Wait a minute..


The complete fundamental Hacking Training Program to prepare your future career as a professional Pentester.

Next Batch Coming Soon

Why Pentester?

Along with the rapid development of digital technology and IT infrastructure, the need for a Professional Pentester is also increasing. A Pentester is a person who performs penetration tests, which is to perform a series of tests on the security of a system, application, or network, look for gaps or weaknesses, and report it for remediation.

Regular Training vs Bootcamp

Regular Training

  • Takes more time ( > 2 months )
  • Full day lecture in whole weeky
  • The theme sometimes not focus
  • More theoretical
  • Upgrade competency purpose


  • Takes less time ( < 2 months )
  • Can arrange more flexible
  • The material more specific and focus
  • Hands-on and applicable
  • Prepared to be a talent ready

Why Hacktrace?

Hacktrace is the solution to answer the needs and gap within the Learning Management System platform that combine the Training Path, Syllabus, Training Material, and Hacktrace Ranges and also fully support with international certified experience trainers that already tested in years based on real cases in clients as well.

1.5 Months Live Virtual Classess
International Certified Trainer
Practicing Real Case Scenario With Offensive Lab
Pormising Job Opportunities and Career Paths (Best Graduates Will Be Recruited Immediately and Bootcamp Fees Refunded)
Easy Payment Methods
Lots of Group Discussions and Practice Time
Limited Student / Batch
Join the Local and Overseas Hacker Comunity
Class delivered in Indonesian

What Will You Learn

  • Cybersecurity Introduction
  • Kali Linux Introduction
  • Bash Scripting
  • Student Exercise
  • Passive Information Gathering
  • Student Exercise
  • Active Information Gathering
  • Student Exercise
  • OWASP TOP 10 Introduction
  • Using Components with Known Vulnerabilities
  • Security Missconfiguration
  • Sensitive Data Exposure
  • Cross Site Scripting
  • Student Exercise
  • Injection
  • Malicious File Upload
  • Student Exercise
  • Broken Access Control
  • Broken Authentication
  • Bruteforce and Password Spraying
  • Student Exercise
  • Backdooring Web Application
  • Student Exercise
  • Reverse and Bind Shell Technique
  • Student Exercise
  • Public Exploit Usage against Web and Service
  • Metasploit Framework
  • Student Exercise
  • Linux and Windows Privilege Escalation
  • Student Exercise
  • Mobile Application Security Introduction
  • Android Application Fundamental
  • Mobile Application Scanner Usage
  • Reverse Engineering APK
  • Student Exercise
  • Bypassing Root Detection
  • Student Exercise
  • Capturing network traffic
  • Bypassing SSL Pinning
  • Student Exercise
  • Application Storage Exploitation
  • Application Activities Exploitation
  • Student Exercise
  • Risk Calculation Introduction
  • Report Writing
  • Student Exercise

Our Trainer


Experience more than 3 years learning about programming, 5 years in information security. Cybersecurity researcher focus on exploit development (Windows Application & Web Application).

Hanny Haliwela, OSCP, OSCE, OSEE

He experience is more than 8 years working and doing research in the field of information security. He also has an interest in Vulnerability research, Exploit development, reverse engineering, python, hacking Method, digital forensic, find unique attack -vectors, mind mapping, IT security community, IT security research based on open source.

Royke Tobing, GWAPT, GCIH, CITP

He experience more than 16 years in intelligence and law enforcement fields, learning about programming application and 3 years in network security. Information Security and Ethical Hacking trainer.

Thomas Gregory, OSCP, OSCE, ISO 27001:2013 LA, GCIA, OSEE

As a director and a partner of PT. Spentera, responsible for all areas of IT security services and products of Spentera. This includes identification of security trends, selection of technology/development platforms and methodology, prioritization of security project initiatives and delivery schedules, and oversight of the customer experience. He also communicate Spentera security strategy to investors, partners, and customers.

Bootcamp Schedule

Next Batch Coming Soon

Monday, Wednesday, Friday
14.00 - 17.00
Saturday Group Discussion
09.00 - 12.00

Tuition & Payment Methods

Full payment

Rp 30.000.000

Promo Early Bird

Promo Early Bird has ended

Card image cap

Cash 100%

Card image cap

Program Cicilan

HACKTRACE also provide you a comfortable option through an Installment Program. For those who are interested with this payment method, HACKTRACE collaborated with KoinWorks which is the provision of installment facility without credit card through KoinPintar Application. By using this application to purchase our various trainings, Buyers feel free to choose the "Instalmment Period" on the Installment Program ranging from three (3) months to twelve (12) months

Learn More
Card image cap

Income Share Agreement (ISA)

For further information please contact Hacktrace Team.

Contact Us
Please login here..