{"id":75,"date":"2018-06-02T13:06:15","date_gmt":"2018-06-02T13:06:15","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=75"},"modified":"2018-12-19T13:46:05","modified_gmt":"2018-12-19T11:46:05","slug":"brucon-2018-training","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/","title":{"rendered":"BruCON 2018 Training"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<div class=\"gem-textbox \"  ><div class=\"gem-textbox-inner\" style=\"\"><div class=\"gem-textbox-content\" style=\"background-color: #f4f6f7;background-image: url(https:\/\/archive.brucon.org\/2018\/wp-content\/uploads\/sites\/16\/2018\/06\/training_1.jpg);background-position: center top;\"><div class=\"gem-alert-box\"><div class=\"gem-alert-inner\"><div class=\"gem-alert-box-picture\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-square gem-simple-icon\"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: ;\"><span class=\"back-angle\">&#xf287;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"\"><span class=\"back-angle\">&#xf287;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-alert-box-content\"><\/div><div class=\"gem-alert-box-buttons\"><style type=\"text\/css\">.thegem-button-69d7764e7694b5074 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e7694b5074 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69d7764e7694b5074    \"  ><a class=\"gem-button gem-button-size-large gem-button-style-outline gem-button-text-weight-normal gem-button-border-2\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;border-color: #ffffff;color: #ffffff;\" onmouseleave=\"this.style.borderColor='#ffffff';this.style.backgroundColor='transparent';this.style.color='#ffffff';\" onmouseenter=\"this.style.borderColor='#b43836';this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" href=\"#spring-training\" target=\"_self\">Spring Training<\/a><\/div> <style type=\"text\/css\">.thegem-button-69d7764e7699e9088 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e7699e9088 .gem-button:hover svg {fill: #b43836;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69d7764e7699e9088    \"  ><a class=\"gem-button gem-button-size-large gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ffffff';this.style.color='#b43836';\" href=\"#conference-training\" target=\"_self\">Conference Training<\/a><\/div> <\/div><\/div><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Conference training&#8221; color=&#8221;danger&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-university&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23conference-training|||&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Spring Training&#8221; color=&#8221;inverse&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-graduation-cap&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23spring-training|||&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1528020304248{padding-top: 50px !important;}&#8221; el_id=&#8221;conference-training&#8221;][vc_column][vc_column_text]Immerse yourself into the world of security by attending the BruCON Training !\u00a0BruCON offers world-class, deep-technical training given by the most recognised experts with huge industry experience in their domain. We want to offer courses for anybody interesting in security, ranging from novice to advanced and for red and blue teams !<\/p>\n<p><strong>All our courses (2-day and 3-day ones) will start on Monday the 1st of October !<\/strong><\/p>\n<p>If you want a nice overview of all courses to print, share, hang above your bed.. download the <a href=\"https:\/\/archive.brucon.org\/2018\/wp-content\/uploads\/sites\/16\/2018\/07\/BruCON0x0A-Training-Flyer.pdf\">BruCON0x0A Training Flyer<\/a><\/p>\n<p>You can find our training offering below:[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Advanced Training&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong>\u00a0After our Corelan Bootcamp Spring Training in April, Corelan will host the Advanced course in October! The Corelan ADVANCED exploit development class is a fast-paced, mind-bending, hands-on course where you will learn advanced exploit development techniques from an experienced exploit developer. <em>REMARK :<\/em> This training starts at 9:00 and will end around 22:00 PM. That means +10 hours each day (Dinner will be foreseen)<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:\u00a0<\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/corelan-advanced-training\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e771482560 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e771482560 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e771482560    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Offensive PowerShell for Red and Blue Teams&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:<\/strong> Learn to attack and defense Windows environment with PowerShell and other built-in tools in this training. This class takes students from concepts to hands-on on latest red team techniques and focuses on minimum detection and functionality abuse while also discussing fingerprints and defenses against discussed attacks. This hands-on training gives you one-month access to a realistic lab containing fully patched machines, multiple domains and forests and latest Windows machines.