Bots, AI, and the new front line: Should blue teams start thinking like attackers?
Automation has become an adversary. In today’s bot-driven landscape, blue teams must think like attackers – predicting intent before it strikes.
Read More
Black Hat MEA has always been more than just a conference. It’s where the global cybersecurity community gathers to exchange ideas, push boundaries, and explore the technologies shaping the future of security. But perhaps the most transformative part of the experience is our world-class training program – where you can sharpen your craft alongside industry leaders.
This year, we’re offering a lineup of deeply technical, hands-on training courses designed to take you (whether you’re a curious beginner to a seasoned red team operator) to the next stage of your career.
Delivered by world-renowned experts, these courses go beyond theory; immersing participants in live scenarios, real-world attack surfaces, and defense strategies that can be applied immediately in the field.
Whether you want to hone your pen testing skills, fine-tune defensive operations, or explore the frontiers of exploit development, we have a training track tailored to your ambitions.
Pre-register now to secure your seat
Cybersecurity evolves every day. What worked last year might already be obsolete. That’s why our trainings are designed with two key priorities:
Delivered in Riyadh, in-person and live online, each course gives you the space to absorb, experiment, and refine skills under expert guidance.
Here’s a quick glimpse at just a few of the most in-demand courses on offer this year:
For elite penetration testers and reverse engineers, this is OffSec’s most advanced course. Covering topics such as memory corruption, kernel exploitation, and advanced debugging techniques, AWE challenges even seasoned professionals to break past limitations. You’ll leave with the skills to identify and weaponise complex vulnerabilities in Windows environments.
Web applications remain one of the most common attack surfaces. And this course takes exploitation to new heights. You’ll dive into secure code review, bypassing authentication, and advanced web app exploitation to uncover vulnerabilities that evade traditional testing.
As defenses become stronger, attackers innovate. This course explores how adversaries evade EDR and antivirus tools, establish covert persistence, and slip through SIEM monitoring. By learning these techniques, you can anticipate and counter advanced threat actor behaviors.
Not all battles are offensive. This course empowers SOC analysts to detect and investigate sophisticated threats using log analysis, SIEM tuning, and incident investigation. With a focus on practical defensive workflows, it equips security teams to respond quickly and effectively under pressure.
If you’re just beginning your journey into offensive security, this foundational course provides hands-on experience in penetration testing. Using Kali Linux, you’ll gain confidence in network and web exploitation, vulnerability identification, and basic attack methodologies.
From entry-level professionals building your foundation, to seasoned specialists pushing into advanced exploit development, Black Hat MEA’s 2025 training program is intentionally diverse. These courses are designed to help you grow into a confident, battle-ready professional who can defend organisations against ever-changing threats.
And because every training is deeply immersive and instructor-led, you walk away with experience that really sticks – not just a tick-box certification to add to your CV.
Seats in these trainings are limited, and they fill quickly every year. This is your chance to train with the best – so we recommend you pre-register now to secure your seat.
The 2025 training courses at Black Hat MEA represent the cutting edge of cybersecurity education. You’ll practice critical skills at the highest level, guided by leaders in the field. Get serious about taking your skills further – and we promise it’ll be fun, too.
Join the newsletter to receive the latest updates in your inbox.
Automation has become an adversary. In today’s bot-driven landscape, blue teams must think like attackers – predicting intent before it strikes.
Read More
Red teaming reveals the blind spots compliance can’t. Discover how offensive testing builds true cyber resilience beyond tools and checklists.
Read More
In the Middle East, boards are driving a governance-first pivot in cybersecurity – with new data on investments and budget growth.
Read More