Workshops

Corporate Workshops

Tailored training for your organization. Hands-on workshops designed specifically for your team, your technology stack, and your business needs. 15 topics available.

Concepto

What Is a Custom Workshop?

A corporate workshop is an intensive training session designed specifically for your organization. Unlike generic training, each workshop is tailored to your technology stack, industry, and team level.

With a methodology that is 70% hands-on and 30% theory, participants work through real-world scenarios based on their professional environment. The result is knowledge that is directly applicable from the very next day.

Proceso

Design Process

5 phases to create a workshop perfectly tailored to your organization.

01

DISCOVERY

Meeting with stakeholders to understand needs, team skill level, technologies used, and workshop objectives.

02

CURRICULUM DESIGN

Development of a tailored syllabus: content selection, practical exercises, and use cases from your industry.

03

LAB PREPARATION

Configuration of lab environments that replicate your technology stack. Scenarios based on real-world threats.

04

DELIVERY

On-site or online session with a hands-on methodology. 70% practical, 30% contextualized theory. Groups of 8-15 people.

05

FOLLOW-UP

Reference materials, participant evaluation, results report, and recommendations for continued training.

Catálogo

15 Available Workshops

Each workshop is 100% customizable for your organization.

Seguridad Aplicada

Incident Response

8h / 2 days

Security incident response drill. Triage, containment, eradication, crisis communication, and lessons learned.

IT / SOC Teams

Secure Coding

16h / 4 days

Secure development: OWASP Top 10, input validation, session management, applied cryptography. In your programming language.

Developers

Cloud Security

8h / 2 days

Security in AWS, Azure, or GCP: IAM, secure configuration, misconfiguration detection, cloud-native compliance.

Cloud / DevOps

Security Architecture

16h / 4 days

Designing secure architectures: defense in depth, zero trust, microsegmentation, reference architecture.

Architects / Seniors

Threat Modeling

8h / 2 days

Threat modeling with STRIDE, PASTA, and Attack Trees. Risk identification during the application design phase.

Development / Security

Operaciones y Defensa

Security Operations

16h / 4 days

Security operations: monitoring, threat detection, log analysis, alert management, SOC procedures.

SOC / IT Teams

GDPR & Data Protection

4h / 1 day

Data protection regulation: data subject rights, impact assessments, records of processing activities, security breaches.

Legal / DPO / HR

Active Directory Security

16h / 4 days

AD hardening: Kerberos, GPOs, tier model, attack detection (Kerberoasting, Pass-the-Hash, DCSync).

Administrators / Blue Team

Containers & Kubernetes

8h / 2 days

Container security: Docker hardening, Kubernetes security, supply chain, network policies, runtime protection.

DevOps / SRE

Especialización

Audit Preparation

8h / 2 days

Preparation for ISO 27001, ENS, SOC 2, PCI DSS audits. Documentation, evidence gathering, and audit simulation.

GRC / Compliance

Security Champions

8h + program

Security Champions program: training security ambassadors within development teams.

Development / Leads

API Security

8h / 2 days

API security: OWASP API Top 10, authentication, authorization, rate limiting, API gateway security.

Backend / Architects

Network Security

16h / 4 days

Network security: segmentation, firewalls, IDS/IPS, VPN, Wi-Fi security, network forensics.

Network / IT

Social Engineering

4h / 1 day

Advanced social engineering awareness: pretexting, vishing, tailgating, USB drops, deepfakes.

Entire organization

DevSecOps

16h / 4 days

Security integration in CI/CD: SAST, DAST, SCA, IaC scanning, secrets management, pipeline security.

DevOps / Development

Logística

Format & Logistics

Group Size: 8-15 people

Ideal size for interaction and hands-on exercises. Adaptable up to 25 with additional facilitators.

Duration: 4h to 4 days

From half-day sessions to intensive week-long programs. Adapted to the syllabus and depth required.

Flexible Scheduling

Full day, half days, or distributed sessions. We adapt to your team's availability.

Format: On-Site / Online

In-company, at our facilities, or 100% live online. Hybrid format also available.

Incluido

What's Included?

Reference Materials

Comprehensive documentation, cheat sheets, and customized quick reference guides.

Hands-On Lab

Lab environment configured with your technology stack. Access for 30 days post-workshop.

Certificate of Attendance

Individual certificate for each participant detailing training hours and syllabus covered.

Results Report

Team skill assessment, identified strengths, and recommended areas for improvement.

Session Recordings

Access to the workshop recording for 90 days for review and onboarding of new team members.

Post-Workshop Support

Dedicated Q&A channel with the instructor for 30 days following the workshop.

FAQ

Preguntas Frecuentes

Yes, 100%. During the Discovery phase, we identify your technology stack, tools, and current processes. Hands-on exercises are designed specifically for your infrastructure: if you use AWS, the labs are in AWS; if you code in Java, the Secure Coding workshop is in Java.

Between 8 and 15 participants for hands-on workshops. Smaller groups are possible but less cost-efficient. For larger groups (up to 25), we adapt the format with additional facilitators. For general awareness sessions, up to 50 people.

Yes. We offer on-site delivery (at your offices or at our facilities), live online, and hybrid formats. For hands-on workshops, we recommend on-site delivery when possible for better interaction and collaboration among participants.

Typically 2-3 weeks from the Discovery meeting to delivery. This includes: curriculum design (3-5 days), lab preparation (3-5 days), and client review (2-3 days). For standard workshops without customization, this can be reduced to 1 week.

Yes. We offer discounts for booking multiple workshops, annual training programs, and large groups. Contact us for a customized quote. We also offer special rates for startups and non-profit organizations.

Absolutely. In fact, we recommend it. A comprehensive program could include: Secure Coding for developers + Threat Modeling for architects + Incident Response for IT + Security Champions as an ongoing program. We design learning paths by team.

A laptop with an internet connection and a modern browser. The labs are cloud-based and require no local installation. For Secure Coding workshops, participants work in their own IDE with access to practice repositories that we provide.

Three levels of measurement: 1) Satisfaction survey (NPS) at the end. 2) Pre/post workshop knowledge test to measure improvement. 3) For ongoing programs, tracking of security metrics (code vulnerabilities, incident response time, etc.).

We issue a certificate of attendance and achievement detailing training hours and syllabus covered. These are not official industry certifications (OSCP, CEH, etc.), but they document the training received for compliance and audits (ISO 27001, ENS, etc.).

Yes. Recordings are available for 90 days for individual onboarding. For new on-site editions, we offer reduced repeat rates. We recommend annual refresher editions to keep knowledge up to date.

Free Initial Assessment

Ready to protect your business?

Request a free initial assessment and discover how we can strengthen your organization's security. No obligation.

Contact Now

👋Hi! Have any questions? Write to us, we reply in minutes.

Open WhatsApp →