Archives

2-DAY TRAINING 4 – Practical Intro to Embedded Attack & Defense

DURATION: 2 DAYS CAPACITY: 20 pax SEATS AVAILABLE: CLASS CANCELLED EUR1899 (early bird) EUR2599 (normal) Early bird registration rate ends on the 31st of January   Overview Every developer makes mistakes. If you are unlucky, these mistakes result in a security vulnerability, an almost untraceable bug for the normal developer. Going around the world performing […]

3-DAY TRAINING 8 – Mobile Hacking Training

DURATION: 3 DAYS CAPACITY: 20 pax SEATS AVAILABLE: CLASS CANCELLED EUR2599 (early bird) EUR3199 (normal) Early bird registration rate ends on the 31st of January Overview Guillaume Lopes (@Guillaume_Lopes) and Davy Douhine (@ddouhine), senior pentesters, will share many techniques, tips and tricks to deliver to pentesters, bug bounty researchers, app makers or just curious a […]

4-DAY TRAINING 2 โ€“ Intro to Modern Binary Exploitation

DURATION: 4 DAYS CAPACITY: 20 pax SEATS AVAILABLE: CLASS CANCELLED EUR3499 (early bird) EUR4299 (normal) Early bird registration rate ends on the 31st of January Overview This four-day training will teach students without prior experience how to develop exploits for modern binary software, taking them from 1990s style buffer overflows through exploitation of use-after-frees in […]

2-DAY TRAINING 2 – Practical Cellular Network (3G/4G/5G) Security and Attacks

DURATION: 2 DAYS CAPACITY: 20 pax SEATS AVAILABLE: CLASS CANCELLED EUR1899 (early bird) EUR2599 (normal) Early bird registration rate ends on the 31st of January Overview The cellular network plays a major role in providing vital wireless connectivity to todayโ€™s digital equipment. However, wireless connectivity also attracts adversaries interest to carry out cybersecurity attacks. For […]

4-DAY TRAINING 1 โ€“ Modern Malware Analysis: Advanced Edition

DURATION: 4 DAYS CAPACITY: 20 pax SEATS AVAILABLE: CLASS CANCELLED EUR3499 (early bird) EUR4299 (normal) Early bird registration rate ends on the 31st of January Overview Malware authors go to great lengths to bypass enterprise security to deliver malware, avoid detection after the initial intrusion and maintain persistence to compromise an organization. To achieve this, […]