Trainings



Cryptocurrency Investigations and Analysis

Cryptocurrency has become the financial bloodstream of modern eCrime. Ransomware, extortion, harvested credentials, fraud, sanctions evasion, and large-scale theft all converge on the blockchain. This course pulls back the curtain and shows how illicit crypto activity can be traced, dissected, and exposed with precision.

Trainer: Scott Jarkoff

Scott Jarkoff is the Co-Founder of Praeryx, a new startup currently developing some insanely deep services and technology. Prior to that Scott Jarkoff was the Director, Intelligence Strategy, APJ & META, at CrowdStrike, where he directed the Asia-Pacific & Japan, and Middle East threat intelligence business. He advised and guided customers on operationalizing and integrating threat intelligence within a holistic intelligence-led security strategy.

Scott's creative genius does not stop at cyber security. He is also the visionary Co-Founder and mastermind behind deviantART, the largest and most vibrant online art community in the world. Under his guidance, deviantART blossomed into a bustling hub where millions of artists and art enthusiasts connect, share, and thrive in a kaleidoscope of creativity. Scott's profound impact on the art world through deviantART mirrors his innovative spirit in tech, making him a true renaissance man in both realms.


Breaching the Black Box: Applied Strategies for LLM Red Teaming

As Large Language Models (LLMs) become integrated into critical business applications, from automated customer support to autonomous agents, the attack surface for organizations is shifting. Traditional network security is no longer enough; security professionals must now understand how to manipulate the probabilistic nature of AI.

Trainer: Azrul Zulkifli

Azrul has over a decade of professional experience in ethical hacking, specializing in red teaming and penetration testing. He has led and delivered offensive security engagements across sectors including law enforcement, aerospace, manufacturing, telecommunications, utilities, and financial services. His red team expertise focuses on researching and applying advanced adversary Tactics, Techniques, and Procedures (TTPs) to compromise corporate environments, ranging from custom malware development to evading detection mechanisms. His current research explores emerging threats in modern AI systems, where he studies how these technologies can be manipulated, abused, and exploited. He is also an OffSec Ambassador, actively promoting offensive security education and contributing to the growth of the local cybersecurity community. Azrul holds several industry-recognized certifications, including OSCP, OSEP, OSWP, CRTO, and GIAC GRTP.


Drone Hacking: Cracking the Black Box

In the era of widespread UAV adoption across the Asia-Pacific – where DJI commands over 70% market share in commercial drones – these devices are increasingly pivotal in criminal probes, accident investigations, and security incidents. From illegal surveillance to smuggling ops, drones hold critical telemetry data locked behind encryption and proprietary barriers.

Trainer: Captain

Captain, founder of LOONG Community, is an independent security researcher. He focuses on hardware & drone security researches, penetration test, incidents response & digital forensics analysis. He was the first and the only Asian leading a group of white-hat hackers to hold an in-depth, hands-on hardware hacking village in BLACK HAT and DEFCON. He is also a frequent speaker and trainer in different top-notch security and forensics conferences including SANS, HTCIA, DFRWS, GCC, CodeBlue, HITB, SINCON, AVTokyo and HITCON.