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:\u00a0<\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/offensive-powershell-for-red-and-blue-teams\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e771a39185 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e771a39185 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e771a39185    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Malicious Documents for Blue and Red Teams&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:<\/strong> For this anniversary edition of BruCON, our resident trainer Didier Stevens will teach you how to both analyse as well as create malicious files such as PDF, Word and Excel documents. You&#8217;ll learn how to analyse malicious files as well as create your own for Red team testing!<\/p>\n<p><strong>Instructor: <\/strong>Didier Stevens<\/p>\n<p><strong>Duration: <\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/malicious-documents-for-blue-and-red-teams\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e771ff8942 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e771ff8942 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e771ff8942    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;A Practical Approach to Malware Analysis and Memory Forensics&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong> <span style=\"font-weight: 400\">Learn to analyze, hunt and investigate malware. Perform static, dynamic, code and memory analysis. Understand adversary tactics and techniques. Investigate code injection, rootkits, hooking techniques and much more. Join us for 3-day hands-on training on malware analysis and memory forensics at BruCON 0x0A<\/span><\/p>\n<p><strong>Instructor: <\/strong>Monnappa K A<\/p>\n<p><strong>Duration: <\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/a-practical-approach-to-malware-analysis-and-memory-forensics\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e7724a731 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e7724a731 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e7724a731    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Practical IoT Hacking&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcb&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong><span style=\"font-weight: 400\">&#8220;Practical Internet of Things (IoT) Hacking\u201d is a unique course which offers security professionals, a comprehensive understanding of the complete IoT Technology suite including, IoT protocols, sensors, client side, mobile, cloud and their underlying weaknesses. The extensive hands-on labs enable attendees to identify, exploit or fix vulnerabilities in IoT, not just on emulators but on real smart devices as well. Attendees will get a eXos &#8211; custom IoT security Testing VM, Complete Lab manual and slides.<\/span><\/p>\n<p><strong>Instructor:\u00a0<\/strong>Aseem Jakhar and Arun Magesh<\/p>\n<p><strong>Duration: <\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/practical-iot-hacking\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e772957543 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e772957543 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e772957543    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Windows Kernel Exploitation Advanced&#8221; tab_id=&#8221;1528018036023-50094a93-3fee&#8221;][vc_column_text]<strong>Description:<\/strong> This training is the upgraded version of Windows Kernel Exploitation Foundation course. In this course we will use Windows 10 RS2 x64 for all the labs. This course starts with the<br \/>\nchanges in Windows 10 RS2, Internals, hands-on fuzzing of Windows kernel mode drivers.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Ashfaq Ansari<\/p>\n<p><strong>Duration:<\/strong> 3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/windows-kernel-exploitation-advanced\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e772f31309 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e772f31309 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e772f31309    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Post Exploitation Adversary Simulations &#8211; Network Data Exfiltration Techniques&#8221; tab_id=&#8221;1528018045811-e9d3b40f-5491&#8243;][vc_column_text]<strong>Description:<\/strong>\u00a0 <span class=\"fontstyle0\">The training class has been designed to present students modern and\u00a0emerging tools and techniques available for network data exfiltration, testing\u00a0and bypassing DLP\/IDS\/IPS\/FW systems, protocol tunneling, hiding, pivoting\u00a0and generating malicious network events. Highly technical content and only a\u00a0hands-on practical approach guarantees that the usage of this transferred\u00a0knowledge &amp; technologies in real production environments will be easy,\u00a0smooth and repeatable. Become confident that your network security \/ SOC\u00a0environment really works!