Skip to content
LP
> TRAINING

Defense in Depth
by Offense.

Advanced training grounded in real-world attack research. We train professionals with the same techniques, tools, and mindset our operators use on live engagements — because the best defenders understand how attackers think.

> OUR APPROACH

Offensive techniques. Defensive outcomes.

A combined offensive and defensive approach is critical for robust security. You cannot defend what you don't understand how to attack.

  • Integration of offensive & defensive strategies in every module
  • Hands-on labs using the same tools our operators use
  • Real-world scenarios drawn from actual engagements
  • Dual perspective: attacker mindset, defender response
  • Mapping to Event Viewer IDs, ATT&CK TTPs, and detection rules
  • Microsoft & Linux platforms covered across infrastructure courses
10+
specialist courses
2–5
days per course
100%
hands-on labs
8–12 yrs
instructor experience
> COURSES

Pick your battlefield.

All courses run as private cohorts at your premises, at our training facility in Singapore, or as custom in-house red team programmes on your live infrastructure.

★ FEATURED

Defense In Depth — Infrastructure Security

5 days Intermediate–Advanced

Hands-on offensive and defensive techniques across network, endpoint, and Active Directory environments. Participants learn attacker methodologies and how defenders detect and respond at each layer.

Network penetration testingActive Directory exploitation & hardeningEvent Viewer ID mappingEndpoint defense mechanismsLateral movement & detectionReal-world attack scenarios
★ FEATURED

Defense In Depth — Application Security

4 days Intermediate–Advanced

Web application attack techniques paired with secure development practices. Combines OWASP methodology with live exploit exercises and real-code remediation.

OWASP Top 10 exploitationBusiness logic abuseSecure code developmentAuth bypass & injection chainsAPI securityCode review labs

Red Teaming

5 days Advanced

Full adversary simulation training. Students plan and execute multi-phase intrusions against isolated lab environments using TTPs from MITRE ATT&CK.

ATT&CK framework coverageDigital + physical intrusionSocial engineeringC2 frameworksEDR evasionReport writing & debrief

Mobile Application Security — iOS & Android

3 days Intermediate

Reverse engineering, traffic interception, and exploitation of iOS and Android applications with hands-on lab exercises on real devices.

iOS & Android architectureFrida & ObjectionTraffic interceptionBinary protections bypassInsecure data storageAPI abuse on mobile

Cloud Security

3 days Intermediate

Attack and defend AWS, Azure, and GCP environments. IAM privilege escalation, misconfiguration chains, container security, and cloud-native DFIR.

AWS / Azure / GCP attack pathsIAM privilege escalationMisconfiguration exploitationContainer & Kubernetes securityCloud-native logging & detectionPractical labs on sandboxed environments

Threat Hunting

3 days Intermediate

Proactive threat detection using logs, EDR telemetry, and SIEM data. Participants hunt for indicators of compromise across simulated breached environments.

Hypothesis-driven huntingSIEM query writingEDR telemetry analysisNetwork traffic analysisIOC & TTP correlationHunt playbook development

Digital Forensics

4 days Intermediate

Disk, memory, and network forensic analysis. Incident timeline reconstruction, malware artifact analysis, and chain-of-custody procedures.

Disk & memory acquisitionTimeline reconstructionMalware artefact analysisNetwork PCAP forensicsWindows & Linux forensicsLegal chain of custody

Blockchain Security

3 days Intermediate–Advanced

Smart contract vulnerability research, DeFi protocol attacks, and blockchain-specific exploitation techniques across EVM and other platforms.

Smart contract auditingReentrancy & overflow attacksDeFi protocol exploitationEVM internalsConsensus layer securityPost-exploit analysis

Application Fuzzing In Depth

3 days Advanced

Coverage-guided and mutation fuzzing to discover memory safety bugs, crashes, and logical vulnerabilities in binary and web targets.

AFL++ & LibFuzzerCoverage-guided fuzzingCorpus managementCrash triage & root causeBinary fuzzing targetsProtocol fuzzing

Threat Modelling

2 days All levels

Structured threat identification and risk prioritisation using STRIDE, PASTA, and Attack Trees. Applied to architecture diagrams and real-world systems.

STRIDE methodologyPASTA frameworkAttack trees & MITRE ATT&CKData flow diagrammingRisk scoring & prioritisationReporting for boards & developers
in-house-red-team.sh
> custom programme available

Train your red team on your own infrastructure.

Our in-house red team programme embeds our operators inside your organisation to train your security team using your actual systems, your actual defenses, and real attack scenarios tailored to your threat model.

CONTACT

Schedule a training session.

All courses are delivered as private cohorts. Contact us to discuss dates, customisation, and in-house delivery options.

info@leetprotect.com +65 6690 9262 Mon–Fri 9:00am–6:00pm SGT
Get in touch