Secure Coding *
Reverse Engineering *
Exploit Writing *
Incident Handling and Forensics Examinations
* All the topics covered in each course have practical lab at the end of the topic, and the final day includes a five hours hands-on practical implementation of every technique covered in the course.