SOC 2025 Banner
Training

Duration: 20 hours

Levels: beginner, intermediate, advanced

Audience: technicians, managers, people without experience

Essential Security - Compressed Version
Whether you are new to information security or an experienced professional with a specialized focus, this course will provide you with the essential information security skills and techniques you need to protect and secure your critical technology and information assets, whether on-premises or in the cloud. This is a condensed version of the Bootcamp Style.
Hacker Techniques and Tools
This course will help you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats and how to develop threat intelligence to mount effective defense strategies for on-premises and cloud platforms.
Malware Reverse Engineering
This course explores malware analysis tools and techniques in depth.
Auditing & Monitoring Networks, Perimeters & Systems
This course will provide the three things needed to measure, report, and manage risk in the enterprise: tools, techniques, and thought processes. Auditors, managers, security, and compliance professionals will gain the combination of practical experience and classroom discussion they need to better protect their organizations.
Essential Security - Compressed Version
Whether you are new to information security or an experienced professional with a specialized focus, this course will provide you with the essential information security skills and techniques you need to protect and secure your critical technology and information assets, whether on-premises or in the cloud. This is a condensed version of the Bootcamp Style.
Advanced Essential Security
This course will improve your knowledge and skills in the specific areas of network architecture defense, penetration testing, security operations, digital forensics and incident response, and malware analysis. This is an essential course for members of security teams of all sizes.
Owasp Top 10 and DevSecOps
The course offers a comprehensive overview of the most important security practices for developers and DevOps teams, along with a great introduction to OWASP Top 10, a list of the most critical security vulnerabilities in web applications, created by the Open Web Application Security Project (OWASP). This course covers each of these vulnerabilities, teaching how to identify, prevent, and mitigate them by combining these techniques with DevSecOps best practices.
Security Essentials - Bootcamp Style
Whether you are new to information security or an experienced professional with a specialized focus, this course will provide you with the essential information security skills and techniques you need to protect and secure your critical technology and information assets, whether on-premises or in the cloud.
Introduction to Cybersecurity
This course offers an introduction to the world of cybersecurity, approaching it from the perspective of raising awareness. This allows for a more optimal and immediate approach to security. It is aimed at non-technical personnel who need to acquire this knowledge before using a company's resources.
Defensive Security Architecture and Engineering
This course is designed to help students build and maintain a truly defensible security architecture. There will be a strong focus on leveraging existing infrastructure (and investment), including switches, routers, and firewalls.
Cyber Threat Intelligence
This course covers the study of cyber threat intelligence and its application in the field of cybersecurity, encompassing the process of gathering, analyzing, and disseminating information related to cyber threats, vulnerabilities, and adversaries that can help organizations identify and mitigate cybersecurity risks.
Incident Response and Threat Intelligence
Threat hunting and incident response tactics and procedures are evolving rapidly. Teams can no longer afford to use outdated incident response and threat hunting techniques that fail to adequately identify compromised systems.
Essential Security - Compressed Version
Whether you are new to information security or an experienced professional with a specialized focus, this course will provide you with the essential information security skills and techniques you need to protect and secure your critical technology and information assets, whether on-premises or in the cloud. This is a condensed version of the Bootcamp Style.
Advanced Essential Security
This course will improve your knowledge and skills in the specific areas of network architecture defense, penetration testing, security operations, digital forensics and incident response, and malware analysis. This is an essential course for members of security teams of all sizes.
Owasp Top 10 and DevSecOps
The course offers a comprehensive overview of the most important security practices for developers and DevOps teams, along with a great introduction to OWASP Top 10, a list of the most critical security vulnerabilities in web applications, created by the Open Web Application Security Project (OWASP). This course covers each of these vulnerabilities, teaching how to identify, prevent, and mitigate them by combining these techniques with DevSecOps best practices.
Security Essentials - Bootcamp Style
Whether you are new to information security or an experienced professional with a specialized focus, this course will provide you with the essential information security skills and techniques you need to protect and secure your critical technology and information assets, whether on-premises or in the cloud.
Introduction to Cybersecurity
This course offers an introduction to the world of cybersecurity, approaching it from the perspective of raising awareness. This allows for a more optimal and immediate approach to security. It is aimed at non-technical personnel who need to acquire this knowledge before using a company's resources.
Hacker Techniques and Tools
This course will help you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats and how to develop threat intelligence to mount effective defense strategies for on-premises and cloud platforms.
Continuous Monitoring and SecOps
This course assesses the current state of security architecture and continuous monitoring and provides a new approach to security architecture that can be easily understood and defended.
Windows Forensic Analysis
This course provides comprehensive and in-depth digital forensic knowledge of Microsoft Windows operating systems through forensic data analysis and collection, as well as detailed tracking of user activity and organization of findings.
DevSecOps and Cloud Security
The course is designed to provide participants with the knowledge and skills necessary to integrate security throughout the software development lifecycle in cloud environments. It focuses on DevSecOps principles, ensuring that security is a key consideration from the outset and throughout all phases of development. It also addresses the specific challenges of cloud security to ensure compliance in facilities that use these resources.
SIEM with Tactical Analytics
This class is designed to provide training, methods, and processes to improve existing logging solutions.
Tools for Blue Team
This course is designed to train cybersecurity professionals in the use of specific tools and techniques for defending infrastructures and systems against cyberattacks. A Blue Team is responsible for protecting, monitoring, and responding to threats in real time within an organization.
Auditing & Monitoring Networks, Perimeters & Systems
This course will provide the three things needed to measure, report, and manage risk in the enterprise: tools, techniques, and thought processes. Auditors, managers, security, and compliance professionals will gain the combination of practical experience and classroom discussion they need to better protect their organizations.
Managing Security Vulnerabilities : Enterprise and Cloud
This course helps analysts think strategically about vulnerability management to mature their organization's program, but also provides tactical guidance to help them overcome common challenges.
Malware Reverse Engineering
This course explores malware analysis tools and techniques in depth.
Advanced Network Forensics Analysis
This course will enable you to handle an intrusion incident, a data theft case, an employee misuse scenario, or participate in the proactive discovery of adversaries. The network often provides an unparalleled view of the incident.
Career Paths
Our Cybersecurity Career Paths are designed to accompany you in your professional development, whether you are a technician, a manager, or just starting out.

