Previous

Training & Workshops

If you know nothing, you have to believe everything

Employees are a company's most valuable asset, which is why it is crucial to continuously invest in their training and development. I offer technically demanding workshops on Windows internals, malware development, endpoint security evasion, and reverse engineering—for both red and blue teams. Like my blog, my workshops stand out from the crowd thanks to their sound scientific foundations, clear structure, and technical depth. Instead of blindly copying and using tools without reflection, I give participants the understanding they need to independently grasp highly complex topics.

Endpoint Security Insights: Shellcode Loaders & Evasion Fundamentals

Modern endpoint detection and response (EDR) systems are becoming increasingly sophisticated – but anyone who really understands their mechanisms can bypass them effectively. My training/workshop “Endpoint Security Insights: Shellcode Loaders & Evasion Fundamentals” teaches exactly this knowledge: in a structured, hands-on and in-depth debugging way. Learn how to develop evasive shellcode loaders step by step and how to bypass EDR detections through in-depth understanding instead of blind trial and error.

Learn how modern Endpoint Detection and Response (EDR) systems work and how to bypass them in my training/workshop. Through practical exercises, in-depth debugging and a structured approach, we develop evasive shellcode loaders and analyze the mechanisms behind EDR detections.

📍 Location: Innsbruck, Austria

📅 Date: 23.09-26.09.2025 [sold out]

ℹ️ Further course dates will be announced in fall 2025.

🎯 Format: 4-day in-person training (max. 11 participants)

👉 All information about the course: Click here

I look forward to your participation and to an exciting and instructive training/workshop session! If you have any general questions about course material, content, labs, organization, etc., if you are unsure whether the training/workshop is right for you, or if you just want to register for the training/workshop, feel free to contact me at workshop@redops.at. I'll be happy to help!


Notice (Background Check & NDA)

Please note that a background check is conducted for each inquiry, and we reserve the right to decide on participant admission on an individual basis. In addition, all admitted participants acknowledge that they must sign a binding NDA (non-disclosure agreement) before the workshop begins. This is primarily intended to protect the provided training materials as well as the organizations involved. Without a signed NDA, participation in the course or the purchase of the course materials is unfortunately not possible.

Why train with RedOps?

We invest a great deal of time in teaching and research, and anyone who knows our founder, Daniel Feichter, is aware of his attention to detail and passion for teaching. One of his great strengths is his ability to prepare and communicate complex knowledge in a way that even a layperson can understand and apply. Anyone who knows Daniel, reads his blog posts or listens to his conference presentations will know that his focus is on imparting knowledge in a sound and understandable way. His aim is not to work quantitatively, but to deliver high quality workshop content.

Responsibility Research Quality
  • Anyone who uses Offensive Security Services and deliberately exposes themselves to an ethical hacker attack should do so with a partner they can trust. We keep all information strictly confidential and have 100% integrity in everything we do.

  • IT security is not a product, it is a continuous learning process. That's why we invest a lot of time in education and research. We have had the opportunity to present our findings on endpoint security at several IT security conferences.

  • With Red Team Services, we have turned our passion into our core competency. We do not sell products or licences, but live from our expertise in IT security. For us, quality comes before quantity.