Admin
Admin
Edu Management
Edu Management
Learner
Learner
Boost Security Training!
Boost Security Training!



OFFen CAMP Service Modules
All-In-One security training platform Builds real growth experience
You can’t defend against zero-day attacks! Get structured training in security education, CTF challenges, and real-world exercises—all essential for managing cyber threats
You can’t defend against zero-day attacks! Get structured training in security education, CTF challenges, and real-world exercises—all essential for managing cyber threats
EDU
EDU
Security Education
Security Education
Curriculum tailored to learning levels
Curriculum tailored to learning levels
Track individual learner performance
Track individual learner performance
Create training environments with VM instances
Create training environments with VM instances
Get solution guidance from white-hat hackers
Get solution guidance from white-hat hackers
Analyze strengths and TTP patterns by learner
Analyze strengths and TTP patterns by learner



Wargame
Wargame
War Game
High-level problems and solutions by type provided
High-level problems and solutions by type provided
Training to logically structure the solution process
Training to logically structure the solution process
Self-directed learning motivation through live competition
Q&A with White Hat Hackers
Q&A with White Hat Hackers
Analytical Diagnosis of Learner Strengths and TTP Statistics
Analytical Diagnosis of Learner Strengths and TTP Statistics



CTF
CTF
Capture The Flags
Capture The Flags
High-quality challenges by type, with solutions
Rankings by individual and team scores
Rankings by individual and team scores
Robust anti-cheating management
Robust anti-cheating management
Fast support for issue resolution
Post-event surveys to assess CTF performance
Post-event surveys to assess CTF performance



CR
CR
Cyber Range
Cyber Range
Coming soon
Train for real-world threats like ransomware and DDoS
Train for real-world threats like ransomware and DDoS
Live exercises based on actual incidents
Live exercises based on actual incidents
Industry-specific red team simulations
Industry-specific red team simulations
Access model answers through post-challenge comments
Access model answers through post-challenge comments
Gamified attack-defense wargame modes



Expert-led, structured security training by
Korea’s top white-hat hackers

Hosted major CTFs
Hosted major CTFs
CODEGATE, CCE, etc.
CODEGATE, CCE, etc.
120+
Training, Lectures, And Researchs
Including government and public sector

30+
Training, Lectures, And Researchs
Including government and public sector

30+
Vulnerabilities and exploits Findings
Apple, CISCO, Naver, etc.

20+
Vulnerabilities and exploits Findings
Apple, CISCO, Naver, etc.

20+
Curriculum
Introduction to Web Hacking: Learning the Real World
Practical Digital Forensics from the Basics
Introduction to Reversing
Reversing analysis method
Reversing theory (practical type)
Anti-reversing technology/ bypassing practice
Malware Analysis
Utilizing emulators
Code virtualization technology
Mastering Malware Analysis for Beginners
Overview of malware creation
Establishment of malware
APT malware production practice
Bypass APT malware AV/EDR detection
Implementation of continuous execution of APT malware
Security Equipment Operation Specialist Training Course
Stack overflow attack type theory and practice
Heap overflow attack type theory and practice
War game problem solving and practice
Solving challenges from hacking competitions
Security incident case study
Incident Response Expert Master Course
Introduction to web browser
Introduction to Javascript engine
Introduction to JIT compiler
Browser bug case study (practical type)
Javascript runtime 1-day vulnerability analysis and practice
Javascript JIT compiler 1-day vulnerability analysis and practice
Practical Threat Intelligence Expert Course
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application
Real-world Penetration Testing Expert Training
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application







Introduction to Web Hacking: Learning the Real World
Practical Digital Forensics from the Basics
Introduction to Reversing
Reversing analysis method
Reversing theory (practical type)
Anti-reversing technology/ bypassing practice
Malware Analysis
Utilizing emulators
Code virtualization technology
Mastering Malware Analysis for Beginners
Overview of malware creation
Establishment of malware
APT malware production practice
Bypass APT malware AV/EDR detection
Implementation of continuous execution of APT malware
Security Equipment Operation Specialist Training Course
Stack overflow attack type theory and practice
Heap overflow attack type theory and practice
War game problem solving and practice
Solving challenges from hacking competitions
Security incident case study
Incident Response Expert Master Course
Introduction to web browser
Introduction to Javascript engine
Introduction to JIT compiler
Browser bug case study (practical type)
Javascript runtime 1-day vulnerability analysis and practice
Javascript JIT compiler 1-day vulnerability analysis and practice
Practical Threat Intelligence Expert Course
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application
Real-world Penetration Testing Expert Training
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application







Introduction to Web Hacking: Learning the Real World
Practical Digital Forensics from the Basics
Introduction to Reversing
Reversing analysis method
Reversing theory (practical type)
Anti-reversing technology/ bypassing practice
Malware Analysis
Utilizing emulators
Code virtualization technology
Mastering Malware Analysis for Beginners
Overview of malware creation
Establishment of malware
APT malware production practice
Bypass APT malware AV/EDR detection
Implementation of continuous execution of APT malware
Security Equipment Operation Specialist Training Course
Stack overflow attack type theory and practice
Heap overflow attack type theory and practice
War game problem solving and practice
Solving challenges from hacking competitions
Security incident case study
Incident Response Expert Master Course
Introduction to web browser
Introduction to Javascript engine
Introduction to JIT compiler
Browser bug case study (practical type)
Javascript runtime 1-day vulnerability analysis and practice
Javascript JIT compiler 1-day vulnerability analysis and practice
Practical Threat Intelligence Expert Course
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application
Real-world Penetration Testing Expert Training
Characteristics of malicious code types and groups
Static/dynamic analysis tool practice
Features of malicious codes from real incidents and analysis methods
Analyze malicious code from actual breaches
Malicious code mock hunting
APT Malware Development Application







OFFen CAMP Client Review
Trusted by Korea’s top national security institutions
Trusted by Korea’s top national security institutions

ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure.
Source: Security News Report, Dec 2024

ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure.
Source: Security News Report, Dec 2024
Easy-to-use custom LMS platform
Even non-experts
Easy-to-use custom LMS platform
Even non-experts
Easy-to-use custom LMS platform
Even non-experts



Only what your company needsFrom curriculum setup to evaluation
Only what your company needsFrom curriculum setup to evaluation
Customize recommended curriculum based on your industry’s needs
Customize recommended curriculum based on your industry’s needs



Clear learner performance at a glanceWith objective skill verification
Clear learner performance at a glanceWith objective skill verification
Evaluate strengths and gaps using individual and team ranking scores
Evaluate strengths and gaps using individual and team ranking scores



Get what you need quicklyIn-platform notifications and Q&A
Get what you need quicklyIn-platform notifications and Q&A
Promote new courses and quickly respond to learner questions and issues
Promote new courses and quickly respond to learner questions and issues
Zero-day simulation training starts
with OFFen CAMP
Highly realistic simulations
Closest to real-world incidents
Highly realistic simulations
Closest to real-world incidents
Optimized virtual labs for any environment
Practice freely without physical limits using OpenStack-based Cloud environments
Practice freely without physical limits using OpenStack-based Cloud environments
Real-case scenarios built for hands-on response
Train with simulations based on actual incidents, from white-box to black-box models
Real-case scenarios built for hands-on response
Train with simulations based on actual incidents, from white-box to black-box models
Dual-perspective training: attacker and defender
Strengthen response skills with live red vs. blue team exercises
Dual-perspective training: attacker and defender
Strengthen response skills with live red vs. blue team exercises
Related Blog Contents

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker
Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker
Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker













