Defensive Cloud Native App and DevSecOps

Defensive Cloud Native App and DevSecOps

I deliver this workshop through SecDim. You can find more information about this workshop and how to enroll at SecDim Workshop. Level: Beginner to Advanced Duration: 2-5 days Delivery: In-person or Online For: Software engineer, Security champion, Security engineer, AppSec & DevOps engineer, Code auditor, Penetration tester, Bug hunter Overview Numerous critical vulnerabilities in cloud-native apps arise from logical flaws, incorrect assumptions about dependent technologies, and insecure patching. These flaws lack known syntax or patterns detectable by security testing or scanning tools (SAST, DAST, etc.). This complexity makes building secure apps more challenging than ever. ...

July 15, 2025 · Pedram Hayati
Cyber Crime and Security Enhanced Programming

Cyber Crime and Security Enhanced Programming

I rebuilt and lectured this course through Curtin University. You can find more information about this course and how to enroll at Curtin University Handbook. Level: Undergraduate Location: Perth, Australia Delivery: Online Duration: 12 weeks Overview This course provides a comprehensive exploration of cybercrime and security-enhanced programming techniques. Students will gain a deep understanding of the evolving landscape of cybersecurity threats and the strategies required to mitigate them. The unit begins with an introduction to the foundational concepts of cybersecurity, including threat identification and risk assessment. Students will then delve into the anatomy of cyberattacks, learning how to recognize and respond to organized attacks, viruses, and malware. ...

July 15, 2020 · Pedram Hayati
Reverse Engineering Malware

Reverse Engineering Malware

I lecture this course through UNSW Canberra at ADFA. You can find more information about the course and how to enroll at UNSW Course Outline Finder. Level: Postgraduate Delivery: Online Location: Canberra, Australia Duration: 12 weeks Overview This course is designed to equip students with the foundational skills and knowledge required to analyze and understand malicious software. By delving into the intricacies of reverse engineering, students will gain insights into the methodologies and tools used by cybersecurity professionals to dissect malware and uncover its functionality. The curriculum emphasizes both theoretical concepts and hands-on practice, ensuring that participants develop a comprehensive understanding of the subject matter. ...

February 15, 2020 · Pedram Hayati
Introduction to Exploit Development

Introduction to Exploit Development

I lecture this course through UNSW Canberra at ADFA. You can find more information about the course and how to enroll at UNSW Course Outline Finder. Level: Postgraduate Delivery: Online Location: Canberra, Australia Duration: 12 weeks Overview This course is meticulously crafted to equip technically proficient IT professionals with a comprehensive and accelerated introduction to exploit development in today’s dynamic technological landscape. Beginning with a foundational theoretical overview of CPU architecture and the essential principles of exploit development, the curriculum swiftly transitions into hands-on practical exercises designed to solidify key learning objectives. By the conclusion of the course, participants will possess the skills to devise sophisticated exploitation strategies and gain a deep understanding of the theoretical frameworks that underpin the intricate art and science of modern exploit development. This theoretical knowledge will be further reinforced through additional practical exercises and assessments aimed at consolidating the learning experience. ...

July 15, 2018 · Pedram Hayati