<\/span><\/p>\n<p><strong>Instructor:<\/strong>\u00a0<span class=\"fontstyle0\">Leszek Mi\u015b<\/span> <strong><br \/>\n<\/strong><\/p>\n<p><strong>Duration: <\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/post-exploitation-adversary-simulations-network-data-exfiltration-techniques\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e7733d8560 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e7733d8560 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e7733d8560    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Threat Hunting in Industrial Control System Environments with Open Source Tools&#8221; tab_id=&#8221;1528018100415-0281d92c-ced7&#8243;][vc_column_text]<strong>Description:<\/strong> Industrial Control System environments contain purpose-driven network and hosts devices\u00a0related to the production goal of the industrial environment. Due to the unique nature of<br \/>\nproduction environments, IT approaches to threat hunting do not map well to OT\u00a0environments. Within this training, we will share our approach to hunting in industrial control\u00a0system environments using only open source tools.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Daniel Michaud-Soucy and\u00a0Marc Seitz<\/p>\n<p><strong>Duration:\u00a0<\/strong>2-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/threat-hunting-in-industrial-control-system-environments-with-open-source-tools\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e773842572 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e773842572 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e773842572    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Thinking Behind Enemy Lines \u2013 Actionable Threat Intelligence Tools and Technique&#8221; tab_id=&#8221;1528018123324-cf58c810-21cb&#8221;][vc_column_text]<strong>Description:<\/strong> In this course, which will include both lectures and hands on training, we will learn how to look beyond the malware itself in order to dig information on the infrastructure and actor behind it. We will understand the adversary&#8217;s intents, way of thinking and the risk it poses against our threat model, to develop the best protections and mitigations.<\/p>\n<p><strong>Instructor:<\/strong>\u00a0Irena Damsky<\/p>\n<p><strong>Duration:\u00a0<\/strong>2-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/thinking-behind-enemy-lines-actionable-threat-intelligence-tools-and-technique\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e773ca5731 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e773ca5731 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e773ca5731    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Offensive Whiteboard Hacking for Penetration Testers&#8221; tab_id=&#8221;1528018143442-eabfc38c-16a0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>With this training we will teach you how to use threat modeling as an offensive weapon. Traditional threat modeling looks at the attacker, the asset and the system. With offensive threat modelling we look at the defender to understand his tactics and expose weaknesses.\u00a0You will be challenged to perform practical threat modelling in groups of 3 to 4 people covering the different stages of offensive threat modelling on applications, IOT devices and a nuclear facility.\u00a0Feedback from a Black Hat 2017 training attendee: \u201c<em>I feel that this course is one of the most important courses to be taken by a security professional.<\/em>\u201d<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Sebastien Deleersnyder and Steven Wierckx<\/p>\n<p><strong>Duration:\u00a0<\/strong>2-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/offensive-whiteboard-hacking-for-penetration-testers\/\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d7764e774106030 .gem-button svg {fill: #ffffff;}.thegem-button-69d7764e774106030 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d7764e774106030    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-trainings-tickets-45928752134?err=29\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Additional info<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_toggle title=&#8221;Pricing&#8221;]The price for 2-day courses is 1300 Euro early bird (+ VAT) per attendee.<br \/>\nThe price for 3-day courses is 1600 Euro early bird (+ VAT) per attendee.<\/p>\n<p><b>As of the 1st of July 2018<\/b>\u00a0this will become 1400 Euro (2-day) \/ 1700 Euro (3-day) (+ VAT) per attendee.<br \/>\n(*) The Corelan trainings are a little bit more expensive but consist of 3 long days (+ 10 hours) including dinner.[\/vc_toggle][vc_toggle title=&#8221;Location and dates&#8221;]Courses are held at the\u00a0<b>Hotel Novotel Gent Centrum, Goudenleeuwplein 5<\/b>\u00a0and\u00a0<b>NH Gent Belfort, Hoogpoort 63, B-9000 Ghent<\/b>. Both hotels are within walking distance of each other (&lt;1 minute).<\/p>\n<p>The courses\u00a0<b>begin promptly at 09h00<\/b>\u00a0and\u00a0<b>end at 17h00<\/b>\u00a0(Except Corelan trainings). Out of consideration for your instructor(s) and fellow students, please try to be seated and ready to go by 08h45.<\/p>\n<p>Lunch is included in the training fee. During the registration you can specify a regular, vegetarian or vegan mail. We will do our best to accommodate according to your requirements.[\/vc_toggle][vc_toggle title=&#8221;Overlap with conference?&#8221;]For our anniversary edition, BruCON 0x0A will be 3 days, starting on the 3rd of October with retro talks (= Top 7 speakers from 9 years of BruCON). Students attending a 3-day training will be able to buy a conference ticket at a reduced price and attend the regular conference on Thursday and Friday.