HOME > TRAINING SESSION > Trainings

Trainings

CODEGATE goes beyond CTFs and conferences by offering advanced, hands-on cybersecurity training.
These practical courses offer participants valuable opportunities to strengthen their technical skills,
deepen their understanding of the latest tools and technologies,
and effectively respond to increasingly sophisticated cyber threats.

Notification

  • All sessions will be conducted in English only.
  • All sessions will be held in person only.
  • Registration is available on a first-come, first-served basis.
  • Confirmation emails will only be sent once the minimum number of attendees is reached.
  • Details on the payment method will be announced in June and provided exclusively to applicants
  • All training session attendees will have full access to CODEGATE programs.

Training Sessions

July 8-10, 2025 Ⅰ COEX

Android Userland & Kernel Fuzzing and Exploitation

3 days
USD KRW
4,000 5,718,400
Registration
Exchange Rate: 1,429.60
*First announced TT selling rate on 15th, May
Mobile Hacking Lab
#Android Security #Mobile Hacking #Fuzzing #Exploitation #Userland #Kernel
Skill Level: Intermediate
Overview
Android Userland & Kernel Fuzzing and Exploitation Step into the realm of comprehensive Android security with our integrated "Android Userland and Kernel Fuzzing and Exploitation" course. Designed for both novices and seasoned professionals, this course offers an extensive curriculum that covers the spectrum of Android vulnerabilities and their exploitation. Starting with the Userland component, learners will grasp how to detect bugs in Android Userland Applications and exploit memory corruptions. The course provides a deep understanding of ARM assembly, reverse engineering, and the development of robust exploits, bypassing exploit mitigations like NX and ASLR. With 43 labs across 9 modules, students will employ advanced fuzzing techniques to pinpoint exploitable vulnerabilities. The journey continues as we pivot to the Android kernel on the second day, where the secrets of kernel internals, such as memory allocators and driver programming, are unraveled. Students will learn to discover bugs using kernel fuzzing techniques, including the use of sanitizers and Syzkaller. The course will guide attendees through the construction of kernel exploits crucial for sandbox escape, examining real-world vulnerabilities and the art of kernel debugging. In culmination, the course integrates Userland and Kernel learnings to assemble a full-chain remote exploit against target devices. The hands-on approach is further enhanced by access to our state-of-the-art training platform, where course attendees can perform exercises and apply their knowledge in practical scenarios. After the course the students can attempt for the “Certified Android Exploit Developer” exam and will get access to our Mobile Hacking Lab platform to do extra labs.
Trainers
Umit Aksu
Umit Aksu is a seasoned security engineer and the founder of Mobile Hacking Lab, a leading platform for offensive mobile security education. He has led security engineering, penetration testing, and vulnerability research teams at organizations including Microsoft, ING Bank, and DarkMatter. Umit is known for delivering hands-on trainings at Black Hat USA and Asia, and for regularly sharing technical content on mobile exploitation and vulnerability research LinkedIn. Currently, Umit is fully focused on developing Djini AI, an advanced AI-powered vulnerability research platform, and scaling the Mobile Hacking Lab to train the next generation of offensive security professionals
Arno Miedema
Arno Miedema is a security engineer with a strong background in Application Security, Infrastructure and Mobile Security and software development (SSDLC). He is involved in the Application Security and the Android Userland training at Mobile Hacking Lab and was trainer at Blackhat USA. Arno is currently concentrating on developing AI-powered software solutions, while continuing to specialize in mobile security and exploitation.

July 8-10, 2025 Ⅰ COEX

Automated Reverse Engineering

3 days
USD KRW
3,600 5,146,560
Registration
Exchange Rate: 1,429.60
*First announced TT selling rate on 15th, May
Kyle Martin
#Reverse #Engineering #Automation # Vector 35
Skill Level: Intermediate
Overview
This class, for experienced and intermediate reverse engineers, leverages the latest in modern program analysis theory to simplify and automate many every-day reverse engineering tasks. We'll cover how to model high-level language patterns and identify them in binaries regardless of target architecture, automate source-to-sink analysis, detect suspicious binaries, extract key program attributes, and so much more. We'll discuss how to use automation in long-term reverse engineering projects to automate everyday tasks, keep you organized, and help you remember what you've already solved. We'll also explore headless scripting to make quick, automated decisions and reports on binaries at a glance.
Trainers
Kyle Martin
Kyle Martin is a cyber security software engineer and educator, focused on making all things “binary” easier for humans to understand. Kyle first started teaching at 15 when he became the head counselor at a summer-long computer camp, rewriting their C++ and x86 assembly courses. More recently Kyle led the body of students behind CSAW CTF and CSAW Red, including the internal training initiative enabling students to write the renowned challenges that distinguished those competitions. Now, Kyle runs reverse engineering focused trainings internationally. Kyle brings with him the expertise and support of the entire Vector 35 team, creators of Binary Ninja.

Cancellation and Refund Policy

- Cancellations made before 5:00 PM (KST) on June 11 are eligible for a full refund.
- No refunds will be provided for cancellations made after 5:00 PM (KST) on June 11.

Inquiry