Technical Security Training
Technical Security Training
Role-based, hands-on training designed to improve real-world defensive and offensive capabilities—aligned to your environment, tools, and compliance needs.
Overview
Build practical security skills your team can apply immediately
We deliver technical security training for IT and security teams—from fundamentals to advanced tracks—using labs, realistic scenarios, and measurable learning outcomes.
Who it’s for
SOC analysts, incident responders, security engineers, system/network administrators, DevOps, developers, and technical leaders who need hands-on security capability.
Delivery options
- On-site instructor-led (Philippines nationwide): classroom-style delivery with guided labs.
- Live virtual instructor-led: interactive sessions with breakout labs and Q&A.
- Blended: self-paced pre-work + instructor-led labs and assessments.
- Workshop format: focused deep-dive on a specific toolset or scenario.
Sample modules / topics
- SOC analysis, alert triage, and investigation workflow
- Threat hunting fundamentals and hypothesis-driven hunting
- Detection engineering: log sources, use cases, tuning, and validation
- Incident response essentials + tabletop exercises
- Windows & Active Directory security: common attack paths and hardening
- Network security monitoring: visibility, segmentation, and practical defense
- Cloud security fundamentals (AWS/Azure/GCP): IAM, logging, and misconfiguration risks
- Web & API security for practitioners: common flaws and defensive patterns
- Secure DevOps & CI/CD security: secrets, pipeline risks, and guardrails
Outcomes
- Improved investigation quality and faster, more consistent triage
- Better detection coverage and reduced false positives through tuning discipline
- Clear incident response workflows and evidence handling aligned to governance needs
- More confident technical teams with repeatable, documented practices
Sample training tracks
Choose a focused track or combine modules into a tailored program.
SOC Foundations & Triage
Alert triage, investigation workflow, evidence handling, and reporting.
Threat Hunting & Detection Engineering
Hypothesis-driven hunting, log sources, detections, and tuning.
Incident Response (IR) Essentials
Containment, eradication, recovery, and post-incident improvement.
Windows & Active Directory Security
Hardening, common attack paths, and monitoring for abuse.
Network Security & Monitoring
Segmentation, visibility, and practical network defense techniques.
Cloud Security (AWS/Azure/GCP) Fundamentals
Identity, logging, misconfigurations, and baseline controls.
Web & API Security for Practitioners
Common flaws, testing mindset, and secure implementation patterns.
Secure DevOps & CI/CD Security
Pipeline risks, secrets management, and practical guardrails.