The fast evolution and constant threat of cyber attacks, our ever-growing reliance upon digital processes, and the exponential increase in online data makes cyber security one of the greatest challenges of our time. Despite this, few are equipped with the necessary skills to tackle it. Hacker House was created to close the skills gap quickly, efficiently and effectively. Taught by world-renowned ethical hackers, our students are plunged head-first into real world cyber-attack simulations and are assessed across a variety of practical assignments designed to cover every angle. In short, we teach students how to think, act and move like a hacker – and then outmanoeuvre them. Sadly, this kind of approach did not exist on the market before Hacker House; cyber security qualifications were mostly delivered by large, expensive training firms, relied heavily on theory, and were often out-of-date even before publication. What was critically required was cyber security training that moved as fast as the attackers. Thus, Hacker House was born. Our method not only equips people with the right skills and mindsets, but can train many people at scale. Hacker House initially began with training nights in East London but quickly developed into series of workshops. Soon, this evolved into a four-day, classroom based course called ‘Hands on Hacking’.
Hands-on Hacking™ for Companies
Hands on Hacking teaches in-house staff how to secure company data, intellectual property and digital assets. Rather than paying for expensive and ineffective theory-based content or consulting, we create real-world simulations of attacks on your systems and train your staff how to respond to those attacks. In brief, we enable companies to quickly and cost-effectively train and scale their security teams.
The Hands on Hacking course is made up of modules around core concepts, from intelligence analysts to penetration testing. Taught by real hackers, your employees will learn the skills used by ethical hackers to conduct a variety of assessment activities, and upon completion of each lesson staff will be taught how to launch an attack.
More and more companies are turning to the Hands on Hacking™ course to deliver up to date content, with real world threats, to train teams in classroom, or remote from their laptops. We also offer premium corporate training on request for organizations looking to skill up their entire teams within a week.
Hands-on Hacking™ for Individuals
Hands on Hacking teaches individuals how to secure data, intellectual property and digital assets. We use real world, up-to-date simulations of cyber attacks, enabling you to learn how to respond to them quickly and effectively.
The Hands on Hacking course is made up of modules around core concepts, from intelligence analysts to penetration testing. Taught by real hackers, you will learn the skills used by ethical hackers to conduct a variety of assessment activities, and upon completion of each lesion, you will be taught how to launch an attack.
Hands on Hacking can be taken in class or accessed remotely from your laptop. As more and more companies seek cyber security professionals, the opportunities for employment are enormous.
CEO & Founder
In 2012, Jennifer founded one of London’s leading tech conferences, The Innotech Summit, a high profile event series which brought together key policy makers, corporations, and startups to bridge the gap between legislation and innovative technology. In 2014-2015, the Innotech Network specialised in a series of events around information security and the need for cyber skill. +more
It brought together law enforcement and influential leaders from the Prime Ministers office, Department of Culture and Media, Metropolitan Police for the City of London, Ministry of Defence, and the National Crimes Agency. These events, as well as the community movement of hackers in a house, lead to one of the strongest ethical hacking campaigns in the UK for the endorsement of educating and teaching ethical hacking skills. Her work became most popular during her Tedx Talk in Liverpool “Why ethical hacking is important in a 21st century” which helped encourage policy in the UK around education and cyber skills advocacy in the classroom. Jennifer was also an integral part of various skills campaigns across the UK including speaking in classrooms across London surrounding the issues of cyber bullying, what to do in case of a security breach, and children’s safety online. Through her efforts in legislation, events, and security, Jennifer started Hacker House as a community of hackers in east London in 2014. -less
CTO & Co-Founder
Matthew is a professional hacker with over 15 years experience providing security services to a global client base. He is widely-known for his research on vulnerabilities in North Korea, exploiting the late Prime Minister of Singapore's code and his hacking of Microsoft's “ransomware-proof" computer during 2017. +more
Matthew’s research on exploits powering the WannaCry ransomware, NSA leaks, and Shadow Brokers in 2017 were published to an audience of over 500 million. He is an expert in his field and is highly sought after, to lead long-term engagements that accurately reflect real-world security challenges, simulating attacks on global and high-risk environments. -less
Internationally recognized cybersecurity expert, bestselling author and keynote speaker who has been covered in Forbes, Fortune, and Inc. magazines. Bestselling author of 5-star rated Crytoconomy- Bitcoins, Blockchains, and Badguys. Currently Authoring The Art of Cyber War. +more
Cyber Defense Media Group- Founder & Publisher- Sponsor of the Annual Black Unicorn Awards at Black Hat. Founding Member- US Department of Homeland Security, the National Information Security Group and the OVAL advisory board of MITRE. Entrepreneur and founder of technologies and companies with exits or licenses to Intel/McAfee, Computer Associates, Blackbox Corp, Watchguard, and Hexis Cyber. Gary is the proud son of a US Navy veteran who served on the USS Piper, the USS Toro and the USS Seawolf. -less
Due to the nature of our work not all of our team could be listed here. The cookie monster doesn't work for us, but it would be great if he did! +more
Thank you to all our masked avengers who work tirelessly to support us and for all the hard work on coding, designs, assignments and hacking adventures! -less
We are always on the look out for uniquely talented individuals to join our squadron.INQUIRE