- Secure Code Review & Code Brabbing Techniques
- Enterprise Security, Risk Management & Report
- Tools & Web Apps Penetration Testing
- Hacking Attacks & Case Studies
- WAF, Firewall, Honeypots, UTM
- Introduction to Security Compliance
- Introduction to Mobile Apps Pentesting
- Defence for Vulnerabilities