Corporate Workshops
Tailored training for your organization. Hands-on workshops designed specifically for your team, your technology stack, and your business needs. 15 topics available.
Concepto
What Is a Custom Workshop?
A corporate workshop is an intensive training session designed specifically for your organization. Unlike generic training, each workshop is tailored to your technology stack, industry, and team level.
With a methodology that is 70% hands-on and 30% theory, participants work through real-world scenarios based on their professional environment. The result is knowledge that is directly applicable from the very next day.
Proceso
Design Process
5 phases to create a workshop perfectly tailored to your organization.
DISCOVERY
Meeting with stakeholders to understand needs, team skill level, technologies used, and workshop objectives.
CURRICULUM DESIGN
Development of a tailored syllabus: content selection, practical exercises, and use cases from your industry.
LAB PREPARATION
Configuration of lab environments that replicate your technology stack. Scenarios based on real-world threats.
DELIVERY
On-site or online session with a hands-on methodology. 70% practical, 30% contextualized theory. Groups of 8-15 people.
FOLLOW-UP
Reference materials, participant evaluation, results report, and recommendations for continued training.
Catálogo
15 Available Workshops
Each workshop is 100% customizable for your organization.
Seguridad Aplicada
Incident Response
8h / 2 days
Security incident response drill. Triage, containment, eradication, crisis communication, and lessons learned.
IT / SOC Teams
Secure Coding
16h / 4 days
Secure development: OWASP Top 10, input validation, session management, applied cryptography. In your programming language.
Developers
Cloud Security
8h / 2 days
Security in AWS, Azure, or GCP: IAM, secure configuration, misconfiguration detection, cloud-native compliance.
Cloud / DevOps
Security Architecture
16h / 4 days
Designing secure architectures: defense in depth, zero trust, microsegmentation, reference architecture.
Architects / Seniors
Threat Modeling
8h / 2 days
Threat modeling with STRIDE, PASTA, and Attack Trees. Risk identification during the application design phase.
Development / Security
Operaciones y Defensa
Security Operations
16h / 4 days
Security operations: monitoring, threat detection, log analysis, alert management, SOC procedures.
SOC / IT Teams
GDPR & Data Protection
4h / 1 day
Data protection regulation: data subject rights, impact assessments, records of processing activities, security breaches.
Legal / DPO / HR
Active Directory Security
16h / 4 days
AD hardening: Kerberos, GPOs, tier model, attack detection (Kerberoasting, Pass-the-Hash, DCSync).
Administrators / Blue Team
Containers & Kubernetes
8h / 2 days
Container security: Docker hardening, Kubernetes security, supply chain, network policies, runtime protection.
DevOps / SRE
Especialización
Audit Preparation
8h / 2 days
Preparation for ISO 27001, ENS, SOC 2, PCI DSS audits. Documentation, evidence gathering, and audit simulation.
GRC / Compliance
Security Champions
8h + program
Security Champions program: training security ambassadors within development teams.
Development / Leads
API Security
8h / 2 days
API security: OWASP API Top 10, authentication, authorization, rate limiting, API gateway security.
Backend / Architects
Network Security
16h / 4 days
Network security: segmentation, firewalls, IDS/IPS, VPN, Wi-Fi security, network forensics.
Network / IT
Social Engineering
4h / 1 day
Advanced social engineering awareness: pretexting, vishing, tailgating, USB drops, deepfakes.
Entire organization
DevSecOps
16h / 4 days
Security integration in CI/CD: SAST, DAST, SCA, IaC scanning, secrets management, pipeline security.
DevOps / Development
Logística
Format & Logistics
Group Size: 8-15 people
Ideal size for interaction and hands-on exercises. Adaptable up to 25 with additional facilitators.
Duration: 4h to 4 days
From half-day sessions to intensive week-long programs. Adapted to the syllabus and depth required.
Flexible Scheduling
Full day, half days, or distributed sessions. We adapt to your team's availability.
Format: On-Site / Online
In-company, at our facilities, or 100% live online. Hybrid format also available.
Incluido
What's Included?
Reference Materials
Comprehensive documentation, cheat sheets, and customized quick reference guides.
Hands-On Lab
Lab environment configured with your technology stack. Access for 30 days post-workshop.
Certificate of Attendance
Individual certificate for each participant detailing training hours and syllabus covered.
Results Report
Team skill assessment, identified strengths, and recommended areas for improvement.
Session Recordings
Access to the workshop recording for 90 days for review and onboarding of new team members.
Post-Workshop Support
Dedicated Q&A channel with the instructor for 30 days following the workshop.
FAQ
Preguntas Frecuentes
Yes, 100%. During the Discovery phase, we identify your technology stack, tools, and current processes. Hands-on exercises are designed specifically for your infrastructure: if you use AWS, the labs are in AWS; if you code in Java, the Secure Coding workshop is in Java.
Between 8 and 15 participants for hands-on workshops. Smaller groups are possible but less cost-efficient. For larger groups (up to 25), we adapt the format with additional facilitators. For general awareness sessions, up to 50 people.
Yes. We offer on-site delivery (at your offices or at our facilities), live online, and hybrid formats. For hands-on workshops, we recommend on-site delivery when possible for better interaction and collaboration among participants.
Typically 2-3 weeks from the Discovery meeting to delivery. This includes: curriculum design (3-5 days), lab preparation (3-5 days), and client review (2-3 days). For standard workshops without customization, this can be reduced to 1 week.
Yes. We offer discounts for booking multiple workshops, annual training programs, and large groups. Contact us for a customized quote. We also offer special rates for startups and non-profit organizations.
Absolutely. In fact, we recommend it. A comprehensive program could include: Secure Coding for developers + Threat Modeling for architects + Incident Response for IT + Security Champions as an ongoing program. We design learning paths by team.
A laptop with an internet connection and a modern browser. The labs are cloud-based and require no local installation. For Secure Coding workshops, participants work in their own IDE with access to practice repositories that we provide.
Three levels of measurement: 1) Satisfaction survey (NPS) at the end. 2) Pre/post workshop knowledge test to measure improvement. 3) For ongoing programs, tracking of security metrics (code vulnerabilities, incident response time, etc.).
We issue a certificate of attendance and achievement detailing training hours and syllabus covered. These are not official industry certifications (OSCP, CEH, etc.), but they document the training received for compliance and audits (ISO 27001, ENS, etc.).
Yes. Recordings are available for 90 days for individual onboarding. For new on-site editions, we offer reduced repeat rates. We recommend annual refresher editions to keep knowledge up to date.
Explore more services
Ready to protect your business?
Request a free initial assessment and discover how we can strengthen your organization's security. No obligation.
Contact Now
