Our instructors

Cyber Helmets’ instructors are leading experts in the cybersecurity field, boasting extensive experience across all industries as red team leaders, CISOs, technical directors, and research fellows. We take great pride in partnering with these outstanding professionals.

Carlos Polop

Carlos Polop has a degree in Telecommunications Engineering with a Master in Cybersecurity. He has worked mainly as Penetration Tester and Red Teamer for several companies and has several relevant certifications in the field of cybersecurity such as OSCP, OSWE, CRTP, eMAPT, eWPTXv2, OSMR, ARTE, GRTE, AzRTE. He was captain of the Spanish team in the ECSC2021, member of Team Europe for the ICSC2022 and trainer of Team Europe for the ICSC2024. He has also spoken at several international conferences such as DEFCON31 and several ROOTEDCONs. Since he started learning cybersecurity he has tried to share his knowledge with the Infosec community by publishing open source tools such as PEASS and writing a free hacking book that anyone can consult at HackTricks and HackTricks Cloud

Ignacio Dominguez

Ignacio Dominguez is a Madrid based Cloud Security Engineer. Currently working at Circle as a Cloud Security Expert and with DevSecOps experience in several startups. Ignacio loves developing CTF challenges for competitions such as NahamCon, HacktivityCon and other mayor events. Passionate about hacking CI/CD systems and Cloud Native environments. He co-founded HackTricks Training offering quality Cloud Security certifications like AWS Red Team Expert, GCP Red Team Expert and Azure Red Team Expert.

Jaime Polop

Jaime Polop began his academic journey with a degree in Telecommunications Engineering from the Universidad Politécnica de Madrid, and later deepened his expertise by earning a master’s degree in cybersecurity from KU Leuven. His strong foundation in these disciplines paved the way for his role as a Cloud Specialist at Hacktricks Training. In addition, Jaime has distinguished himself by obtaining the prestigious ARTE, GRTE and AzRTE cloud certifications, underscoring his commitment to excellence and innovation in the evolving landscape of cloud computing and cybersecurity.

Grant Douglas

Grant Douglas is a seasoned mobile security consultant with over a decade of specialization. He has conducted hundreds of mobile security projects, including penetration testing, code review, and threat modeling. Grant has also authored multiple mobile security training courses during the last decade, sharing experience with hundreds of security professionals and engineers worldwide, both in person and virtually. With extensive experience in using and contributing to mobile security tools such as Frida and Radare2, Grant has authored numerous features for these tools and collaborated professionally with their creators in previous roles.

Alex Soler

Alex Soler is a mobile security research engineer lead at NowSecure. He has spent over 10 years conducting security assessments, including penetration testing and evaluations of web and mobile applications. with a global background in mobile technology, he specialises in iOS environments. He is a regular speaker at national and international conferences and collaborates with a cybersecurity master’s program as a mobile security trainer. In addition to his professional roles, Alex actively mentors aspiring security professionals and contributes to open-source security projects. His work focuses on bridging the gap between advanced research and practical implementation, making him a key figure in the mobile security community, being also an active contributor to radare2 and Frida, serving as a passionate advocate for r2frida through his workshops and training.

Aris Anastou

Aris Anastou is a seasoned cybersecurity professional specialising in penetration testing, vulnerability assessment, and security consulting. Over the years, he has collaborated and worked with organizations across various industries to identify and remediate security risks effectively. In addition to his technical expertise, Aris is skilled in designing and delivering cybersecurity training programs. He has trained teams and individuals, equipping them with the knowledge and skills needed to tackle complex security challenges and strengthen their overall cybersecurity posture.

Ilias Dimopoulos

Ilias Dimopoulos is a professional focus in cyber security that dedicated more than six significant years to esteemed organizations like Neurosoft (2018-2022) and Adacom (2016-2018), where he held key roles and contributed to pivotal cybersecurity initiatives. His commitment to excellence is underscored by respected certifications from Offensive Security, including the Offensive Security Certified Professional (OSCP), Offensive Security Web Expert (OSWE), and Offensive Security Wireless Professional (OSWP). These not only vouch for his theoretical knowledge but also his hands-on capabilities in real-world scenarios. His aptitude in identifying and rectifying critical vulnerabilities is further exemplified by his association with significant publications like CVE-2019-1322 and CVE-2020-1082, both Microsoft Windows Elevation of Privileges, and CVE-2018-18368 which impacts Symantec Endpoint Protection Manager (SEPM).

Thomas Ailianos

Thomas Ailianos brings over 12 years of expertise, effectively spearheading Security Operations Centers worldwide, proficient in SOC engineering, detection engineering, and automation. His participation in Incident Response activities has honed his ability to navigate complex security incidents with precision. Possessing hands-on proficiency in SIEM tools, EDR, and a myriad of defensive mechanisms, Thomas is adept at fortifying organizational defenses against evolving threats.

