{"id":832,"date":"2014-08-19T17:54:00","date_gmt":"2014-08-19T17:54:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2014\/08\/19\/3-reasons-to-book-your-brucon-training-now\/"},"modified":"2014-08-19T17:54:00","modified_gmt":"2014-08-19T17:54:00","slug":"3-reasons-to-book-your-brucon-training-now","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2014\/08\/19\/3-reasons-to-book-your-brucon-training-now\/","title":{"rendered":"3 reasons to book your BruCON training now!"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left\">BruCON 0x06 is getting close and we are putting everything in motion to have another great edition.<br \/>This year, we have our <b>largest trainings offering yet<\/b>, again offering world-class, deep-dive technical trainings given by the most recognized experts with huge industry experience in their domain!<\/p>\n<p>A brief summary :<\/p>\n<ul>\n<li>Kali Linux Dojo by <b>Mati Aharoni &#8220;Muts&#8221;,&nbsp;<\/b>the founder and core developer of&nbsp;Kali Linux presents the first official all-day Kali Linux event. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Kali_Linux_Dojo\" target=\"_blank\">link<\/a>)<\/li>\n<li>Hardware Hacking by <b>Joe Grand <\/b>covering hardware hacking and reverse engineering techniques commonly used against electronic products and embedded systems. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Hardware_Hacking\" target=\"_blank\">link<\/a>)<\/li>\n<li>Wireshark &#8211; Packet Class by <b>Didier Stevens<\/b>, teaching both simple and advanced Wireshark skills that are essential for security professionals and hackers. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Wireshark_Packet_Class\" target=\"_blank\">link<\/a>)<\/li>\n<li>Advanced Wi-Fi Pentesting by <b>Vivek Ramachandran<\/b>,&nbsp;based on the best selling book \u201cBacktrack 5 Wireless Penetration Testing&#8221; providing highly technical and in-depth treatment of Wi-Fi security. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Advanced_Wi-Fi_Pentesting\" target=\"_blank\">link<\/a>)<\/li>\n<li>Historical and Modern Cryptography for Security Professionals by <b>Chris Lytle &amp; Dan Crowley<\/b>, teaching you to&nbsp;understand modern cryptography based on historical cryptography and practical experience in analyzing and breaking. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Historical_and_Modern_Cryptography_for_Security_Professionals\" target=\"_blank\">link<\/a>)<\/li>\n<li>Telco Security: Hacking Core Network Protocols and Beyond by <b>Philippe Langlois<\/b>, covering&nbsp;Core Network protocols, standardized and proprietary telecom Core Network protocols from a security point of view. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Telco_Security:_Hacking_Core_Network_Protocols_and_Beyond\" target=\"_blank\">link<\/a>)<\/li>\n<li>Hands-on Penetration Testing by <b>Georgia Weidman<\/b>, giving you hands-\u00adon experience examining multiple facets of penetration testing following the Penetration Testing Execution Standard(PTES). (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Hands-on_Penetration_Testing\" target=\"_blank\">link<\/a>)<\/li>\n<li>ARM Android Xploitation by <b>Aseem Jakhar &amp; Aditya Gupta<\/b>,&nbsp;takes up one of the finest operating system used for smartphones a.k.a Android and tears it apart. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_ARM_Android_Xploitation\" target=\"_blank\">link<\/a>)<\/li>\n<li><span style=\"font-family: Times, Times New Roman, serif\">Practical Malware Analysis: Rapid Introduction by <b>Michael Sikorski<\/b>,&nbsp;<span style=\"background-color: white;line-height: 18px\">a rapid introduction to Malware Analysis and Reverse Engineering from the guy who wrote the book. (<a href=\"http:\/\/2014.brucon.org\/index.php\/Training_Practical_Malware_Analysis:_Rapid_Introduction\" target=\"_blank\">link<\/a>) (maximum attendees put at 40 due to being sold out rapidly *pun intended*)<\/span><\/span><\/li>\n<\/ul>\n<div><b><u>3 reasons<\/u> to register as soon as possible:<\/b><\/p>\n<ol style=\"text-align: left\">\n<li>Some of the aforementioned trainings have not reached their minimum attendee numbers which could result in a cancellation.&nbsp;<\/li>\n<li>As of 1-Sep you will pay <u>last-minute pricing<\/u> instead of the normal training price.<\/li>\n<li>If you need a reason to convince your boss :&nbsp;<i>&#8220;The only thing worse than training your employees and having them leave, is not training them and having them stay!&#8221;<\/i><\/li>\n<\/ol>\n<div>Registration on:&nbsp;<a href=\"https:\/\/registration.brucon.org\/training-registration\/\" class=\"broken_link\">https:\/\/registration.brucon.org\/training-registration\/<\/a><\/div>\n<div><\/div>\n<div>Kind regards,<\/div>\n<div><\/div>\n<div>BruCON team<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>BruCON 0x06 is getting close and we are putting everything in motion to have another great edition.This year, we have our largest trainings offering yet, again offering world-class, deep-dive technical trainings given by the most recognized experts with huge industry experience in their domain! A brief summary : Kali Linux Dojo by Mati Aharoni &#8220;Muts&#8221;,&nbsp;the founder and core developer of&nbsp;Kali Linux presents the first official all-day Kali Linux event. (link) Hardware Hacking by Joe Grand&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-832","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=832"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/832\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}