Accepted Trainings

All

Please select from the menu above

  • Beginning Android App Reverse Engineering

    TrainerSchwartzberg David @DSchwartzberg

    This hands-on training is focused on introducing Android APK reverse engineering to begin students with an interest in the subject. We will begin understanding the Android operating system, using the Android Debug Bridge (ADB), the Android Virtual Device (AVD), examining the inside of an APK, converting the byte code to human readable format, modifying the APK, and redeploying it. As part of the lab exercise, we will work on the Android app CircleCityCon CTF questions. Students will complete this training with experience using common tools, methodologies, and manual reversing steps to uncover Android app strengths and weaknesses.

     

  • Building and Running Security Exercises

    TrainerGoerlich Wolfgang @jwgoerlich

    Everyone is talking about threat modeling. And a few are talking about security exercises. But when you get down to it, practically no one does either. The reasons are simple: modeling can be complicated, there is conflicting information, and it is not clear what to do with the finished model. This session presents a pragmatic threat modeling exercise that can be accomplished in an afternoon. We will review how to find sources for threat models, communicating the findings, auditing and assessing the available controls, and driving change within the organization. In sum, this training presents a practical approach to rapidly getting the most from threat modeling and running security exercises.


     

  • Car Hacking Hands-On 🗓

    Trainer Leale Robert

    Learn how to connect to vehicle systems, send and receive messages, control and audit vehicle functions using vehicle communication protocols such as UDS, GMLAN, and Keyword 2000.

     

  • Intro to Ham Radio

    Trainer Herman Justin @JDogHerman

    Interested in getting your FCC license but don’t know where to start? This class will cover everything you will need to know to be able to pass the technician class license and get on the air. Students are encouraged to bring an open mind. No previous experience necessary. No complected math will be required to pass. If students have access to a handheld transceiver please bring them to the class as we will be using them in demos.

     

  • OSINT For Pen Testers: Maximizing Your Efficiency

    Trainer Gray Joe @C_3PJoe

    Have you ever spent too much time in the reconnaissance phase of a pen test because you needed better intelligence? Do you make the most efficient use of OSINT? This course aims to help you find more efficient ways to collect the information about your targets so that you can get to the fun stuff: exploitation and maximum pwnage. Here, you’ll see the correlation between OSINT and Social engineering and how to better apply it to your engagements. You’ll see techniques for phishing, vishing, pretexting, impersonation, and more. Tool demonstrations will include how to make the best use of OSINT Websites and standalone tools such as Datasploit, recon-ng, Social Engineer Toolkit (SET), and Browser Exploitation Framework (BeEF).

     

  • The 31337 Power of Pi

    Trainer Weaver Jeff

    Trainer Peddakotla Sunil

    The course will provide hands on labs for
    putting together attack kits Using the Raspberry Pi, configuration and tweaks, wireless penetration testing, common attack tools, and other wicked hacks. We will cover hunting of IoT devices, Bluetooth interrogation, and other hacking goodness as time permits.

     

  • The Basics Power of Pi

    Trainer Weaver Jeff

    Trainer Peddakotla Sunil

    Want to learn about a low cost low energy consumption platform for pen testing, recon, and threat analytics? The Raspberry Pi is a compact mini ARM processing environment which

    supports a number of Linux distributions; allows connectivity to numerous peripheral devices; and is small enough that it can be
    placed anywhere. This workshop will tell you more about the Raspberry Pi, how to use it, and why it can be so attractive to keen
    security minds. Additionally the talk will also focus on troubleshooting common issues that arise during the operating system install, hardware device connectivity, and general use.