Trusted. Agile. Responsive.
Web Application Assessments, Infrastructure Assessments and Mobile Application Assessments are just some services we provide.
Evidence based and intelligence driven organisation-wide cyber security reviews are part of our threat intelligence options.
Red Teaming, Physical Penetration, Social Engineering, Phishing Campaigns and Browser Assessments are all part of the services we can provide.
Alcorn Group will provide an experienced full-time or part-time CISO with the aim of boot-straping and increasing your organisation’s security maturity.
Preventing APTs involves your client applications along with your traditional critical assets. We specialise and excel in APT security assessments.
Penetration Testing in Melbourne, Sydney, Canberra, and BrisbaneContact Us
This training draws on experience in gaining access to organisations via physical, social and digital mechanisms. This highly practical training gives you an understanding of legal restrictions, obligations and those ever present “gotchas”.
You will learn techniques to blend into the background, gain trust and leave your target with a positive feeling. These methodologies can be applied imediately. This course gives you an understanding of successful techniques and how you might evolve them in your environments.
This course follows the methodologies and techniques detailed in the internationally acclaimed security reference, The Web
Application Hacker’s Handbook. It includes all the OWASP Top 10 attacks and many more. The course has been
delivered at BlackHat, HiTB, Syscan and Breakpoint.
This Web Application Hacking course is highly practical, with over 400 labs with vulnerable examples and a Capture the Flag. Alcorn Group is proud to have a licence to deliver this training within Asia Pacific.
This training will ready you to explain security events to the media. It provides an opportunity to identify gaps in your
understanding that will be required for an accurate and clear explanation to a mass audience.
This scenario-based training creates fictitious situations that may occur at your organisation and readies you to explain them to the media. Numerous scenarios are created that you could be confronted with along with ones that organisations have had to deal with in the past.
This training provides you with both a theoretical and practical understanding of how to use the very popular hacking tool Burp Suite. Mastering this professional ethical hacker tool of choice will give you a capability to easily find vulnerabilities in your web applications.
Burp Suite has possibly been the most consistently high quality tool for assessing web applications for over a decade and the methodologies in this course are a must for any serious web application assessment.
Amid growing concerns about attacks against browsers, this training teaches you how to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security attack methods, these attacks reach past the hardened network perimeter into the soft underbelly of the network.
This highly practical course follows the methodologies detailed in the internationally acclaimed security reference, The Browser Hacker’s Handbook.