Skip to main content

Real Skills for Modern OS Security

We started Shrktool because too many security programs skip the fundamentals. Our training focuses on practical operating system hardening, threat detection, and incident response—not surface-level theory. We teach what actually works in production environments.

View Programs

Building Security Education Since 2019

Started in a shared office space in Pennsville with three instructors and a clear mission. We've grown by listening to what organizations actually need.

2019

Founded in New Jersey

Three former system administrators noticed a gap. Security training was either too academic or too shallow. We started teaching weekend workshops on Linux hardening and Windows security auditing. First cohort had seven students.

2021

Expanded Curriculum

Added specialized tracks for network defense and endpoint protection. Partnered with regional IT departments to understand real-world challenges. Our students started getting jobs faster than we expected.

2023

Lab Infrastructure Upgrade

Built out dedicated training labs with virtual environments that mirror enterprise setups. Students can now break things safely and learn from mistakes. This changed how we teach incident response.

2025

Current Programs Running

We're now running quarterly cohorts with enrollment opening for Fall 2025 and Winter 2026. Still focused on hands-on training with real systems. Class sizes stay small so instructors can actually help when students get stuck.

Instructor Greta Vollmer during practical lab session

Learn From People Who've Done It

Greta spent eight years hardening hospital networks before joining us. She knows what happens when security fails—and more importantly, how to prevent it. Her approach is direct: start with fundamentals, build systematically, test everything.

Our other instructors come from similar backgrounds. Sven worked in financial systems security. Marcus handled incident response for a regional ISP. They don't just teach concepts—they share actual scenarios they've handled.

Teaching Philosophy: We believe the best way to learn security is by doing it wrong first, then understanding why. Our labs are designed for mistakes. Students configure vulnerable systems, then attack them. This teaches more than any lecture could.

How We Actually Teach This Stuff

We've tried different approaches over the years. This structure works because it mirrors how you'd actually learn on the job—except with guidance and a safe environment to fail.

1

Foundation Work

Start with OS architecture, user permissions, and file systems. Build a vulnerable test system. Understand what normal operations look like before trying to secure anything.

2

Hardening Practice

Apply security baselines to your test system. Students work through CIS benchmarks and security guides. Then we test whether the hardening actually works by trying to break in.

3

Monitoring Setup

Configure logging and monitoring tools. Learn to spot unusual activity in system logs. Practice correlating events across multiple systems. This part takes longer than people expect.

4

Incident Scenarios

Respond to simulated security events. Figure out what happened, contain the issue, document findings. Work through realistic scenarios based on actual incidents we've seen.

Ready to Start Learning?

Our next enrollment period opens for Fall 2025 cohorts starting in September. Classes run 16 weeks with two evening sessions per week plus lab time. We keep cohorts to 12 students maximum because quality instruction requires time.

Programs begin September 2025 and January 2026. Application review typically takes two weeks. We look for people with basic IT experience who want to specialize in security—not necessarily those with security backgrounds already. Prior system administration work helps but isn't required.

See Program Details Students working through practical security exercises in training lab