Trainings

Cyfinoid trainings are built from ongoing research, real-world offensive experience, and the technical problems modern teams actually struggle with in software delivery and cloud environments. We focus on practical material that helps participants understand how systems are attacked in practice, how trust breaks across connected platforms, and how better defensive decisions can be made as a result.

Our current training lineup is strongest in Cloud Security and Software Supply Chain Security, including the CI/CD environments that connect source code, automation, artifacts, and deployment. These are the areas where our research, tooling, and hands-on labs most directly feed into the classroom.

We deliver trainings at major security conferences and through private / corporate sessions. Exact syllabi vary by event, audience, duration, and lab design, so each course page gives the high-level approach while the specific conference page remains authoritative for the exact modules, student requirements, and logistics for that run.

Current Training Programs

Hacking Multi-Cloud Infrastructure

This training helps participants think about cloud environments the way attackers do. Instead of memorizing one provider at a time, the focus is on trust boundaries, identity, storage, metadata, orchestration, automation, and the patterns that repeat across cloud ecosystems.

It is designed for teams that want an attacker-informed view of cloud risk across AWS, Azure, GCP, DigitalOcean, Alibaba Cloud, Kubernetes platforms, and adjacent cloud-native environments, depending on the run.

Attack & Defend Software Supply Chain

This training looks at software trust across the full delivery lifecycle, not just dependencies and SBOMs. It covers the producer writing first-party code, the consumer building on top of third-party software and services, and the end user depending on the final product.

The material spans the developer desktop, repositories, CI/CD, package ecosystems, artifacts, deployment tooling, and cloud environments. Public conference runs are typically attack-led, while private deliveries can go deeper into defense, governance, and operational hardening.

Attacking CI/CD Environments

This training focuses on CI/CD as a high-trust control plane rather than simple build automation. Participants learn how attackers abuse repositories, workflows, runners, tokens, artifacts, and integrations, and how those weaknesses can turn into software tampering, secret theft, cloud abuse, or wider supply chain compromise.

It is especially useful for platform teams, DevOps engineers, product security teams, and testers who want a more realistic understanding of how modern delivery pipelines fail under attacker pressure.

Archived Training

Attack & Defend Android Applications

This course remains part of Cyfinoid’s training history and is kept online as an archive for previous attendees, conference visitors, and people researching our earlier mobile security work. It is no longer offered as a current public or private training.

Why These Trainings Stand Out

  • Research-driven rather than slide-driven
  • Built around hands-on labs and realistic attack paths
  • Offensive understanding with practical defensive relevance
  • Focused on trust boundaries, automation, and how real systems connect
  • Flexible enough for conference formats and private team needs

How To Choose

  • Choose Hacking Multi-Cloud Infrastructure if your focus is attacker-informed cloud security across providers and platforms
  • Choose Attack & Defend Software Supply Chain if your focus is software trust across the full path from development to deployment
  • Choose Attacking CI/CD Environments if your focus is pipeline abuse, automation risk, and software delivery control planes

How To Attend

Cyfinoid offers these trainings through international conferences and private engagements. For public runs, see the listing below and conference page for the exact syllabus and logistics. For private / corporate sessions, contact us.

Upcoming Trainings

Testimonials

Impressive Content

Great delivery, very attentive, excellent knowledge base provided. The provision of material is a highlight.

Attendee @ BlackHat USA
Insightful and Well-Worth the Investment

The presenters conveyed a significant amount of knowledge and I’m walking away with good value for $. Excellent work and great training!

Attendee @ Blackhat USA
Deep dive training

"One of the most detailed training, it dives deep in the cloud hacking and explores real world attacks with case studies & thanks for the self-host vulnerable infra!"

Attendee @ BlackHat USA
Knowledgeable Trainer and Practical Examples

Great knowledge and very helpful trainer and easy examples to relate with real world problems

Attendee @ Nullcon
Well-Executed Sessions with a Desire for More

The training was really good and trainers executed it in a fantastic way and they where very helpful. I really like to continue for 2 more days as the contents were interesting but time frame allocated was only 2 days.

Attendee @ c0c0n
Enjoyable and Insightful Two-Day Workshop

Training Content, Discussions was on point. Really enjoyed two days session.

Attendee @ c0c0n
Hands-On Learning with Practical Cloud Insights

Learns a lot about Cloud structure and how we can get the leaking information and also how to use it. Well prepared tools and lab environment make us doing well. Really appreciate it.

Attendee @ BlackHat
Valuable Insights for Real-World Mobile Pentesting

It was a very complete course providing me with very useful information that I will put in practice as I'm part of Mobile Pentest team in my organization, I'm very satisfied with the content and kudos to both instructors, they are pretty amazing with plenty of verifiable experience

Attendee @ BlackHat USA
Smooth Learning Curve for Newcomers

I'm a beginner level but was easy for me to understand all the topics because it was very clear the examples for each topic. Thanks for the help.

Attendee @ BlackHat USA
This wasn’t your typical cloud security class

This wasn’t your typical cloud security class - it was two full days of hands-on labs, real-world attack scenarios, and deep technical walkthroughs across AWS, Azure, GCP, DigitalOcean, and Aliyun. Each lab pushed us to think like attackers and defenders, and I walked away with a whole new appreciation for how exposed cloud environments can be if not properly secured. …

Darren Windham
Principal - Forensic Services / Charles River Associates

Past Trainings

Attack and Defend Software Supply Chain DEFCON Trainings 2025

11 August 202512 August 2025
Las Vegas, USA
SSCS-logo-square

Attacking CI/CD Environments BruCON Trainings

24 April 202525 April 2025
Online
brucon-2025

Attack & Defend Software Supply Chains Nullcon 2025

3 March 20255 March 2025
Goa, India
nullcon-training-2025

Attack & Defend Android Applications c0c0n 2024

13 November 202414 November 2024
Gandhinagar, Gujrat
WS-Anant-2

Attack & Defend Android Applications BlackHat USA 2024

5 August 20246 August 2024
Virtual
bh-usa-24-android-56

Attack & Defend Android Applications BlackHat USA 2024

3 August 20244 August 2024
Virtual
bh-usa-24-android

Attacking CI CD Environments Nullcon Hyderabad 24

2 May 20244 May 2024
Hyderabad, India
1710245049783

Attack & Defend Software Supply Chain BlackHat Asia

16 April 202417 April 2024
Online
bh-asia-supply-chain-final

Beyond the Code : Securing your software supply chain c0c0n 2023

4 October 20235 October 2023
Kochi, India
F2g7MqrbsAAMr2G

Attack & Defend Android Applications BlackHat USA 2023

5 August 20236 August 2023
Las Vegas, USA
220706_BHUSA23_Web_Ads_Trainer_400x400-editing-1

Attack & Defend Android Applications BlackHat USA 2022

8 August 20229 August 2022
Las Vegas, USA
ad1

Attack & Defend Android Applications BlackHat USA 2022

6 August 20227 August 2022
Las Vegas, USA
ad1
Scroll to Top