Fly on over to the #DEFCONTraining website before it’s too late! Just 10 days left of the #earlybird discount! https://lnkd.in/e6Kf3WGe #training #networking #cyber #cybersecurity #infosec #cybertraining #cyberdefense #defcon33 #defcon
About us
DEF CON Training - intensive, two-day courses of study with world-class instructors aimed at building specific skills. DEF CON Training is for everyone who wants to hone their skills in a challenging, fast-paced environment with instructors who know their subject down to the metal. It’s the two days after DEF CON, and those two days could change everything.
- Website
-
https://training.defcon.org/
External link for DEF CON Training
- Industry
- Technology, Information and Internet
- Company size
- 2-10 employees
- Headquarters
- Seattle, Washington
Updates
-
#DEFCONTraining Las Vegas Spotlight Alert: “Harnessing LLMs for Application Security” with Seth Law and Ken Johnson on August 11 & 12. This comprehensive course is designed for developers and cybersecurity professionals seeking to harness the power of Generative AI and Large Language Models (LLMs) to enhance software security and development practices. Participants will gain a deep understanding of LLM functionality, strengths, and weaknesses, and learn to craft effective prompts for diverse use cases. The curriculum covers essential topics such as embeddings, vector stores, and Langchain, offering insights into document loading, code analysis, and custom tool creation using Agent Executors. Read the full course description or explore the course list at: https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #LLMs #AI #generativeAI #AIforcyber
-
-
It’s time for another #DEFCONTraining Spotlight - Join Felipe Jacob Custodio Romero and Kolja Grassmann in Las Vegas for their four-day training, “Binary Exploitation on Windows” on August 9-12! This four-day intensive training is designed to guide participants from foundational reverse engineering to advanced exploitation techniques on Windows systems, culminating in hands-on real-world applications. Day 1 and 2 will cover Basics of Reverse Engineering and PWNing before moving onto Advanced PWNing on Day 3, and finally Real World Applications on Day 4. The final goal is for you to write an exploit for a VirtualBox VM escape n-day utilizing what you have learned! Sound like the right fit? Don’t wait - sign up today! Looking to dig into a different topic? Explore the course offerings here: https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #binaryexploitation #windows #reverseengineering #pwning
-
-
Today’s #DEFCONTraining Las Vegas Spotlight is for three course offerings from Altered Security on August 11-12. “Active Directory Attacks for Red and Blue Teams - Advanced Edition” is aimed towards attacking modern Active Directory with focus on OPSEC and Stealth. It is based on real world penetration tests and Red Team engagements for highly secured environments. Participants will start from compromise of a user desktop and work their way up to multiple forest pwnage. “Azure Cloud Attacks for Red and Blue Teams - Beginner Edition“ is a hands-on training aimed towards abusing Azure and a number of services offered by it. It will cover multiple complex attack lifecycles against a lab containing multiple live Azure tenants. If you are a security professional trying to improve your skills in Azure cloud security, Azure Pentesting or Red teaming the Azure cloud this is the right class for you! “Azure Cloud Attacks for Red and Blue Teams - Advanced Edition” is an advanced Azure Red Team class designed to help security professionals to understand, analyze and practice attacks in an enterprise-like live multi-tenant Azure environment that has effective security controls in place. Attendees will get two months of access to lab environments to continue to practice following the courses. Learn more and register today or explore for the full list of offerings at https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #activedirectory #azure #redteam #blueteam #pentesting
-
Want to get more connected to the #DEFCON community but not sure how? Expand your experience at #DEFCON33 by registering for #DEFCONTraining. Join instructors and students from our worldwide community for 2- or 4-day courses for the chance to expand your knowledge and your network! Learn more and register today: https://lnkd.in/e6Kf3WGe #training #networking #cyber #cybersecurity #infosec #cybertraining #cyberdefense #defcon33
-
🚨 Alert! 🚨 It’s the last day of #earlybird pricing! Head to the link below today to register with a $200 discount, ending May 31. https://lnkd.in/e6Kf3WGe #defcontraining #defcon #defcon33 #cyber #cybertraining #infosec #cyberdefense #IoT #artificialintelligence #AI #cybersecurity #redteam #pentesting #networking #professionaldevelopment
-
Today we are spotlighting three course offerings from White Knight Labs at #DEFCONTraining Las Vegas 2025. “Advanced Red Team Operations” with John Stigerwalt is meant to fill in the gaps for senior penetration testers who want to pivot into conducting red team operations against mature enterprise environments. At the end of the course, students can test their knowledge by taking the Advanced Red Team Operation Certification exam. “Offensive Development Practitioner Certification” with Gregory Hatcher is designed to take you deep into defensive and offensive tooling – an apex attacker must know the own indicators of compromise (IOCs) they’re creating and the artifacts they’re leaving behind. This course will help red teamers and blue teamers understand the current state of the red/blue war and where the community is heading next, the kernel. “Attacking and Securing CI/CD Pipeline Certification (ASCPC)” with Raunak Parmar is designed to equip participants with the knowledge and skills to identify vulnerabilities and implement security measures within Continuous Integration and Continuous Deployment (CI/CD) pipelines. This course combines theoretical knowledge with practical, hands-on labs that simulate real-world scenarios in a CI/CD environment. Register today or explore for the full list of offerings at https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #redteam #cyberoperations #offensivecyber #CICDpipeline #cybercertification
-
#DEFCONTraining Spotlight - Join Cyfinoid Research in Las Vegas on August 11-12 for “Attack and Defend Software Supply Chain”! “It’s not just your code - it’s everything around it too that gets hacked. Let’s fix that.” This hands-on course takes a comprehensive approach to attacking and securing the software supply chain. In the first section, you'll assume the role of a sophisticated attacker, infiltrating an enterprise through its supply chain partners. In the second section, you'll build and secure a GitHub organization, configure repositories, and implement best practices to mitigate risks. Through practical exercises, you'll apply these strategies to safeguard your developer environments, CI/CD pipelines, and production systems. By the end of the course, you'll have the knowledge and tools to turn your software supply chain into a security strength rather than a liability. Learn more, register today, or explore the full set of course offerings at https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #cyberattacks #hacking #supplychain #software #softwaresupplychain
-
-
Today’s #DEFCONTraining Las Vegas Spotlight is “Deep Dive into Fuzzing” with Dhiraj Mishra and Zubin Devnani on August 11 & 12. Fuzzing is a technique of identifying software vulnerabilities by automated corpus generation. It has produced immense results and attracted a lot of visibility from security researchers and professionals in the industry, today fuzzing can be utilized in various ways which can be incorporated into your secure SDLC to discover vulnerabilities in advance and fix them. Attendees will be emulating techniques which will provide a comprehensive understanding of "Crash, Detect & Triage" of fuzzed binaries or software. This course will cover a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs. Register today or explore for the full list of offerings at https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #fuzzing #softwarevulnerabilities
-
-
DEF CON Training reposted this
Stoked! We (Zubin) would be delivering our two day hands-on training on fuzzing at DEFCON this year. Sign-up if you want to get started with Windows & Linux binary fuzzing. (https://lnkd.in/djBdm5cd) #infosec #fuzzing
-