Why identity protection has to level up in 2026
Identity fraud in 2026 is AI-driven, industrial and costly. Learn how deepfakes, fraud rings and new cyber insurance rules are changing identity protection.
Read More
Black Hat MEA has always been more than just a conference. It’s where the global cybersecurity community gathers to exchange ideas, push boundaries, and explore the technologies shaping the future of security. But perhaps the most transformative part of the experience is our world-class training program – where you can sharpen your craft alongside industry leaders.
This year, we’re offering a lineup of deeply technical, hands-on training courses designed to take you (whether you’re a curious beginner to a seasoned red team operator) to the next stage of your career.
Delivered by world-renowned experts, these courses go beyond theory; immersing participants in live scenarios, real-world attack surfaces, and defense strategies that can be applied immediately in the field.
Whether you want to hone your pen testing skills, fine-tune defensive operations, or explore the frontiers of exploit development, we have a training track tailored to your ambitions.
Pre-register now to secure your seat
Cybersecurity evolves every day. What worked last year might already be obsolete. That’s why our trainings are designed with two key priorities:
Delivered in Riyadh, in-person and live online, each course gives you the space to absorb, experiment, and refine skills under expert guidance.
Here’s a quick glimpse at just a few of the most in-demand courses on offer this year:
For elite penetration testers and reverse engineers, this is OffSec’s most advanced course. Covering topics such as memory corruption, kernel exploitation, and advanced debugging techniques, AWE challenges even seasoned professionals to break past limitations. You’ll leave with the skills to identify and weaponise complex vulnerabilities in Windows environments.
Web applications remain one of the most common attack surfaces. And this course takes exploitation to new heights. You’ll dive into secure code review, bypassing authentication, and advanced web app exploitation to uncover vulnerabilities that evade traditional testing.
As defenses become stronger, attackers innovate. This course explores how adversaries evade EDR and antivirus tools, establish covert persistence, and slip through SIEM monitoring. By learning these techniques, you can anticipate and counter advanced threat actor behaviors.
Not all battles are offensive. This course empowers SOC analysts to detect and investigate sophisticated threats using log analysis, SIEM tuning, and incident investigation. With a focus on practical defensive workflows, it equips security teams to respond quickly and effectively under pressure.
If you’re just beginning your journey into offensive security, this foundational course provides hands-on experience in penetration testing. Using Kali Linux, you’ll gain confidence in network and web exploitation, vulnerability identification, and basic attack methodologies.
From entry-level professionals building your foundation, to seasoned specialists pushing into advanced exploit development, Black Hat MEA’s 2025 training program is intentionally diverse. These courses are designed to help you grow into a confident, battle-ready professional who can defend organisations against ever-changing threats.
And because every training is deeply immersive and instructor-led, you walk away with experience that really sticks – not just a tick-box certification to add to your CV.
Seats in these trainings are limited, and they fill quickly every year. This is your chance to train with the best – so we recommend you pre-register now to secure your seat.
The 2025 training courses at Black Hat MEA represent the cutting edge of cybersecurity education. You’ll practice critical skills at the highest level, guided by leaders in the field. Get serious about taking your skills further – and we promise it’ll be fun, too.
Join the newsletter to receive the latest updates in your inbox.
Identity fraud in 2026 is AI-driven, industrial and costly. Learn how deepfakes, fraud rings and new cyber insurance rules are changing identity protection.
Read More
New research from Veracode and Gartner shows that while AI is accelerating software development, it’s also accelerating risk.
Read More
Three recent campaigns (Tsundere, Matrix Push C2, and Sturnus) show attackers shifting command-and-control and data theft into places we treat as harmless UX plumbing.
Read More