Cybersecurity Training Events

$150.00

Wild West Hackin ’ Fest-Deadwood 2020

Active Defense and Cyber Deception Advanced Network Threat Hunting Applied Purple Teaming Modern WebApp PenTesting SOC-Class: Build and Operate Security Operation Centers Security Defense and Detection TTX Intermediate Software De ... see more

Cyber-Attack Against Payment Systems (CAPS) Exercise (EMEA, Asia-Pacific, America)

The CAPS exercise challenges incident response teams to overcome a simulated attack against financial institution systems and processes. Participants practice mobilizing quickly, working under pressure and recognizing critical int ... see more

Cyber-Attack Against Payment Systems (CAPS) Exercise (EMEA, Asia- Pacific, America)

The CAPS exercise challenges incident response teams to overcome a simulated attack against financial institution systems and processes. Participants practice mobilizing quickly, working under pressure and recognizing critical int ... see more

CONFidence 2020

Hackers, security experts, developers and IT specialists - every spring they all come to Kraków to take part in CONFidence, the most recognized IT security conference in Poland. Created in 2005 by a group of enthusiasts, each year ... see more
$530

Attack and Defence in AWS: Chaining vulnerabilities to go beyond the OWASP Top 10

Attacking the most popular cloud provider - AWS, requires the knowledge of how different services are setup, what defences do we need to bypass, what service attributes can be abused, where can information be leaked, how do I esca ... see more
$530

ML for security and security for ML

Machine learning / Deep learning is under exponential growth these days. Businesses, Academia and tech enthusiasts are really hyped about trying out Deep learning to solve their problems. A lot of students, professionals and resea ... see more
$530

Cryptography and Hardware Security in Cyber Physical Systems

Cyber Physical Systems (CPS) is a close association between computational and communication blocks (referred to as “cyber”) and components for sens- ing real data and actuating thereof (referred to as “physical”). While CPS is a t ... see more
$530

DevSecOps - Automating Security in DevOps

Modern enterprises are implementing the technical and cultural changes required to embrace DevOps methodology by introducing practices such Continuous Integration (CI), Continuous Delivery (CD), Continuous Monitoring (CM) and Infr ... see more
$530

OFFENSIVE HTML, SVG, CSS AND OTHER BROWSER-EVILOFFENSIVE HTML, SVG, CSS AND OTHER BROWSER-EVIL

Upon suc­cess­ful com­ple­ti­on of the mo­du­le, stu­dents will have a com­pre­hen­si­ve un­der­stan­ding of the tech­ni­cal as­pects of web and brow­ser se­cu­ri­ty. They have ac­qui­red a com­pre­hen­si­ve un­der­stan­ding of sy ... see more
$530

Attacking and Auditing Docker Containers & Kubernetes Clusters

This 16 hours, delivered over a period of 4 days, attacker focused hands-on training will set the students to the path of using common attack techniques against containarized workloads running as Docker containers in a Kubernetes ... see more
Upcoming Events