Thomas Toumpoulis

Thomas Toumpoulis is a distinguished Information Security Consultant and Penetration Tester, known for his deep expertise in cybersecurity, particularly in web application penetration testing. His background in web development has been a cornerstone of his success in the field. Thomas holds esteemed certifications like OSCP and OSWE, underscoring his prowess in various cybersecurity domains. His notable involvement in Greece’s cybersecurity community is highlighted by his contributions to the European Cyber Security Challenge. His skills extend to software development and security engineering, making him a versatile and knowledgeable professional.

Course led by:

Grant Douglas

Director, Security Consulting

Grant Douglas is a seasoned mobile security consultant with over a decade of specialization. He has conducted hundreds of mobile security projects, including penetration testing, code review, and threat modeling. Grant has also authored multiple mobile security training courses during the last decade, sharing experience with hundreds of security professionals and engineers worldwide, both in person and virtually. With extensive experience in using and contributing to mobile security tools such as Frida and Radare2, Grant has authored numerous features for these tools and collaborated professionally with their creators in previous roles.

Syllabus:

Intro to GCP

  • GCP Hierarchy
  • Google Workspace
  • gcloud config
  • Basic Hacking Techniques

Exploitation of GCP Services

  • IAM
  • KMS
  • Secrets 
  • Storage
  • Compute Instances & VPC
  • Cloud Functions
  • CloudSQL
  • Pub/Sub
  • App Engine
  • Google APIs
  • Cloud Shell

Methodologies

  • White box

Security Services

  • GCP Logging & Monitoring

Syllabus:

Intro to AWS

  • AWS Organization
  • AWS Principals
  • Basic Hacking Techniques

Exploitation of AWS Services

  • IAM
  • STS
  • KMS
  • Secrets Manager
  • S3
  • EC2 & VPC
  • Lambda
  • RDS
  • SQS
  • SNS

Methologies

  • White box

Common Detection Mechanisms

  • CloudTrail

Syllabus:

Azure Basics

  • Azure Organization
  • Entra ID
  • Azure Tokens & APIs
  • Basic Enumeration Tools

 

Exploitation of Azure Services

  • Entra ID IAM
  • Azure IAM
  • Azure Applications
  • Azure Key Vault
  • Azure Virtual Machine & Networking
  • Storage Accounts
  • Azure File Share
  • Azure Table Storage
  • Azure SQL Database
  • Azure MySQL & PostgreSQL
  • Azure CosmosDB
  • Azure App Service
  • Basic Azure Research Technique
  • Azure Function Apps
  • Static Web Apps
  • Azure Container Registry
  • Azure Container
  • Instances, Apps & Jobs
  • Azure Queue
  • Azure Service Bus
  • Azure Automation Account
  • Azure Logic Apps
  • Azure Cloud Shell
  • Azure Virtual Desktop

 

Methologies

  • White box
  • Black box
  • Pivoting between Entra ID & AD

 

Common Detection Mechanisms

  • Azure & Entra ID Logging & Monitoring
  • Microsoft Sentinel
  • Microsoft Defender for Cloud & Microsoft Defender EASM

Fundamentals and Setup

  1. Overview of Android’s architecture and ecosystem dynamics.
  2. Exploration of security features native to Android using Java, Kotlin, C++, and Rust.
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on Android.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including certificate validation and pinning.
  • Cryptography in Android apps
    a) Utilization of Android’s Crypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of biometrics.
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
  • Android IPC
    a) Detailed exploration of Intents, deep links, Binders/services, and broadcast receivers.
  • Webviews
    a) Identifying and resolving common security issues in Android Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an Android app.
    b) Identifying known vulnerabilities within these components.
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including App Transport Security issues & certificate pinning.
  • Cryptography in IOS apps
    a) Utilization of iOS’s CryptoKit & CommonCrypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys and leveraging the secure enclave.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of Local Authentication (biometrics).
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
    d) Using Device Check and App Attest
  • iOS IPC
    a) Detailed exploration of URL schemes, deep (universal) links, and extensions.
  • Webviews
    a) Identifying and resolving common security issues in iOS Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an iOS app.
    b) Identifying known vulnerabilities within these components.
  • Implementing App Integrity
    a) What to look for
    b) How to implement
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Fundamentals & Setup

  1. Overview of iOS’s architecture and ecosystem dynamics.
  2. Exploration of security features native to to iOS using Objective-C, Swift, and C(++).
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in iOS code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on iOS.