Training

Over the course of Jason's career he has had 20 years devoted to security leadership, offensive security, and bug bounty.

Currently we offer five distinct courses.

The Bug Hunter's Methodology, Red Blue Purple AI, Attacking AI, Hacking Your Career, and Interception Proxies for Modern Security Assessments. All these courses descriptions, syllabuses, and links can be found on our Arcanum course landing and eLearning page, located here.

The Bug Hunter's Methodology

The Bug Hunter's Methodology (TBHM) aims to equip you with the latest tools, techniques, and strategies, plus provide a data-driven methodology on how and where to search for vulnerabilities that are currently common in the wild.Unlike other courses, TBHM Live is not an A-Z or beginner-oriented course. True to the spirit of my public TBHM talks, my emphasis is on expert tips, time-saving tricks, practical Q&As, automation strategies, vetted resources, and engagement via the dedicated community on Discord.

Red Blue Purple AI

Red Blue Purple AI aims to reverse engineers security programs, and security people's day-to-day needs. It maps these out in an easy-to-understand way and teaches security professionals how to supercharge their abilities

By the end of the course the student should be well-prepared to apply the knowledge from the course to build their own world-class bots and understand where AI can help them scale.

Level up your security with Arcanum

We're trying to leave a tangible positive impact on cybersecurity through content, consulting, and training. Reach out to learn more!