Archive by Author

One week left for 2018 Early-Bird Training Discounts!

Posted on 25 April 2018 (0)

Don’t forget! Early-bird discounts for 2018 Training ends on May 1st! Head over to the Registration page to book your tickets NOW! Known for our extremely hands-on, “learn by doing” atmosphere, LayerOne offers full one day trainings on Friday, May 25th, 2018. Click on any training title below to see pricing and training information. Hands-on […]

Continue Reading...

2018 Speaker Roster

Posted on 25 April 2018 (0)

LayerOne is proud to announce the 2018 speaker roster! Aatif Khan – Hacking the Drone Amit Serper – Adware is just Malware with a Legal Department Brian Contos – Go Hack Yourself: Moving Beyond Assumption-based Security Katie Knowles – Signal Safari: Investigating RF Controls with RTL-SDR Leigh-Anne Galloway & Timur Yunusov – Hack In, Cash […]

Continue Reading...

Training Spotlight: Android Reverse Engineering for Bug Bounties and Vulnerability Hunting

Posted on 24 April 2018 (0)

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of […]

Continue Reading...

Training Spotlight: Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion

Posted on 23 April 2018 (0)

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt […]

Continue Reading...

Training Spotlight: Hands-on DevOps Security and AppSec Automation

Posted on 20 April 2018 (0)

Application Security is a critical piece of the DevOps puzzle. However, it is severely under-represented in the Continuous Delivery pipeline. Practitioners and Organizations run into problems with Application Security testing in the continuous delivery pipeline, often relying on very basic security tests to provide Application Security Assurance in the Continuous Delivery Pipeline. You need a […]

Continue Reading...

LayerOne 2018 Demo Party!

Posted on 19 April 2018 (0)

Celebrating it’s fourth year running, the LayerOne Demo Party is back again for another year of awesome demos! Demos are a combination of programming challenge, artwork, and music. You’re given specific hardware with any number of restrictions – code size, available memory, processor speed. Your goal is to output audio and video that pushes the […]

Continue Reading...

Training Spotlight: OpenSOC Network Defense Simulation

Posted on 17 April 2018 (0)

OpenSOC is a challenge meant to teach infosec professionals practical incident response skills in an environment that very closely resembles a real enterprise network. The virtual environment includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users […]

Continue Reading...

Fail of Things 2018!

Posted on 17 April 2018 (0)

The Fail of Things returns for 2018! The Fail of Things is a event celebrating the hilariously insecure products and software being sold under the push to have everything on the Internet. Come, laugh, drop 0day, and give these little bugs nobody cares about the appreciation they deserve. We know you’ve been facepalming at all […]

Continue Reading...

Training Spotlight: Hands-on Network Penetration Testing and Ethical Hacking

Posted on 16 April 2018 (0)

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a must have for anyone who is ready to jump […]

Continue Reading...

Tamper-Evident: King of the Hill Contest!

Posted on 05 April 2018 (0)

The Tamper-Evident King of the hill challenge returns for 2018! This is a hands-on contest where attends attempt to defeat tamper-evident devices without leaving evidence. King of the Hill offers a variety of mechanical and adhesive seals to test your skills, As always, this year includes some new seals for even the most veteran King […]

Continue Reading...