EDU, CTF, CR

Everything a security team needs to know

OFFen CAMP

Everything a security team needs to know

OFFen CAMP

Everything a security team

needs to know

OFFen CAMP

OFFen CAMP Service Modules

OFFen CAMP Service Modules

All-In-One security training platform

Builds real growth experience

You can’t defend against zero-day attacks!
Get structured training in security education, CTF challenges, and real-world exercises

—all essential for managing cyber threats

Security Education

Security Education

EDU

EDU

Curriculum tailored to learning levels

Create training environments with VM instances

Track individual learner performance

Get solution guidance from white-hat hackers

Analyze strengths and TTP patterns by learner

Capture The Flags

Capture The Flags

CTF

CTF

High-quality challenges by type, with solutions

Rankings by individual and team scores

Robust anti-cheating management

Fast support for issue resolution

Post-event surveys to assess CTF performance

Cyber Range

Cyber Range

CR

CR

Train for real-world threats like ransomware and DDoS

Live exercises based on actual incidents

Industry-specific red team simulations

Gamified attack-defense wargame modes

Access model answers through post-challenge comments

Expert-led, structured security training by

Korea’s top white-hat hackers

20+

20+

20+

Hosted major CTFs

Hosted major CTFs

(CODEGATE, CCE, etc.)

₩4B+

₩4B+

₩4B+

Training, Lectures,

And Researchs

(Including government and public sector)

Training, Lectures,

And Researchs

(Including government and public sector)

120+

120+

120+

Vulnerabilities and exploits

Findings

Vulnerabilities and exploits

Findings

(Apple, CISCO, Naver, etc.)

  • Web Hacking​

    Understanding web hacking​

    Web hacking tools​

    Gathering information method​

    SQL Injection

    Server-side vulnerability​

    Web vulnerability analysis and attack practice

    CTF Lab​

  • Reversing Engineering​

    Introduction to Reversing

    Reversing analysis method​

    Reversing theory (practical type)​

    Anti-reversing technology/ bypassing practice​

    Malicious Code analysis​

    Utilizing emulators​

    Code virtualization technology

  • System Hacking​

    Stack overflow attack type theory ​and practice​

    Heap overflow attack type theory ​and practice​

    War game problem solving and practice

    Solving challenges from hacking competitions ​

    Security incident case study​

  • Web Browser Hacking​

    Introduction to web browser

    Introduction to Javascript engine

    Introduction to JIT compiler​

    Browser bug case study (practical type)​

    Javascript runtime 1-day vulnerability analysis and practice​

    Javascript JIT compiler 1-day vulnerability analysis and practice​

  • Make and Learn Malware​

    Overview of malware creation​

    Establishment of malware ​

    APT malware production practice​

    Bypass APT malware AV/EDR detection

    Implementation of continuous execution of APT malware

    APT malware production application​

  • Malicious Code Analysis​

    Characteristics of ​malicious code types and groups​

    Static/dynamic analysis tool practice​

    Features of malicious codes from real incidents and analysis methods​

    Analyze malicious code from actual breaches

    Malicious code mock hunting​

사이버공격방어대회
화이트햇 콘테스트
ctf 강의, 해킹 강의
ctf 강의, 해킹 강의
defcon 32 ctf

OFFen CAMP Client Review

OFFen CAMP Client Review

Trusted by Korea’s top national security institutions

Trusted by Korea’s top national security institutions

"ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure."

"ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure."

Source: Security News Report, Dec 2024

Easy-to-use custom LMS platform

Even non-experts

lms 학습 관리 시스템

Only what your company needs

From curriculum setup to evaluation

Only what your company needs

From curriculum setup to evaluation

Only what your company needs

From curriculum setup to evaluation

Customize recommended curriculum based on your industry’s needs

Customize recommended curriculum based on your industry’s needs

Customize recommended curriculum based on your industry’s needs

Clear learner performance at a glance

With objective skill verification

Clear learner performance at a glance

With objective skill verification

Clear learner performance at a glance

With objective skill verification

Evaluate strengths and gaps using individual and team ranking scores

Evaluate strengths and gaps using individual and team ranking scores

Evaluate strengths and gaps using individual and team ranking scores

ctf 통합랭킹
ctf 문의

Get what you need quickly

In-platform notifications and Q&A

Get what you need quickly

In-platform notifications and Q&A

Get what you need quickly

In-platform notifications and Q&A

Promote new courses and quickly respond to learner questions and issues

Promote new courses and quickly respond to learner questions and issues

Promote new courses and quickly respond to learner questions and issues

Zero-day simulation training starts with OFFen CAMP

Zero-day simulation training starts with OFFen CAMP

Highly realistic simulations

Closest to real-world incidents

🕹️

Optimized virtual labs for any environment

Optimized virtual labs for any environment

Practice freely without physical limits using OpenStack-based Cloud environments

Practice freely without physical limits using OpenStack-based Cloud environments

🛠️

Real-case scenarios built for hands-on response

Real-case scenarios built for hands-on response

Train with simulations based on actual incidents, from white-box to black-box models

Train with simulations based on actual incidents, from white-box to black-box models

🛡️

Dual-perspective training: attacker and defender

Dual-perspective training: attacker and defender

Strengthen response skills with live red vs. blue team exercises

Strengthen response skills with live red vs. blue team exercises

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before
a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

ENKI WhiteHat provides unparalleled security

with unrivaled expertise.

Contact

biz@enki.co.kr

+82 2-402-1337

167, Songpa-daero, Songpa-gu, Seoul, Republic of Korea
(Tera Tower Building B, Units 1214–1217)

ENKI WhiteHat Co., Ltd.

Copyright © 2025. All rights reserved.

공격자 관점의 깊이가 다른 보안을 제시합니다.

Contact

biz@enki.co.kr

02-402-1337

서울특별시 송파구 송파대로 167
(테라타워 B동 1214~1217호)

ENKI WhiteHat Co., Ltd.

Copyright © 2025. All rights reserved.

ENKI WhiteHat provides unparalleled security

with unrivaled expertise.

Contact

biz@enki.co.kr

+82 2-402-1337

167, Songpa-daero, Songpa-gu, Seoul, Republic of Korea
(Tera Tower Building B, Units 1214–1217)

ENKI WhiteHat Co., Ltd.

Copyright © 2025. All rights reserved.