Build real skills in cold storage security
You'll learn how to secure digital assets using hardware wallets, air-gapped systems, and multi-signature setups. These workshops focus on practical application rather than theory, preparing you for situations where mistakes cost real money.

How material delivery works
Learning happens through direct application. You work with actual hardware wallets, configure real security protocols, and troubleshoot problems that mirror what happens in production environments. Each module builds on what you've practiced before, moving from basic key generation to complex recovery scenarios. The balance between explanation and hands-on work shifts based on complexity: foundational concepts get more demonstration time, while advanced configurations require more independent problem-solving.
Guided practice sessions
You receive step-by-step instructions for configuring hardware wallets, generating seed phrases, and testing recovery procedures. Each session includes checkpoint validations where you verify your setup matches security requirements before moving forward.
- Hardware wallet initialization with entropy verification
- Private key derivation and BIP39 seed phrase creation
- Recovery simulation with intentional device failure
- Multi-device backup validation procedures
Independent configuration work
After guided sessions, you tackle more complex scenarios on your own: setting up multi-signature wallets, configuring time-locked transactions, or implementing threshold signature schemes. You have access to reference documentation and troubleshooting guides, but solutions require your own analysis.
- 2-of-3 multisig wallet setup across different hardware vendors
- Air-gapped transaction signing workflows
- Hardware wallet firmware verification and update procedures
- PSBT construction and coordination between signing devices
Try before committing
Sample module access
Get immediate access to our hardware wallet basics module. You'll configure a test wallet, generate a recovery phrase, and simulate a device replacement scenario. This gives you direct experience with our instruction format, pacing, and the actual tools you'll use throughout the program. No credit card needed, no time limit on this specific module.
Start sample module
Full curriculum preview
Browse the complete learning path without restriction. You can review every module description, see required equipment lists, check prerequisite knowledge, and read actual assignment briefs. This transparency lets you assess whether the technical depth matches your current skill level and learning goals before purchasing access.
View curriculum
Track your progress through skill stages
Foundation setup
Complete basic hardware wallet configuration, seed phrase generation, and single-signature transaction workflows.
Security hardening
Implement passphrase protection, verify firmware signatures, set up decoy wallets, and practice secure backup procedures.
Advanced configurations
Build multi-signature setups, coordinate PSBT workflows, configure time-locked transactions, and implement threshold schemes.
Recovery mastery
Execute complete wallet recovery scenarios, troubleshoot derivation path issues, restore from damaged seeds, and validate inheritance procedures.
Extended support options
Standard workshop access includes all core modules, assignment materials, and community forum support. Some learners need more direct guidance, especially when working with institutional security requirements or unique custody architectures.
Premium access adds scheduled consultation sessions with our security engineers, priority response on technical questions, and access to advanced scenario workshops that cover edge cases not included in standard curriculum.
Direct expert consultation
Book 60-minute sessions to review your specific security architecture, troubleshoot complex configurations, or discuss custody solutions for organizational needs.
Priority technical support
Get responses within 4 hours for setup questions, firmware issues, or recovery procedure clarifications instead of standard 24-48 hour forum response times.
Advanced scenario access
Work through complex situations like cross-border inheritance planning, multi-entity custody coordination, and disaster recovery for geographically distributed key holders.
Custom assignment review
Submit your own security setup for detailed analysis and recommendations, including threat modeling feedback and configuration optimization suggestions.
Oskar Lindström
Completed advanced modules
The recovery module saved me from a real problem three months after finishing. I had a hardware wallet firmware corruption and needed to restore from seed. Following the exact procedures we practiced meant I recovered everything without panic or mistakes.
Dmitri Volkov
Premium tier member
Premium consultation helped me design a 3-of-5 multisig structure for our company treasury. The engineer walked through our specific threat model and pointed out security gaps I hadn't considered in my initial design.