Virtual Training at BOOTSTRAP25

March 9-15

BOOK NOW

Can't make it to Austin? BOOTSTRAP25's Virtual Trainings may be just the thing for you! You can study with our amazing trainers from the comfort of your own home!

Our trainings run from March 9-15, and are 16 or 32 hours long. Our trainings are fully interactive with teaching assistants ready to capture questions and queries from our discord, and streams available to watch again later.

Ringzer0’s Virtual Training Experience & FAQ
What can I expect from a virtual training delivered by Ringzer0, and answers to frequently asked questions.

Pricing

Our pricing model operates on an early-bird discount, with standard and late pricing.

Pricing Model 16 Hours
Virtual
32 Hours
Virtual
Early Bird
(Till Dec 2)
USD2100 USD4000
Standard
(Dec 3 - Jan 31)
USD2300 USD4200
Late
(Feb 1 - Mar 13)
USD2500 USD4400

BOOTSTRAP25's Virtual Training Courses

macOS 15 and iOS 18 Kernel Internals for Security Researchers
This course introduces you to the low level internals of the iOS and macOS kernels from the perspective of a security researcher interested in vulnerability analysis, kernel rootkit/malware analysis/detection or kernel exploit development.

INSTRUCTOR: Stefan Esser // 32 Hours // March 9-15

Reverse Engineering - Binary Program Analysis
Learn the fundamentals of reverse engineering from scratch with this incredible course taught by Tim Blazytko.

INSTRUCTOR: Tim Blazytko // 32 Hours // March 9-15

Everyday Ghidra: Practical Windows Reverse Engineering
A comprehensive guide to using Ghidra, covering fundamental operations to advanced techniques, with hands-on exercises on real-world Windows applications.

INSTRUCTOR: John McIntosh // 32 Hours // March 9-15

Windows Kernel Exploitation: Foundation and Advanced
Gain hands-on experience in a wide range of topics, including Windows and driver internals, various memory corruption types, exploit development techniques, mitigation bypass techniques, pool internals, and Feng-Shui and then test your skills in a CTF challenge!

INSTRUCTOR: Ashfaq Ansari // 32 Hours // March 9-15

Exploiting the Linux Kernel
This training guides through the field of Linux kernel exploitation. In a series of practical labs, the training explores the process of exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.

INSTRUCTOR: Andrey Konovalov // 32 Hours // March 9-15

Rust Reverse Engineering in Practice
This training equips you with essential skills in Rust reverse engineering. You’ll learn to analyze Rust binaries, understand the language’s compilation and runtime intricacies, utilize tools and plugins, and tackle advanced challenges such as obfuscation and malware analysis.

INSTRUCTOR: Patrick Ventuzelo and Tanguy Duhamel // 16 Hours // March 9-15

Machine Learning for Reverse Engineers
In this course, students will gain the necessary hands-on experience, knowledge, and confidence to conduct automated program analysis at scale using machine learning.

INSTRUCTOR: Hahna Latonick // 32 Hours // March 9-15

TEEPwn: Breaking TEE By Experience
Trusted Execution Environments (TEEs) are challenging to secure due to complex hardware and large trusted code bases. Vulnerabilities have been exploited via the less-secure Rich Execution Environment (REE). TEEPwn features a CTF experience to explore TEE vulnerabilities and exploits.

INSTRUCTOR: Cristofaro Mune // 32 Hours // March 9-15

The ARM64 Exploit Laboratory
An ideal introduction to vulnerability exploitation on 64-bit ARM Linux platform, spanning from ARM64 assembly all the way to ARM64 Return Oriented Programming (ROP). An ideal step up from the 32-bit ARM Exploit Laboratory.

INSTRUCTOR: Saumil Shah // 32 Hours // March 9-15

802.11x Unplugged: Modern Wi-Fi Hacking
If you want to really master Wi-Fi attacks, this highly practical, hands-on course will teach you what you need to know. Hosted in a “Wi-Fi in the cloud” environment, there’s no more fiddling with faulty hardware.

INSTRUCTOR: Jacques Coertze // 32 Hours // March 9-15

Pragmatic API Exploration
Embark on a learning journey to explore the art of attacking and securing Application Programming Interfaces (APIs) with our comprehensive API course. This practical-driven training equips you to penetration test API implementations and further understand how to mitigate vulnerabilities.

INSTRUCTOR: Aubrey Labuschagne // 16 Hours // March 9-15

Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated