SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • ...between '''19 and 21 April 2017'''. Our regular training track is from '''2 until 4 October''' 2017. The conference will be on '''5 and 6 October 2017' * '''[[Training]] - BruCON training program'''
    5 KB (697 words) - 10:21, 3 October 2017
  • ===BruCON Training Track=== ...e conference to announce the possibility to follow first class training on 2-4 October.
    3 KB (466 words) - 11:47, 29 May 2017
  • == Training locations == ...ourses are spread over two locations. More information can be found on our training page. for accommodation, we recommend the Novotel (see link below for disco
    8 KB (1,153 words) - 14:32, 11 July 2017
  • ...iners, Big Data Environments, Search Technologies and Message Brokers. The 2 days course is a fast paced and completely hands on program that aims to im In this 2 day course we start by looking into red team tactics for pentesting modern
    8 KB (1,077 words) - 16:06, 6 June 2017
  • ...ious PDF or MS Office documents using his own created Phyton tools in this 2-day course! This training will teach you how to analyse PDF files and MS Office files (both “old”
    4 KB (542 words) - 23:39, 16 December 2015
  • ...pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The c ...or pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile
    5 KB (776 words) - 11:54, 26 May 2015
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ...en 19 and 21 April 2017. Our regular training track will be hosted between 2 and 4 October followed by our conference on 5 and 6 October 2017.
    13 KB (2,068 words) - 11:48, 27 April 2017
  • ...the world of pen testing and application security by attending the BruCON Training. ...October (before the conference) offering world-class, deep-dive technical training given by '''the most recognised experts''' with huge industry experience in
    8 KB (1,243 words) - 12:41, 18 August 2017
  • In this training you will learn to analyse and create malicious documents. PDF exploits and This training will teach you how to analyse MS Office files (both “old” OLE and “ne
    5 KB (704 words) - 17:07, 20 February 2017
  • Student machines must be able to run at least 2 virtual machines utilizing VMware Workstation 8.0 and above (which can be o ...cent career change, Russ Gideon has been replaced with Colin Ames for this training.
    5 KB (673 words) - 21:43, 29 August 2015
  • On day two, the training will dive a bit further into practical bug hunting, reverse engineering met * At least one free USB 2.0 port
    4 KB (534 words) - 08:27, 5 September 2013
  • This training will teach you how to analyze PDF files and create your own PDF hacks. PDF This is not a training on exploit development, but we will see with several exercises how exploits
    3 KB (467 words) - 08:27, 5 September 2013
  • During the 2 days course, the attendees will have access to a number of challenges for e [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (452 words) - 08:27, 5 September 2013
  • Day 2: [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (431 words) - 08:27, 5 September 2013
  • '''Day 2 – Pentesting SCADA Field and Floor Devices''' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    9 KB (1,234 words) - 08:27, 5 September 2013
  • ...ments that makes this training stand out between other exploit development training offerings. Feel free to check our testimonials page if you want to see re Finally, we offer you post-training support as well. If you have taken the course and you still have question
    9 KB (1,415 words) - 09:18, 28 January 2014
  • Student machines must be able to run at least 2 virtual machines [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (497 words) - 09:18, 28 January 2014
  • 2. http://nostarch.com/xboxfree - While this has nothing to do with control s ===Day 2 – Pentesting ICS Field and Floor Devices===
    9 KB (1,301 words) - 09:18, 28 January 2014
  • ...rotocols, standardized and proprietary telecom Core Network protocols. The training will show the various attack surfaces for these networks and show the impac ===Day 2===
    3 KB (478 words) - 11:49, 6 August 2014

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)