Archive by Author

L1 2019 Hotel Discount ends TOMORROW!

Posted on 08 May 2019 (0)

Whether you’re attending for training or the main conference, don’t forget to book your hotel room at the conference rate via the direct booking link. More information about this year’s venue on the Venue page, hotel room discount ends on May 10th! While you’re at it, don’t forget to check out our awesome training lineup […]

Continue Reading...

New for 2019: The Intercept, a Hardware CTF!

Posted on 07 May 2019 (0)

New for 2019! The Intercept is a hardware Capture the Flag (CTF) event focused on testing your skills in hardware hacking, anti-tamper technologies, programming, and more! Your team plays a nation-state intelligence agency who intercepts a package. Your job is to reverse engineer and tamper with the device within to extract valuable data, implant backdoors, […]

Continue Reading...

2019 Saturday Party – Banquet & Game Night!

Posted on 06 May 2019 (0)

This year’s Saturday Banquet and Party will be a gigantic Game Night! We specifically tasked the board game sommeliers of Los Angeles to give us their best-of list. They didn’t disappoint – we have an amazing selection of over 80 games to play! From classic favorites to the newest and craziest, come eat great food […]

Continue Reading...

L1 2019 Hotel Discount ends in ONE WEEK!

Posted on 03 May 2019 (0)

Whether you’re attending for training or the main conference, don’t forget to book your hotel room at the conference rate via the direct booking link. More information about this year’s venue on the Venue page, hotel room discount ends on May 10th! While you’re at it, don’t forget to check out our awesome training lineup […]

Continue Reading...

New for 2019: RaiseMe Career Village!

Posted on 02 May 2019 (0)

New for 2019! Whether you are currently outside the information security field and looking for your first role, or an established member of the InfoSec industry and want to kick up your career a notch, we’re here to lend a helping hand. Our volunteer consultants provide Resume Review, Mock Interviews, Job Hunting Assistance, and Career […]

Continue Reading...

Last Day for 2019 Training Discounts!

Posted on 01 May 2019 (0)

Today is the LAST DAY for discounts on our 2019 training lineup! Read below about each training and REGISTER NOW! Basic Memory Corruption: Introduction to Stack-based Exploitation Presented By: Gabriel Ryan Learn the essentials of memory corruption and binary exploitation! A must-have for those getting started with hacking, bug bounties, software development, software QA, and […]

Continue Reading...

Training Spotlight: Incident Response and Threat Hunting with Wireshark

Posted on 30 April 2019 (0)

Tired of being unsure how to track down bad guys on your networks? Not sure what tools to use? This training will take your Wireshark skills to the next level with a heavy emphasis on incident response, threat hunting, and malicious network traffic analysis. This course is intended for incident response personnel, blue teams, penetration […]

Continue Reading...

Training Spotlight: In & Out – Network Data Exfiltration Techniques

Posted on 29 April 2019 (0)

This course is designed to present modern and emerging tools and techniques for network data exfiltration, testing and bypassing DLP/IDS/IPS/FW systems, protocol tunneling, hiding, pivoting and generating malicious network events. Highly technical content and only a hands-on practical approach guarantees that the usage of this transferred knowledge & technologies in real production environments will be […]

Continue Reading...

Training Spotlight: Building and Maintaining Secure Active Directory Environments

Posted on 26 April 2019 (0)

A major component of modern enterprise security is the proper congfiguration of your networks via Microsoft’s Active Directory. Poorly configured AD environments are often bigger holes than the latest and greatest hacking tools and techniques. Learn how to find and patch those holes in this hands-on course! This course is intended for penetration testers, red […]

Continue Reading...

Training Spotlight: Introduction to Stack-based Exploitation

Posted on 25 April 2019 (0)

Learn the essentials of memory corruption and binary exploitation in this hands-on course! A must-have for those getting started with hacking, bug bounties, software development, software QA, and penetration testing! Instructor proceeds for this training go directly to Hackers for Charity! This course is intended for bug bounty hunters, software developers, software QA testers, penetration […]

Continue Reading...