Introduction To Software Exploits
Exploits 2: Exploitation in the Windows Environment
Android Forensics & Security Testing (repeat)
Introduction to ARM
Flow Analysis & Network Hunting
Pcap Analysis & Network Hunting
Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
Lessons-Learned in Designing a Training Course for Professionals