Diverse contents

Information security is deeply interconnected with numerous fundamental disciplines. Dreamhack Enterprise offers a comprehensive Fundamental curriculum covering essential basic information security concepts, alongside rapidly-developing applied curriculums that meet industry demands.

All contents

4 Basic Curriculum
Develop a strong foundation in information security by mastering the essential and comprehensive skills: web hacking, reverse engineering, and system hacking.
5 Advanced Curriculum
Based on foundational knowledge, these curriculums cover more specialized and detailed areas, allowing you to enhance your security capabilities in the areas of expertise required by your organization.
1 Mixed Curriculum
Take your first step toward a secure development environment through secure coding practices for Kotlin Spring - a framework widely adopted by many companies
  • Lecture with exercises
Advanced curriculum
Offensive Security
Defensive Security
Basic Curriculum
Advanced Curriculum
Mixed Curriculum
Dream Beginners
Web Hacking
Reverse Engineering
System Hacking
Cryptography
Mobile Hacking
Embedded Hacking
Browser Hacking
Cloud Security
Secure Coding
  • Guide to Dreamhack
  • Basic environment configuration manual
  • Basic knowledge of computer science and Linux usage
  • Study guidelines by categories
  • ssh, docker, regex, etc.
  • Basic concepts (HTTPS, Cookie, etc)
  • Introduction to attack vectors (XSS and CSRF, etc)
  • SQL Injection and detailed techniques
  • NoSQL, Linux / Windows side server vulnerabilities and exploitations
  • Web client mitigations and bypass methods
  • Cloud Side Vulnerabilities
  • Computer Architecture, x86-84, ISA
  • Dynamic analysis, static analysis
  • Assembly
  • How to use IDA
  • Program analysis examples
  • How to use Ghidra
  • How to build an environment and use tools
  • Linux architecture and memory structure
  • Stack and heap-based attack techniques (FSB, DFB, etc)
  • Attacks using Linux libraries
  • Specific techniques (Heap, FSOP, IO, etc.)
  • Classic ciphers, modern ciphers
  • Block ciphers (AES, DES, etc.)
  • Public key ciphers, key exchange algorithms
  • Hash, electronic signatures
  • Android, iOS Environments
  • Frida features and how to use
  • Dreamhack's security solution (Dream Detector)
  • Evasion techniques (Root detection, SSL/TLS Pinning, etc.)
  • Embedded device architecture
  • ARM binary analysis and exploitation
  • Firmware analysis and emulation
  • Embedded device exploit process
  • Breaking down how V8 works
  • Understand how V8 optimizes
  • Understanding memory architecture in V8
  • Browser vulnerability analysis and exploit exercises
  • AWS, GCP, and Azure Security Fundamentals
  • Hands-on with Kubernetes environments
  • Service audits
  • Patching vulnerabilities
  • Kotlin Spring
  • Vulnerability case study
  • JWT, Lock, CSP
  • Secure coding labs

Enterprise contents

Cloud Security

As more companies actively adopt cloud and IaaS solutions for faster, scalable infrastructure, learn and practice essential security concepts specific to cloud environments.
  • Deliver real-world, case-based learning with Kubernetes

Secure Coding

Practice implementing secure services through our secure coding curriculum in environments based on real-world cases. Drawing from Theori's years of consulting achievements, this material is crafted from actual industry incidents and cases.
  • Learn how to securely implement web applications
  • Includes hands-on patching exercises using Kotlin Spring, going beyond theory to protect real web services

Embedded Hacking

Learn techniques for targeting products running on embedded and IoT devices. Cover fundamental ARM architecture knowledge and methods for acquiring, analyzing, and exploiting firmware.
  • ARM Architecture, assembly, and exploitations
  • Hands-on firmware analysis, emulation, and debugging
  • Example firmware exploit exercises

Browser Hacking

As one of the cornerstones of modern internet infrastructure, web browsers represent a critical attack surface that draws significant attention from security researchers. This lectures explores browser architecture fundamentals, vulnerability analysis methodologies, and in-depth case studies of real-world exploits to equip you with the skills needed for browser vulnerability research and discovery.
  • Configuration for V8 build environment
  • JavaScript Primitives and Objects
  • V8 Debugging
  • Case study and exploit exercises

FAQs

How can I start Dreamhack Enterprise?
For inquiries about Dreamhack Enterprise, you can either click the inquiry button at the top of the page or contact us at dreamhack@dreamhack.io. Please include your organization name, contact person, phone number, and your message in the email, and we will respond promptly.
What is the difference between a regular Dreamhack user and Dreamhack Enterprise user?
With Dreamhack Enterprise, administrators gain access to learner management features and hosting enterprise CTFs, which are not available to regular Dreamhack users. Additionally, Enterprise users will get earlier access to new lectures than regular Dreamhack users, and access to various exclusive lectures and contents available only to Enterprise learners. For more details, please refer to the Enterprise Brochure .
Can I use Dreamhack Enterprise without security expertise?
Through easy-to-understand and intuitive metrics, you can easily manage learners even without specialized security knowledge. Additionally, throughout your subscription period, the Dreamhack team will leverage their expertise to recommend learning methods tailored to your organization's needs.
Is Dreamhack Enterprise only available to businesses?
We provide our services to all types of organizations, including not only corporations but also public institutions and educational institutions.
Which organizations would benefit most from Dreamhack Enterprise?
This is ideal for organizations that want to go beyond one-time security training to permanently elevate security capabilities across their entire enterprise, organizations seeking to establish systematic approaches for improving security competency, and organizations aiming to cultivate a security learning culture within their company.
What is the pricing for Dreamhack Enterprise?
Pricing varies depending on the subscription period and number of users. For detailed information, please refer to the Enterprise Brochure .