devices
  • Bypass exploit mitigations like ASLR, NX, Stack Canary, and so on
  • Learn about infoleaks and how to use them to bypass exploit mitigations
  • Reliably exploit the glibc heap and learn how to groom the heap
  • Use heap-overflows to build and use exploit primitives

Reverse Engineering

on 32-bit and 64-bit Arm

Learn to analyze compiled applications

  • Disassemble and debug real-world applications
  • Perform vulnerability discovery and learn about different vulnerability classes
  • Understand control flow of real-world applications
  • Learn to use disassembly tools like Ghidra, radare2, Frida, and GDB

Packed with practical labs and hands-on examples, the Azeria Labs Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.

Our reverse-engineering courses are based around a series of reverse-engineering labs, including pure reverse-engineering of compiled binaries through to offensive-security-focused vulnerability discovery and vulnerability class hunting.

Our reverse-engineering courses are available only as private trainings. For more details, get in touch.


Intro into Exploit Development

Get started on Android security and Arm 64-bit exploit development

This 3-day fast course is optimized for students just starting out in exploit-development or security engineering for Android on ARM.

Our course begins with a detailed introduction into the Arm 64-bit processor and assembly language, with labs covering more advanced shellcoding techniques targeted specifically at Android. Students will deploy their own shellcode as part of an attack against the Android device, and learn how to debug and develop complex functionality for use in their own exploits.

The second day of our course covers Android in more detail, looking at the Android security model, filesystem and permission model, and how to do invasive security auditing of Android user-mode applications, including labs on how to intercept encrypted network traffic and hook vulnerable functions in managed applications to look for exploitable vulnerabilities in the app.

Our final day covers theory and practice of patch-analysis and reverse-engineering. Students will use the Ghidra tool to reverse-engineer a patch for an Android 64-bit native application and use it to identify the security vulnerability that the patch fixes. We will learn how to identify similar vulnerabilities in binary analysis, and use a debugger to instrument and test the unpatched binary to trigger the bug.

Finally, students will develop a fully working exploit against the unpatched application, taking control of the target process via a complex mprotect ROP-chain to cause the process to run the shellcode written by the students on day 1.

This is the prerequisite course of our Advanced Android Exploit Development course where students learn now to turn multiple N-days into exploits, build and chain a kernel exploit to escalate privileges and more.

  • Develop and debug exploits on real Android devices
  • Construct your own Arm 64-bit shellcode
  • Turn multiple N-days into exploits
  • Write and chain multiple exploits together
  • Exploit a heap vulnerability to get on the device
  • Build and chain a kernel exploit to elevate privileges
  • and more!

Want to learn more about private trainings?

Azeria Labs Private Trainings are available to corporate clients with minimum class sizes of 10 people. For detailed course outlines and price quotes, email contact [at] azeria-labs.com from your company email account. Please note that private trainings are in high demand and must therefore be booked well in advance.