Archive by Author

Training Spotlight: Android Reverse Engineering for Bug Bounties and Vulnerability Hunting

Posted on 24 April 2018 (0)

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of […]

Continue Reading...

Training Spotlight: Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion

Posted on 23 April 2018 (0)

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt […]

Continue Reading...

Training Spotlight: Hands-on DevOps Security and AppSec Automation

Posted on 20 April 2018 (0)

Application Security is a critical piece of the DevOps puzzle. However, it is severely under-represented in the Continuous Delivery pipeline. Practitioners and Organizations run into problems with Application Security testing in the continuous delivery pipeline, often relying on very basic security tests to provide Application Security Assurance in the Continuous Delivery Pipeline. You need a […]

Continue Reading...

LayerOne 2018 Demo Party!

Posted on 19 April 2018 (0)

Celebrating it’s fourth year running, the LayerOne Demo Party is back again for another year of awesome demos! Demos are a combination of programming challenge, artwork, and music. You’re given specific hardware with any number of restrictions – code size, available memory, processor speed. Your goal is to output audio and video that pushes the […]

Continue Reading...

Training Spotlight: OpenSOC Network Defense Simulation

Posted on 17 April 2018 (0)

OpenSOC is a challenge meant to teach infosec professionals practical incident response skills in an environment that very closely resembles a real enterprise network. The virtual environment includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users […]

Continue Reading...

Fail of Things 2018!

Posted on 17 April 2018 (0)

The Fail of Things returns for 2018! The Fail of Things is a event celebrating the hilariously insecure products and software being sold under the push to have everything on the Internet. Come, laugh, drop 0day, and give these little bugs nobody cares about the appreciation they deserve. We know you’ve been facepalming at all […]

Continue Reading...

Training Spotlight: Hands-on Network Penetration Testing and Ethical Hacking

Posted on 16 April 2018 (0)

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a must have for anyone who is ready to jump […]

Continue Reading...

Tamper-Evident: King of the Hill Contest!

Posted on 05 April 2018 (0)

The Tamper-Evident King of the hill challenge returns for 2018! This is a hands-on contest where attends attempt to defeat tamper-evident devices without leaving evidence. King of the Hill offers a variety of mechanical and adhesive seals to test your skills, As always, this year includes some new seals for even the most veteran King […]

Continue Reading...

Last call for 2018 Early-Bird Standard Registration & CFP!

Posted on 31 March 2018 (0)

Today is the last day to save big on Standard Admission tickets! Head over to the registration page to book your tickets now! Interested in attend one of our awesome one-day training seminars on Friday, May 25th? Learn more about this year’s training options on the Training page. The early-bird discount for Training Registration continues […]

Continue Reading...

2018 Training Registration is Open!

Posted on 26 March 2018 (0)

We are proud to present this year’s Training lineup! Training occurs on Friday, May 25th, 2018 and requires Training Registration to attend. Head to the Registration page for more details. Read below for full details of each training! Hands-on Penetration Testing and Ethical Hacking Presented By: Geoffrey Janjua This hands-on focused course is designed to […]

Continue Reading...