Security Platform Tutorials

Step-by-step guides to deploy and master GoPhish and reNgine Cloud platforms.

Security Training and Tutorials

Hands-On Security Training

Our tutorials provide practical, step-by-step guidance for deploying and operating enterprise security platforms. Each tutorial is designed to be completed in 30 minutes or less.

  • Quick Start Guides: Deploy in 5 minutes
  • Best Practices: Industry-tested workflows
  • Video Walkthroughs: Follow along with screen recordings
  • Real-World Examples: Production-ready configurations
Deploy Security Platform →

GoPhish
GoPhish Phishing Simulation Tutorials

Learn how to deploy and run effective phishing simulations for security awareness training.

5 Minute Setup

Deploy GoPhish on AWS

Deploy GoPhish Cloud on AWS in 5 minutes using our CloudFormation template. Complete step-by-step deployment guide.

Start Tutorial →
5 Minute Setup

Deploy GoPhish on Azure

Deploy GoPhish Cloud on Azure in 5 minutes using our ARM template. Complete step-by-step deployment guide.

Start Tutorial →
Getting Started

Create Your First Campaign

Step-by-step guide to creating and launching your first phishing simulation campaign with GoPhish Cloud.

Start Tutorial →
Email Setup

Configure SMTP for Email Delivery

Complete guide to configuring SMTP for GoPhish using Amazon SES, SendGrid, or custom mail servers for reliable email delivery.

Start Tutorial →
Best Practices

Email Template Best Practices

Learn best practices for designing effective phishing email templates that test user awareness while maintaining ethical standards.

Start Tutorial →
Advanced

Quarterly Phishing Campaign

Learn how to build progressive quarterly phishing campaigns that adapt to user behavior and track improvement over time.

Start Tutorial →
Advanced

Executive-Targeted Spear Phishing

Test C-level executives with highly personalized phishing campaigns while maintaining discretion and compliance.

Start Tutorial →

reNgine
reNgine Reconnaissance Tutorials

Master automated reconnaissance, vulnerability scanning, and attack surface management.

5 Minute Setup

Deploy reNgine on AWS

Deploy reNgine Cloud on AWS in 5 minutes using CloudFormation. Complete reconnaissance platform with PostgreSQL, Redis, and docker-compose.

Start Tutorial →
5 Minute Setup

Deploy reNgine on Azure

Deploy reNgine Cloud on Azure in 5 minutes using ARM templates. Complete reconnaissance platform with PostgreSQL, Redis, and containers.

Start Tutorial →
Getting Started

Run Your First Reconnaissance Scan

Learn how to configure and execute your first automated reconnaissance scan with reNgine Cloud. Understand scan profiles, results, and exports.

Start Tutorial →
AI Integration

Configure AI-Powered Analysis

Enable GPT-powered vulnerability analysis in reNgine Cloud. Configure OpenAI API, analyze findings, generate reports, and manage costs.

Start Tutorial →
Local AI

GPU Setup for Local LLM (Ollama)

Configure local GPU-accelerated LLMs using Ollama for offline AI analysis in reNgine Cloud. NVIDIA GPU setup and model selection guide.

Start Tutorial →
Bug Bounty

Bug Bounty Reconnaissance Workflow

Optimize your bug bounty hunting with automated reconnaissance and AI-powered vulnerability analysis using reNgine Cloud.

Start Tutorial →
Monitoring

Continuous Subdomain Monitoring

Set up automated reconnaissance to discover new subdomains and detect shadow IT before attackers do with reNgine Cloud.

Start Tutorial →
DevSecOps

CI/CD Pipeline Security Gates

Integrate security scanning into GitHub Actions, GitLab CI, or Jenkins to block insecure deployments with reNgine Cloud.

Start Tutorial →
Enterprise

SIEM Integration for SOC Teams

Stream security events to Splunk, Sentinel, or ELK for centralized monitoring and incident response with HailBytes integration.

Start Tutorial →

Need Help?

Our support team is here to help you succeed with your security programs.