Admin

Admin

Edu Management

Edu Management

Learner

Learner

Boost Security Training!

Boost Security Training!

EDU, CTF, CR

EDU, CTF, CR

EDU, CTF, CR

OFFen CAMP

OFFen CAMP

OFFen CAMP

Everything a security team needs to know

Edu Management

Admin

Boost Security Training!

Learner

OFFen CAMP Service Modules

All-In-One security training platform Builds real growth experience

You cant defend against zero-day attacks! Get structured training in security education, CTF challenges, and real-world exercisesall essential for managing cyber threats

You cant defend against zero-day attacks! Get structured training in security education, CTF challenges, and real-world exercisesall essential for managing cyber threats

EDU

EDU

Security Education

Security Education

Curriculum tailored to learning levels

Curriculum tailored to learning levels

Track individual learner performance

Track individual learner performance

Create training environments with VM instances

Create training environments with VM instances

Get solution guidance from white-hat hackers

Get solution guidance from white-hat hackers

Analyze strengths and TTP patterns by learner

Analyze strengths and TTP patterns by learner

Wargame

Wargame

War Game

High-level problems and solutions by type provided

High-level problems and solutions by type provided

Training to logically structure the solution process

Training to logically structure the solution process

Self-directed learning motivation through live competition

Q&A with White Hat Hackers

Q&A with White Hat Hackers

Analytical Diagnosis of Learner Strengths and TTP Statistics

Analytical Diagnosis of Learner Strengths and TTP Statistics

CTF

CTF

Capture The Flags

Capture The Flags

High-quality challenges by type, with solutions

Rankings by individual and team scores

Rankings by individual and team scores

Robust anti-cheating management

Robust anti-cheating management

Fast support for issue resolution

Post-event surveys to assess CTF performance

Post-event surveys to assess CTF performance

CR

CR

Cyber Range

Cyber Range

Coming soon

Train for real-world threats like ransomware and DDoS

Train for real-world threats like ransomware and DDoS

Live exercises based on actual incidents

Live exercises based on actual incidents

Industry-specific red team simulations

Industry-specific red team simulations

Access model answers through post-challenge comments

Access model answers through post-challenge comments

Gamified attack-defense wargame modes

Expert-led, structured security training by
Korea’s top white-hat hackers

Hosted major CTFs

Hosted major CTFs

CODEGATE, CCE, etc.

CODEGATE, CCE, etc.

0+
0+

120+

Training, Lectures, And Researchs

Including government and public sector

0B+
0B+

30+

Training, Lectures, And Researchs

Including government and public sector

0B+

30+

Vulnerabilities and exploits Findings

Apple, CISCO, Naver, etc.

0+
0+

20+

Vulnerabilities and exploits Findings

Apple, CISCO, Naver, etc.