<\/p>\n<p>If you are worried about missing out on the retro talks, as always, we will be streaming, recording and publishing every talk presented at BruCON.[\/vc_toggle][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1528020304248{padding-top: 50px !important;}&#8221;][vc_column el_id=&#8221;spring-training&#8221;][vc_separator][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Spring Training<\/h2>\n<p>[\/vc_column_text][vc_column_text]<b>Spring Training is over.<\/b>\u00a0We would like to thank all students and trainers for another successful training. We had a blast and I hope you did too\u00a0!<\/p>\n<p>You can find our spring training offering below:[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Bootcamp&#8221; tab_id=&#8221;1528020405511-0d393e01-b145&#8243;][vc_column_text]<strong>Description:<\/strong>\u00a0Once again we bring you Corelan ! One of the best exploit development courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours\/day) of intensive exploit development ! Lunch and dinner are included and, as always enough coffee to keep you going!<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:\u00a0<\/strong>3-day course<\/p>\n<p><a href=\"https:\/\/www-new.brucon.org\/2018\/brucon-2018-trainings\/corelan-advanced-training\/\" class=\"broken_link\">Read More<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Active Directory attacks for Red and Blue Teams&#8221; tab_id=&#8221;1528020405592-43f1c617-1c9f&#8221;][vc_column_text]<strong>Description:<\/strong> This training is aimed towards attacking modern AD Environment using built-in tools like PowerShell and other trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration: <\/strong>3 days<\/p>\n<p><a href=\"https:\/\/www-new.brucon.org\/2018\/brucon-2018-training\/active-directory-attacks-for-red-and-blue-teams\/\" class=\"broken_link\">Read More<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Assessing and Exploiting Control Systems &amp; IIoT&#8221; tab_id=&#8221;1528020405715-7d0c5342-d2a3&#8243;][vc_column_text]<strong>Description:<\/strong><\/p>\n<p>This is not your traditional SCADA\/ICS\/IIoT security course! How many courses send you home with a $500 kit including your own PLC and a set of hardware\/RF hacking tools?!?<\/p>\n<p>The following items are provided to each student to use in class and to keep after course completion:<\/p>\n<ul>\n<li>Programmable Logic Controller (PLC)<\/li>\n<li>Software to program the PLC to keep (non-expiring)<\/li>\n<li>Software to program an HMI for the PLC (non-expiring)<\/li>\n<li>Buspirate with probes and EEPROMS for exercises<\/li>\n<li>RTL-SDR (Software Defined Radio)<\/li>\n<li>Great Scott Gadgets Yardstick sub-GHz Radio<\/li>\n<li>Saleae Logic4 Analyzer<\/li>\n<li>Breadboard with SPI and I2C EEPROMs<\/li>\n<li>MSP430 Launchpad for Firmware exercises<\/li>\n<li>Latest version of the Control Things Pentest Platform on USB<\/li>\n<li>Power for your laptop<\/li>\n<li>Internet connectivity may or may not be available depending on the facility hosting the course<\/li>\n<li>PDF version of the course slide deck<\/li>\n<\/ul>\n<p><strong>Instructor:<\/strong>Justin Searle<\/p>\n<p><strong>Duration: <\/strong>3days<\/p>\n<p><a href=\"https:\/\/www-new.brucon.org\/2018\/brucon-2018-trainings\/assessing-and-exploiting-control-systems-iiot\/\" class=\"broken_link\">Read More<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Open Source Defensive Security Training&#8221; tab_id=&#8221;1528020405802-c22e09d2-aac7&#8243;][vc_column_text]<strong>Description:<\/strong> Open Source Defensive Security Training is an Open Source IT Security laboratory dedicated for professionals who need close the gaps in Linux &amp; Open Source Security knowledge.<\/p>\n<p><strong>Instructor:<\/strong> Leszek Mi\u015b<\/p>\n<p><strong>Duration: <\/strong>3 days<\/p>\n<p><a href=\"https:\/\/www-new.brucon.org\/2018\/open-source-defensive-security-training\/\" class=\"broken_link\">Read More<\/a>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Conference training&#8221; color=&#8221;danger&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-university&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23conference-training|||&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Spring Training&#8221; color=&#8221;inverse&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-graduation-cap&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23spring-training|||&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1528020304248{padding-top: 50px !important;}&#8221; el_id=&#8221;conference-training&#8221;][vc_column][vc_column_text]Immerse yourself into the world of security by attending the BruCON Training !\u00a0BruCON offers world-class, deep-technical training given by the most recognised experts with huge industry experience in their domain. We want to offer courses for anybody interesting in security, ranging from novice to advanced and for red&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-75","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":53,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/75\/revisions"}],"predecessor-version":[{"id":1633,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/75\/revisions\/1633"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}