DEF CON Forum Site Header Art
Sub-Forums Topics Posts Last Post
Abhinav Singh - Defender's Guide to Securing Public Cloud Infrastructures
This hands-on training simulates real-life attack scenarios on cloud infrastructure & applications. It then teaches you to build your own defensive tools against such attacks by using cloud native services on AWS.
Topics: 1 Posts: 2
1 2
Aubrey Labuschagne (William) & Marianka Botes - Pragmatic API Exploration
The aim of this course is to empower you to conduct a risk assessment of an API. This hands-on course covers API basics, setting up a test environment, API threat model, API protocols and architectures, typical vulnerabilities, enumerating an attack surface and best practices around security.
Topics: 1 Posts: 2
1 2
Chris Greer - TCP/IP Deep Dive for Ethical Hackers – Featuring Wireshark
This will be an action-packed, hands-on course for Wireshark beginners as well as seasoned pros who want to pick up some new tricks. There is something for all experience levels in this course, although it will be targeted to the early-intermediate cybersecurity professional.
Topics: 1 Posts: 2
1 2
Dahvid Schloss - Zero 2 Emulated Criminal: Intro to Windows Malware Dev
In this course, you will learn by doing, not by copying and pasting with modules and labs that will give you the ability to deviate and improvise on your very first malware variants in C++, even if you have no prior C++ experience.
Topics: 1 Posts: 2
1 2
Fish Wang & Audrey Dutcher - Customizable Binary Analysis: Using angr to its full potential
This course will focus on Linux userspace binaries (x86-64 and ARM), Windows userspace binaries (x86-64), and firmware images (ARM). After completing this course, students will master practical angr skills that will help them reverse engineer userspace binary programs and assess them for defects and vulnerabilities.
Topics: 1 Posts: 2
1 2
Madhu Akula - A Practical Approach to Breaking & Pwning Kubernetes Clusters
In this real-world scenario-based training, each participant will be learning Tactics, Techniques, and Procedures (TTPs) to attack and assess Kubernetes clusters environments at different layers like Supply chain, Infrastructure, Runtime, and many others.
Topics: 1 Posts: 2
1 2
Offensive IoT Exploitation
This training is curated to take a step back and look at the bigger picture of IoT security testing, teaching the basics of each skill set to bridge the gaps and enable students to apply modern penetration testing techniques to IoT devices.
Topics: 1 Posts: 2
1 2
number6
by number6
Seth Law & Ken Johnson - Practical Secure Code Review
This course introduces a proven methodology and framework for performing a secure code review, as well as addressing common challenges in modern secure code review. Short circuit your development of a custom secure code review process by gleaning from Seth & Ken's past adventures in performing hundreds of code reviews and the lessons we’ve learned along the way.
Topics: 1 Posts: 2
1 2
CANCELED Paid Training DEF CON 30
Contains forums for CANCELED Paid Training at DEF CON 30
Topics: 19 Posts: 23
19 23
Sub-Forums:
  •  
  • Time
  • Answered
  • Show
  • New Topics
Clear All
new posts
There are no conversations in this channel.
 
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.
  •  
  • Time
  • Answered
  • Show
  • Sort By
  • Order
Clear All
new posts
No topics found.
  • Time
Clear All
Working...