Security Courses

Improve your fuzzing and software security skills through our flexible and self-paced online courses.

  • $2,400

Rust Security Audit and Fuzzing

Learn how to audit Rust code and find bugs automatically using fuzz testing.
 🎞️ 80+ videos / ⏱️ 9+ hours / 👨‍💻 25+ exercises

  • $2,400

Go Security Audit and Fuzzing

Learn how to audit Go code and find bugs automatically using fuzz testing.
 🎞️ 90+ videos / ⏱️ 8+ hours / 👨‍💻 25+ exercises

  • $2,400

WebAssembly Reversing and Dynamic Analysis

Learn how to reverse wasm module, bypass obfuscation and perform in-depth analysis.
 🎞️ 60+ videos / ⏱️ 8+ hours / 👨‍💻 25+ exercises

  • $1,300

C/C++ Whitebox Fuzzing

Learn how to use famous fuzzing framework to find bugs inside C/C libraries.
🎞️ 40+ videos / ⏱️ 5+ hours / 👨‍💻 25+ exercises

  • $400

1-on-1 coaching meeting (60 minutes)

Private one-on-one meeting with me to answer all of your questions during a 60-minute video session. Looking forward to talking to you!

  • Waitlist

Solidity & Ethereum Smart Contract Security Audit and Fuzzing

Learn which kind of security vulnerabilities/bugs can be found inside Ethereum smart contract and in particular in Solidity code, how to detect them statically and automatically using different audit and fuzzing techniques.

  • $4,400

BUNDLE - Reversing Modern Binaries: Practical Rust & Go Analysis

Master reverse engineering of Rust and Go binaries in this 4‑day hands‑on training. Learn to analyze control flow, runtime internals, and obfuscated malware using tools like IDA, Ghidra, GDB. Develop advanced skills to reverse modern, compiled malware samples. ⚠️ This training is currently in pre‑sales and will be released in 3 months.

  • $3,600

Fuzzing Windows Userland Applications

Master fuzzing on Windows with tools like winAFL, Jackalope, and Wtf. In this 3-day certified training, you’ll build harnesses, triage real-world vulnerabilities, analyze coverage, and apply snapshot fuzzing on apps like WinRAR, IrfanView, and Assault Cube. ⚠️ This training is currently in pre-sales and will be released in 3 months.

What Students are Saying...

A very well designed training with tons to learn. Most importantly the guidance and workflow from Patrick makes this training a must have when entering the Wasm space.

The course contains a lot of information to be completely processed but it's well built and very practical! My favorite part was about fuzzing!

Learned so much about modern WebAssembly security. The lecture and exercise learning format is excellent! It's very worth it and I highly recommend Patrick's course!

This course is pure gold. I wasted weeks looking for an alternative instead of taking this course directly. Huge mistake on my end because Patrick's slides are awesome and teach everything you need to know about for Rust security.

Patrick is very skilled in his art. This course covers so much to get into the world of fuzzing. This course even covers how Radamsa can be used from a pentesting perspective. Highly recommend this course to anyone looking to learn more about fuzzing open source applications! 

Essential training covering all shorts of issues and scenarios. A well rounded training that does not leave anything uncovered. A great place to start when entering Rust space.

Great training, covering a lot of information from beginner level and then building up slowly up to advanced stuff.

Really good overview of techniques, live examples of common tools is super helpful and provides a good basis for building on knowledge gained in the training.

Great course, not just showing how to use some fuzzing tools... it goes into detail showing the process and workflow required to fuzz a target.

FREE Resources & Trainings

Enter your email to receive special deals and a bundle of awesome resources. 100% free - 100% awesome. 👇

You're signing up to receive emails from FuzzingLabs Academy

Meet Your Instructor

Hey! 👋 My name is Patrick and I'm the founder of FuzzingLabs, a research-oriented security company specializing in fuzzing, vulnerability research, and reverse engineering.

Over time, we found hundreds of bugs and presented our work at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, Devcon, EthCC, RingZer0, ToorCon, hack.lu, NorthSec, Microsoft DCC, etc.

You can read more about me by clicking here.