[themeum_title position=”left” title=”Technical Training I” size=”28″ title_weight=”600″ subtitle=”Malware Analysis & Reverse Engineering” subtitle_size=”26″ subtitle_weight=”500″]
![PBCrichton-Malware-Hazard-Symbol](https://i0.wp.com/nanosec.asia/wp-content/uploads/2018/08/PBCrichton-Malware-Hazard-Symbol.png?fit=150%2C150&ssl=1)
[themeum_title position=”left” title=”Technical Training II” size=”28″ title_weight=”600″ subtitle=”SAP Cyber-Security for IT Security Practitioners” subtitle_size=”26″ subtitle_weight=”500″]
![1200px-SAP_2011_logo.svg](https://i0.wp.com/nanosec.asia/wp-content/uploads/2018/08/1200px-SAP_2011_logo.svg_.png?fit=150%2C77&ssl=1)
[themeum_title position=”left” title=”Technical Training III” size=”28″ title_weight=”600″ subtitle=”Burp Extension Development Training” subtitle_size=”26″ subtitle_weight=”500″]
![BurpSuite](https://i0.wp.com/nanosec.asia/wp-content/uploads/2018/08/BurpSuite.png?fit=150%2C150&ssl=1)
[themeum_title position=”left” title=”Technical Training IV” size=”28″ title_weight=”600″ subtitle=”Practical Android App Reversing and Web Hacking” subtitle_size=”26″ subtitle_weight=”500″]
![android](https://i0.wp.com/nanosec.asia/wp-content/uploads/2018/08/android.png?fit=300%2C157&ssl=1)