Don’t forget to register for our fantastic one-day Training events before discounts end! Details of each training below; click the titles for additional information. Both Training and Standard Registration are available over on the Registration page!
Presented By: Geoffrey Janjua
This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Featuring a multi-level Capture-the-Flag (CTF) network with more than 30 vulnerable systems. To master this CTF environment, you will have to compromise multiple Windows domains, Unix variants, pivot between multiple network, and more. This course is a must have for anyone who is ready to jump start their career in penetration testing!
Presented By: Francis Alexander
This training will cover a variety of popular NoSQL Databases and Hadoop, but will not cover traditional RDBMS systems. This training includes hands-on exploitation of common misconfigurations, API abuse, and web application vulnerabilities against these services. This training includes a case-study of the recent, high-profile MongoDB ransomware and study the possible ways to analyse upcoming threats to Big Data environments. Attendees of this course will leave with a thorough understanding of Big Data environments, their vulnerabilities, related penetration testing tools and techniques, and how these vulnerabilities can be prevented!
Presented By: David Moore
Fuzz testing is a highly effective means of finding security vulnerabilities – a new, easy to use and highly effective fuzzer called American Fuzzy Lop (AFL) has amassed an impressive trophy case and become very popular. In this training, attendees will learn the tools, tactics and techniques for fuzz testing with AFL and analyzing the resulting crashes with the goal of fixing the vulnerabilities. This course is a must have for anyone interested in exploit development or vulnerability prevention!
Presented By: Vikram Salunke
This hands-on training covers both offensive and defensive approaches to web applications. You’ll learn how to execute and exploit vulnerabilities against web applications, how the attacks works, and how to prevent them in the future. After this training, attendees will be able to successfully identify and avoid insecure code and test their web applications for vulnerabilities. This training contains over 50 labs and 30+ challenges which are inspired by real world vulnerabilities and case studies.
The LayerOne Staff