Skip to content
// Training

Courses your team needs to not screw up

> Short, clear, and actionable training. No fluff, no BS, no wasting time_

Note: These courses are currently only available in Spanish. Contact us if you're interested in English versions.

Available

101 - Introduction to REST API Security

Your APIs are the gateway to your business. If they're poorly built, you don't need hackers - you'll break yourself. Learn to protect your APIs from day one.

REST APIs Security OWASP WAF
View details
Available

102 - API Security Checklist

Master the definitive security checklist for APIs: authentication, OAuth, JWT, DDoS, CI/CD and monitoring. Everything you need to audit and protect your APIs.

REST APIs Security OAuth JWT DDoS CI/CD
View details
Available

103 - OpenAPI Without Pain: The Guide I Wish I Had

Learn OpenAPI from zero to advanced level. Validations, components, inheritance and auto-generators. The definitive guide every developer needs.

OpenAPI Swagger REST APIs Documentation API Design
View details
Available

101 - First Steps in Protocol Design with Python and Scapy

Learn to capture, analyze and build network traffic with Python and Scapy. From basic sniffing to multi-threaded tools. The course that turns you into a network expert.

Python Scapy Networks Security Wireshark Hacking
View details
Available

Python Obfuscation and Analysis Evasion Techniques

Learn advanced Python code obfuscation techniques. From exec() to bytecode, including marshal and obfuscation tools. Protect your work or understand how others do it.

Python Obfuscation Security Bytecode Advanced
View details
Available

101 - Backups for Humans: How Not to Mess Up When Everything Explodes

Learn backup strategies that actually work. From the 3-2-1 rule to RTO/RPO, including deduplication and enterprise policies. The course that saves your neck.

Backups Recovery Infrastructure DevOps Disaster Recovery
View details
Available

Corporate Defense Protocol: Train Your Team to Detect and Block Scams

The most dangerous attackers don't use code to get into your systems: they use trust. A phone call, a convincing email, or a well-told story.

Social Engineering Security Scams Phishing Team Training
View details
// Custom training

Need something specific for your team?

We design custom training to solve your company's real problems. No fluff, no filler.

Talk to Mr. Wolf