Skip to content

⭐ Hacker Training | Home

This website is maintained by Omar Santos and includes numerous resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more. It includes information about my books, video courses, blogs, tutorials, labs, walkthroughs, and other resources. It has information about AI agents, agentic Retrival Augmented Generation (RAG), AI Security, and other artificial intelligence (AI) topics.

Hands-on Labs

I have numerous cybersecurity and AI labs that I have created over the years. You can find them in my GitHub Repository, WebSploit Labs and Hacking Scenarios. I add more of them on a regular basis so check those resources often.

Foundational Cybersecurity Resources in O'Reilly

This section provides a curated list of resources that delve into foundational cybersecurity concepts, frequently explored in my O'Reilly training sessions and other educational offerings.

Live Training

Upcoming Live Cybersecurity and AI Training in O'Reilly: Register before it is too late (free with O'Reilly Subscription)

Reading List

Despite the rapidly evolving landscape of AI and technology, these books offer a comprehensive roadmap for understanding the intersection of these technologies with cybersecurity:

Video Courses

Enhance your practical skills with these video courses designed to deepen your understanding of cybersecurity:



  • Defending and Deploying AI (video) This course provides a comprehensive, hands-on journey into modern AI applications for technology and security professionals, covering AI-enabled programming, networking, and cybersecurity to help learners master AI tools for dynamic information retrieval, automation, and operational efficiency. It dives deeply into securing generative AI, addressing critical topics such as LLM security, prompt injection risks, and red-teaming AI models. Participants also learn how to build secure, cost-effective AI labs at home or in the cloud, with practical guidance on hardware and software choices. Finally, the course explores AI agents and agentic RAG for cybersecurity, demonstrating how large language models can be applied to both offensive and defensive operations through real-world examples and hands-on labs. Available on O'Reilly


  • Securing Generative AI Explore security for deploying and developing AI applications, RAG, agents, and other AI implementations Learn hands-on with practical skills of real-life AI and machine learning cases Incorporate security at every stage of AI development, deployment, and operation Available on O'Reilly


  • The Art of Hacking
    A series of video courses offering over 26 hours of training in ethical hacking and penetration testing techniques. Ideal for those preparing for certifications like OSCP or CEH.
    Visit The Art of Hacking


  • Certified Ethical Hacker (CEH), Latest Edition
  • Very comprehensive! Over 19 hours! Available on O'Reilly




Additional Resources

These resources are designed to provide a solid foundation in cybersecurity concepts while also exploring the implications of emerging technologies like AI.

Note: This website is a work in progress and will be updated regularly.