SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • ...g track is from '''2 until 4 October''' 2017. The conference will be on '''5 and 6 October 2017'''. <rss>http://blog.brucon.org/feeds/posts/default|max=5|date</rss>
    5 KB (697 words) - 10:21, 3 October 2017
  • ...enance interfaces), control system protocols (modbus, DNP3, IEC 60870-­‐5-­‐104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''
    10 KB (1,421 words) - 22:00, 29 August 2015
  • == Training locations == ...ourses are spread over two locations. More information can be found on our training page. for accommodation, we recommend the Novotel (see link below for disco
    8 KB (1,153 words) - 14:32, 11 July 2017
  • Along with the training knowledge, the course also aims to impart the technical know-how methodolog ===Module 5: Message Brokers===
    8 KB (1,077 words) - 16:06, 6 June 2017
  • ...pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The c ...or pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile
    5 KB (776 words) - 11:54, 26 May 2015
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ''Mon. 5 - 7 October 2015 (09:00 - 17:00)'' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    2 KB (294 words) - 21:52, 28 April 2015
  • ...track will be hosted between 2 and 4 October followed by our conference on 5 and 6 October 2017.
    13 KB (2,068 words) - 11:48, 27 April 2017
  • ...the world of pen testing and application security by attending the BruCON Training. ...October (before the conference) offering world-class, deep-dive technical training given by '''the most recognised experts''' with huge industry experience in
    8 KB (1,243 words) - 12:41, 18 August 2017
  • ...cent career change, Russ Gideon has been replaced with Colin Ames for this training. ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''
    5 KB (673 words) - 21:43, 29 August 2015
  • This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-de During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a
    3 KB (396 words) - 11:35, 25 August 2014
  • ...of the greatest companies? If that sounds interesting, join this hands-on training! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    4 KB (555 words) - 15:10, 24 June 2015
  • =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.
    9 KB (1,379 words) - 22:39, 9 September 2015
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...maintenance interfaces), control system protocols (modbus, DNP3, IEC 60870-5-104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit atta [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    11 KB (1,531 words) - 09:03, 1 October 2016
  • In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to
    5 KB (702 words) - 09:37, 16 August 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016
  • A completely hands-on training on exploiting mobile applications for the iOS and Android platform. Even wo ...ited well for both beginners as well as advanced security enthusiasts. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2
    8 KB (1,075 words) - 17:18, 20 February 2017
  • =Open Source Defensive Security Training= Open Source Defensive Security Training is a 3-days long, advanced IT Security laboratory dedicated for professiona
    11 KB (1,501 words) - 17:27, 20 February 2017
  • ...st companies and institutions for implementation, consulting and technical training. Next to that, he has 8 years of experience in teaching and transferring a He trained more than 500+ persons with the average evaluation in a 1-5 scale: 4.9. He is a IT Security Architect with pentester’s love and recog
    2 KB (225 words) - 21:09, 5 July 2017