SEO Friendly

Spentera Hacking Academy

As a part of Indonesia’s leading cybersecurity consulting company, Spentera Hacking Academy offers hacking training programs to assist practitioners in navigating through the evolving nature of cyberattacks. Our programs include the most comprehensive, hands-on, and technically challenging training, such as penetration testing, vulnerability assessment, and digital forensics. We deliver our courses with facilitators who have had years of experience in handling cybersecurity cases and uniquely crafted syllabuses and products for both beginners and professionals.


Our Programs

Our training includes a wide range of courses, starting from the basics that serve the baseline skills to custom courses that cover more specific cases.

Read more

Our Popular Training

  • A hacking course where participants learn how to penetrate a server to mitigate the servers against attacks in cyberspace.

    Hacking Playground
  • In this course, participants will have understanding about OWASP TOP 10 and deep learning how to take advantage of SQL Injection, XSS Scripting, as well as understanding the vulnerabilities related to remote and local File Inclusion.

    Web Hacking
  • A course to explore tools and techniques for in-depth malware analyses. Participants will learn to use and explore the tools for system and network monitoring, disassembling, and debugging.

    Reverse Engineering Malware
  • A course to learn the skills needed for debugging on Windows 32-bit applications, exploitation techniques, operating system protection mechanisms and how to bypass them, and writing exploits.

    The Art of Windows Exploitation
  • A course to understand the nature of social engineering and how the attacks occur. Participants learn to perform and handle different social engineering scenarios from imitation to exploitation.

    Social Engineering
  • In this course, participants will learn how to use open-source tools to analyze an intrusion in the network.

    Intrusion Analysis

Our Clients

EC-Council Certification

  • A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker

    Certified Ethical Hacker
  • The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting

    Certified Network Defender
  • Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics

    Computer Hacking Forensic Investigator
  • The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

    Certified Secure Computer User
  • EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

    EC-Council Certified Security Analyst
  • E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling

    EC-Council Certified Incident Handler