Each path groups together courses that will allow your team to build a solid foundation and progress in depth in a specific focus: defensive, offensive, or management.
Path de Defensive
Security
- Security Essentials - Bootcamp Style
- Advanced Security Essentials
- Continuous Monitoring and SecOps
- SIEM with Tactical Analytics
- Defensive Security Architecture and Engineering
Why choose this path:
- Discover how attackers think and act.
- Train with offensive tools and real-world scenarios.
- Ideal for Red Teams, pentesters, and hardening professionals, or teams with technical knowledge who want to take a cybersecurity approach.
Path de Offensive
Security
- Security Essentials - Bootcamp Style
- Advanced Essential Security
- Hacker Tools & Techniques
- Reverse-Engineering Malware
- OWASP Top 10 and DevSecOps
Why choose this path:
- Discover how attackers think and act.
- Train with offensive tools and real-world scenarios.
- Ideal for Red Teams, pentesters, and hardening professionals, or teams with technical knowledge who want to take a cybersecurity approach.
Path Leadershipand
Management
- Building and Leading Vulnerability
- Management Programs
- Cyber Incident Management
- Managing Human Risk
- Ransomware for Incident Responders
Why choose this path:
- Lead vulnerability management programs with a strategic approach.
- Prevent and manage ransomware attacks from a leadership position.
- Understand human risk and how to effectively reduce it.
- Strengthen your role as CISO, IT manager, or security leader.
Path de Digital Forensics and
Incident Response
- Incident Response & Threath Hunting
- Windows Forensics Analysis
- Reverse-Engineering Malware
- Advanced Network Forensics
- Linux Forensics
Why choose this path:
- Learn how to investigate incidents in real environments.
- Master forensic analysis in Windows, Linux, and networks.
- Incorporate threat hunting techniques for proactive detection.
- Analyze malware and understand its internal behavior.
- Train as a specialist in post-attack response and analysis.
Awarness

Audience: organizations, specific teams, middle management

Format: recorded videos, live talks, simulations, capsules

Awareness Talks
Concise and strategic presentations to raise awareness throughout the organization, from operational staff to senior management. We address the most relevant risks with a high-impact approach.
Awareness Activities
We design and implement ongoing, customized training programs aligned with your business's safety objectives. Our methodological approach ensures behavioral change and long-term knowledge retention.
Awareness Plan
We enhance learning through immersive and practical experiences. We implement gamification to improve engagement and retention, and we develop activations that simulate real cybersecurity scenarios, strengthening response skills in a controlled environment.
Coaching

Audience: CISOs, team leaders, technical leaders, developing talent

Areas: leadership, incident management, technical development, organizational culture

Modality: individual, group, intensive mentoring

Certification Coaching
We offer personalized coaching for professionals seeking globally recognized cybersecurity certifications. We provide strategic support that goes beyond theory, focusing on the practical application of knowledge to ensure success in the exam and in your professional career.
Training for Trainers
We train your internal team with the pedagogical and technical skills necessary to lead awareness and training programs. This service allows you to build an autonomous team of trainers capable of maintaining a robust and up-to-date security culture within your organization.
They trust us
"At HGI (Halcyon Group International), we highlight the commitment to service provided by BASE4 Security, not only for its technical excellence, but also for its responsibility in meeting the high standards required for projects coordinated by the U.S. Department of Defense. It is a pleasure for us to collaborate with such qualified and exceptional professionals."
Catherine I. Dunlap, Founder
Training

It depends on the level. Each course clearly indicates whether prior knowledge or specific experience is required.

Yes. Our courses are designed with a practical approach and use laboratories, simulated environments, or real technical challenges.

All courses include theoretical and practical evaluation of the content.

Yes. Upon completing the course and meeting the minimum criteria, you will receive a digital certificate of participation or completion. Endorsed by our professionals, who have extensive experience in the market.

Awareness

No. Our content is adapted for all types of audiences, from administrative staff to technical or managerial profiles.

Yes. We can customize the content with real examples, corporate language, branding, and specific issues.

Yes. We use indicators such as viewing rates, approval rates, clicks, incident reports, and behavioral changes.

Yes. It can be designed in line with ISO 27001, NIST, GDPR, among others, including objectives aligned with regulatory requirements and mandatory awareness controls.

Coaching

We offer 1:1, group sessions, and strategic mentoring in areas such as leadership, risk management, incident response, and cybersecurity strategy.

Each session is planned according to defined objectives. It may include case reviews, exercises, career roadmaps, or decision scenarios.

Yes. Many students combine both services to enhance their technical and strategic growth.

It varies depending on the objective. There are options: one-off sessions, monthly programs, or programs based on objectives. It depends on the client's needs.