Archive by Author

2019 Saturday Party – Banquet & Game Night!

Posted on 06 May 2019 (0)

This year’s Saturday Banquet and Party will be a gigantic Game Night! We specifically tasked the board game sommeliers of Los Angeles to give us their best-of list. They didn’t disappoint – we have an amazing selection of over 80 games to play! From classic favorites to the newest and craziest, come eat great food […]

Continue Reading...

L1 2019 Hotel Discount ends in ONE WEEK!

Posted on 03 May 2019 (0)

Whether you’re attending for training or the main conference, don’t forget to book your hotel room at the conference rate via the direct booking link. More information about this year’s venue on the Venue page, hotel room discount ends on May 10th! While you’re at it, don’t forget to check out our awesome training lineup […]

Continue Reading...

New for 2019: RaiseMe Career Village!

Posted on 02 May 2019 (0)

New for 2019! Whether you are currently outside the information security field and looking for your first role, or an established member of the InfoSec industry and want to kick up your career a notch, we’re here to lend a helping hand. Our volunteer consultants provide Resume Review, Mock Interviews, Job Hunting Assistance, and Career […]

Continue Reading...

Last Day for 2019 Training Discounts!

Posted on 01 May 2019 (0)

Today is the LAST DAY for discounts on our 2019 training lineup! Read below about each training and REGISTER NOW! Basic Memory Corruption: Introduction to Stack-based Exploitation Presented By: Gabriel Ryan Learn the essentials of memory corruption and binary exploitation! A must-have for those getting started with hacking, bug bounties, software development, software QA, and […]

Continue Reading...

Training Spotlight: Incident Response and Threat Hunting with Wireshark

Posted on 30 April 2019 (0)

Tired of being unsure how to track down bad guys on your networks? Not sure what tools to use? This training will take your Wireshark skills to the next level with a heavy emphasis on incident response, threat hunting, and malicious network traffic analysis. This course is intended for incident response personnel, blue teams, penetration […]

Continue Reading...

Training Spotlight: In & Out – Network Data Exfiltration Techniques

Posted on 29 April 2019 (0)

This course is designed to present modern and emerging tools and techniques for network data exfiltration, testing and bypassing DLP/IDS/IPS/FW systems, protocol tunneling, hiding, pivoting and generating malicious network events. Highly technical content and only a hands-on practical approach guarantees that the usage of this transferred knowledge & technologies in real production environments will be […]

Continue Reading...

Training Spotlight: Building and Maintaining Secure Active Directory Environments

Posted on 26 April 2019 (0)

A major component of modern enterprise security is the proper congfiguration of your networks via Microsoft’s Active Directory. Poorly configured AD environments are often bigger holes than the latest and greatest hacking tools and techniques. Learn how to find and patch those holes in this hands-on course! This course is intended for penetration testers, red […]

Continue Reading...

Training Spotlight: Introduction to Stack-based Exploitation

Posted on 25 April 2019 (0)

Learn the essentials of memory corruption and binary exploitation in this hands-on course! A must-have for those getting started with hacking, bug bounties, software development, software QA, and penetration testing! Instructor proceeds for this training go directly to Hackers for Charity! This course is intended for bug bounty hunters, software developers, software QA testers, penetration […]

Continue Reading...

Training Spotlight: Red Teaming as a Service

Posted on 24 April 2019 (0)

This hands-on focused course is designed to teach you how to hack like a pro and take down large networks! Learn the basics of red-teaming, penetration testing, and vulnerability analysis from two industry experts! This training covers: system and network recon, intel gathering, vulnerability identification and analysis, system exploitation, pivoting, privilege escalation, and more! This […]

Continue Reading...

New for 2019: Threat Hunting Mini-CTF!

Posted on 23 April 2019 (0)

New for 2019! Competitors will be searching for network attacks in data from a multi-server corporate-style network using a Splunk server, and they will also be deploying their own cloud servers, sending attacks, and detecting them. All challenges are freely available and will remain so after the event. This event will use BOSS OF THE […]

Continue Reading...