0+

20+

Curriculum

Introduction to Web Hacking: Learning the Real World

Practical Digital Forensics from the Basics

Introduction to Reversing

Reversing analysis method​

Reversing theory (practical type)​

Anti-reversing technology/ bypassing practice​

Malware Analysis

Utilizing emulators​

Code virtualization technology

Mastering Malware Analysis for Beginners

Overview of malware creation​

Establishment of malware ​

APT malware production practice​

Bypass APT malware AV/EDR detection

Implementation of continuous execution of APT malware

Security Equipment Operation Specialist Training Course

Stack overflow attack type theory ​and practice​

Heap overflow attack type theory ​and practice​

War game problem solving and practice

Solving challenges from hacking competitions ​

Security incident case study​

Incident Response Expert Master Course

Introduction to web browser

Introduction to Javascript engine

Introduction to JIT compiler​

Browser bug case study (practical type)​

Javascript runtime 1-day vulnerability analysis and practice​

Javascript JIT compiler 1-day vulnerability analysis and practice​

Practical Threat Intelligence Expert Course

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

Real-world Penetration Testing Expert Training

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

Introduction to Web Hacking: Learning the Real World

Practical Digital Forensics from the Basics

Introduction to Reversing

Reversing analysis method​

Reversing theory (practical type)​

Anti-reversing technology/ bypassing practice​

Malware Analysis

Utilizing emulators​

Code virtualization technology

Mastering Malware Analysis for Beginners

Overview of malware creation​

Establishment of malware ​

APT malware production practice​

Bypass APT malware AV/EDR detection

Implementation of continuous execution of APT malware

Security Equipment Operation Specialist Training Course

Stack overflow attack type theory ​and practice​

Heap overflow attack type theory ​and practice​

War game problem solving and practice

Solving challenges from hacking competitions ​

Security incident case study​

Incident Response Expert Master Course

Introduction to web browser

Introduction to Javascript engine

Introduction to JIT compiler​

Browser bug case study (practical type)​

Javascript runtime 1-day vulnerability analysis and practice​

Javascript JIT compiler 1-day vulnerability analysis and practice​

Practical Threat Intelligence Expert Course

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

Real-world Penetration Testing Expert Training

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

Introduction to Web Hacking: Learning the Real World

Practical Digital Forensics from the Basics

Introduction to Reversing

Reversing analysis method​

Reversing theory (practical type)​

Anti-reversing technology/ bypassing practice​

Malware Analysis

Utilizing emulators​

Code virtualization technology

Mastering Malware Analysis for Beginners

Overview of malware creation​

Establishment of malware ​

APT malware production practice​

Bypass APT malware AV/EDR detection

Implementation of continuous execution of APT malware

Security Equipment Operation Specialist Training Course

Stack overflow attack type theory ​and practice​

Heap overflow attack type theory ​and practice​

War game problem solving and practice

Solving challenges from hacking competitions ​

Security incident case study​

Incident Response Expert Master Course

Introduction to web browser

Introduction to Javascript engine

Introduction to JIT compiler​

Browser bug case study (practical type)​

Javascript runtime 1-day vulnerability analysis and practice​

Javascript JIT compiler 1-day vulnerability analysis and practice​

Practical Threat Intelligence Expert Course

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

Real-world Penetration Testing Expert Training

Characteristics of ​malicious code types and groups​

Static/dynamic analysis tool practice​

Features of malicious codes from real incidents and analysis methods​

Analyze malicious code from actual breaches

Malicious code mock hunting​

APT Malware Development Application

OFFen CAMP Client Review

Trusted by Koreas top national security institutions

Trusted by Koreas top national security institutions

ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure.

Source: Security News Report, Dec 2024

ENKI WhiteHat received a commendation from the Army Chief of Staff for its role in designing and building the Army Cyber Training ISP infrastructure.

Source: Security News Report, Dec 2024

Easy-to-use custom LMS platform
Even non-experts

Easy-to-use custom LMS platform
Even non-experts

Easy-to-use custom LMS platform
Even non-experts

lms 학습 관리 시스템
lms 학습 관리 시스템
lms 학습 관리 시스템

Only what your company needsFrom curriculum setup to evaluation

Only what your company needsFrom curriculum setup to evaluation

Customize recommended curriculum based on your industrys needs

Customize recommended curriculum based on your industrys needs

Clear learner performance at a glanceWith objective skill verification

Clear learner performance at a glanceWith objective skill verification

Evaluate strengths and gaps using individual and team ranking scores

Evaluate strengths and gaps using individual and team ranking scores

Get what you need quicklyIn-platform notifications and Q&A

Get what you need quicklyIn-platform notifications and Q&A

Promote new courses and quickly respond to learner questions and issues

Promote new courses and quickly respond to learner questions and issues

Zero-day simulation training starts
with OFFen CAMP

Highly realistic simulations
Closest to real-world incidents

Highly realistic simulations
Closest to real-world incidents

Optimized virtual labs for any environment

Practice freely without physical limits using OpenStack-based Cloud environments

Practice freely without physical limits using OpenStack-based Cloud environments

Real-case scenarios built for hands-on response

Train with simulations based on actual incidents, from white-box to black-box models

Real-case scenarios built for hands-on response

Train with simulations based on actual incidents, from white-box to black-box models

Dual-perspective training: attacker and defender

Strengthen response skills with live red vs. blue team exercises

Dual-perspective training: attacker and defender

Strengthen response skills with live red vs. blue team exercises

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.