Onboarding sessions
Last updated: May 12, 2026
Fluid Attacks customers have access to free onboarding sessions led by our Education Specialists. These sessions help your team understand the platform, adopt key security workflows, configure policies, use integrations, and make the most of product updates.
You can request one or more sessions according to your current needs. You can also request the complete onboarding package, which covers the main topics in a structured sequence. If your team needs more time after a session, additional meetings may be scheduled to continue the discussion or go deeper into specific points.
Available sessions
General onboarding
Duration: 1 hour
This introductory session helps your team become familiar with Fluid Attacks' Continuous Hacking solution and the main steps for getting started with the platform. It covers account access, repository import, team invitations, platform navigation, and the basic workflow for reviewing vulnerabilities. Participants learn to explore vulnerability details, understand where vulnerabilities are located, assign specific treatments (including remediation work), and use available help options, such as AI-generated fix guidance and expert support.
Related documentation:
- Sign up
- Import repositories
- Invite team
- Explore details
- Define assignees
- Fix code with AI
- Update dependencies
- Expert help
- Continuous Hacking methodology
- Platform's interface and sections
Policies and CI Gate
Duration: 1 hour
This session explains how to guide vulnerability management and enforce security decisions in your development workflow. Participants learn how to define policies for vulnerability acceptance, security gates, and remediation prioritization, as well as how those decisions affect CI Gate executions. The session covers build-breaking behavior, strict and tolerant modes, severity thresholds, grace periods, technical debt settings, and the impact of accepted vulnerabilities. Teams also learn how to prioritize vulnerabilities using attributes such as severity, exploitability, usage, transitivity, and estimated fixing cost, and how to review CI Gate execution history in the DevSecOps section.
Related documentation:
- Security gates
- Vulnerability acceptance
- Prioritization attributes
- CI Gate installation
- Break the build
- CI Gate configuration
- CI Gate executions
Analytics and CVSSF
Duration: 30–40 minutes
This session explains CVSSF, the Fluid Attacks metric used to represent risk exposure more clearly than simply counting vulnerabilities with CVSS scores. Participants learn why, for instance, a small number of critical vulnerabilities may pose greater risk than many low- or medium-severity issues, how CVSSF helps prioritize remediation, and where risk exposure figures and charts are shown in the platform. Then, the session connects CVSSF with the Vulnerabilities and Analytics sections, remediation trends, exposure management, benchmarks, and the Accuracy SLA, helping teams interpret their security posture and track progress over time.
Related documentation:
Integrations
Duration: 30–40 minutes
This session presents the integrations available to connect Fluid Attacks with your team's existing development workflow. Participants learn how integrations can help manage vulnerabilities from Jira, Azure DevOps, GitLab, IDEs (VS Code, IntelliJ, and Cursor), MCP clients, the API, and webhooks. The session can include manual or automatic issue creation, linking vulnerabilities to tickets, requesting reattacks to verify remediations, viewing vulnerable code lines in IDEs, using AI-assisted remediation features, and receiving platform event notifications. Fluid Attacks' specialists can adapt the content to the tools your team already uses.
Related documentation:
- Jira integration
- Azure DevOps integration
- GitLab integration
- VS Code extension
- IntelliJ IDEA integration
- Cursor extension
- MCP server
- Platform API
- Webhooks
Compliance
Duration: 30 minutes
This session shows how Fluid Attacks helps your team understand its compliance posture against recognized international cybersecurity standards. Participants learn where to find compliance information in the platform, how to review overall compliance percentages, how to identify the standards and requirements that are not yet fulfilled, and how to download reports for selected groups. The session also introduces the Fluid Attacks Database, which contains standards, requirements, and weakness mappings, helping teams connect reported vulnerabilities to the controls or requirements they need to address.
Related documentation:
What's new
Duration: 30 minutes
This session helps your team understand the latest monthly updates published in Fluid Attacks News, the official channel for product announcements, improvements, fixes, new features, and upcoming changes. Participants review the updates most relevant to their workflow, including platform enhancements, scanner changes, integrations, IDE features, AI capabilities, documentation updates, and deprecations. The session is especially useful for teams that want guidance on how recent releases affect their use of Fluid Attacks' solutions and products, and how to adopt new capabilities available.
Related documentation:
Complete onboarding package
You can request the sessions individually or as a complete training package. The complete package can be divided as follows:
- General onboarding
- Policies and CI Gate: Recommended together because both topics are related to vulnerability treatments, build-breaking rules, and how your team enforces security decisions.
- Analytics and CVSSF + Compliance: Recommended together because both topics help your team understand risk exposure, remediation progress, and how vulnerabilities relate to standards and requirements.
- Integrations + What's new: Recommended together to connect Fluid Attacks with your daily workflow and review relevant recent or upcoming product updates.
Request onboarding sessions
You can request onboarding sessions directly from the Fluid Attacks platform:
- Go to the Help section.
- Select Learn How To Use.
- Choose Live Demo.
- Schedule the session or sessions your team needs.
Each scheduled session lasts up to one hour. This means shorter topics may use less than the full reserved time, while the complete onboarding package should be scheduled across multiple sessions.
Sessions can be conducted in English or Spanish and are led by one of our product or education specialists, depending on availability and the topic. Available time slots are Monday through Friday from 8:00 a.m. to 11:00 a.m. and from 2:00 p.m. to 4:00 p.m., Colombia time.
You can also schedule onboarding sessions from the Fluid Attacks extension page on the Visual Studio Marketplace, in the support section, or right here by following this Google Calendar link.
Before scheduling, we recommend deciding whether you want to request a specific session, several individual sessions, or the complete onboarding package. You may also prepare the following information to help us tailor the session to your team:
- Organization name
- Group or groups involved, if applicable
- Sessions requested
- Approximate number of attendees
- Preferred language
- Tools or integrations your team uses
- Questions or topics you want to prioritize
If your team needs more time after a session, additional meetings may be scheduled to continue the discussion or go deeper into specific points.
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.