top of page
Image by Shekh Kayes

Upcoming Trainings & Classes

All courses are Pay-What-You-Can.*​

Need a free spot? Email mike@mikeholcomb.com — No reason needed.​

*Excluding sponsored courses (e.g., those hosted by conferences or other organizations).

Kali Linux Workshop for OT/ICS Cybersecurity

November 21, 2025

8 AM - 12 PM ET (New York)

This hands-on workshop walks participants step-by-step through using Kali Linux for use in industrial control system (ICS) and operational technology (OT) environments. Attendees will be provided with custom tools and automated configurations for working with Kali Linux, for both offensive and defensive use, in OT/ICS environments.


Topics include:

  • Building a stable and persistent Kali lab environment for OT testing

  • Integrating GenAI with Kali Linux for automating testing and other help

  • Automated deployment of custom tools for testing in OT/ICS environments

  • Customizing terminal aliases, scripts, and dashboards for quick OT assessments

  • Reporting tools for building a successful OT/ICS penetration testing report


Certificate of Attendance available.

Accelerated OT/ICS Cybersecurity Bootcamp

December 11 - December 12, 2025

8 AM - 5 PM ET (New York)

Industrial Control Systems (ICS) and Operational Technology (OT) run the world around us. Power plants, offshore oil rigs, trains and other transportation systems, manufacturing plants – these are just a few examples of the critical infrastructure that society depends on. Each ICS/OT environment is unique and has specialized security requirements.


Protecting critical infrastructure becomes more important each day as the frequency of cyber attacks and the number of attackers continues to grow. Nation state adversaries are no longer the only ones targeting these specialized environments. Today’s attackers include ransomware groups, hacktivists, cyber mercenaries, and more.


ICS/OT cyber security can seem complicated and even daunting at first, but it does not have to be. This course will help participants understand the fundamentals of how these environments operate and how to secure such specialized networks.


Certificate of Attendance available.

bottom of page