{"id":6,"date":"2018-06-02T12:02:36","date_gmt":"2018-06-02T12:02:36","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=6"},"modified":"2021-06-29T21:38:36","modified_gmt":"2021-06-29T19:38:36","slug":"tickets","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2021\/tickets\/","title":{"rendered":"Tickets"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Conference Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #b43836\">Ticket sale will start on June 1st 2021 at 5 PM CET.\u00a0<\/span><\/h5>\n<p style=\"text-align: center\"><strong>REMARK:<\/strong> Please check out <a href=\"https:\/\/archive.brucon.org\/2021\/covid-19-info-faq\/\" target=\"_blank\" rel=\"noopener\">this page<\/a> about the specifics regarding this ticket sale in light of the COVID-19 restrictions<\/p>\n<p>[\/vc_column_text][vc_column_text]<div class=\"ptsTableFrontedShell\">\n\t<!-- Style to display all tables correct-->\n\t<!-- this block will be remove in frontend.tables.editor.block.base after init -->\n\t<div class=\"ptsPreDisplayStyle\">\n\t\t<style>\n\t\t\t.ptsBlock {\n\t\t\t\topacity: 0;\n\t\t\t\tvisibility: hidden;\n\t\t\t}\n\t\t<\/style>\n\t<\/div>\n\t<div id=\"ptsBlock_358261\" data-original-id=\"7\" class=\"ptsBlock \" data-id=\"8\">\n\t\t\t<style type=\"text\/css\" class=\"ptsBlockStyle\">#ptsBlock_358261 {  width:100%;}\n\n#ptsBlock_358261 .ptsCol {      width:33.333333333333%;}\n\n#ptsBlock_358261 .ptsTableDescCol {    display: none;}\n\n#ptsBlock_358261 .ptsCol.ptsTableDescCol .ptsColFooter {\n\tvisibility: hidden;\n}\n\n#ptsBlock_358261 p {\n  margin: 0;\n}\n\n\/*Animations*\/\n#ptsBlock_358261 .ptsCol .ptsTableElementContent,\n#ptsBlock_358261 .ptsCol .ptsTableElementContent span {\n  transition: all 0.3s ease;\n    -webkit-transition: all 0.3s ease;\n    -moz-transition: all 0.3s ease;\n    -ms-transition: all 0.3s ease;\n    -o-transition: all 0.3s ease;\n}\n\n#ptsBlock_358261 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -webkit-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -moz-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n#ptsBlock_358261 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n\/** Template Style **\/\n#ptsBlock_358261 .ptsTableElementContent {\n    background:#fff;\n    border: solid 1px#f0f0f0;\n    box-shadow: 0 0 20px -2px #00000000;\n    position: relative;\n}\n\n#ptsBlock_358261 .ptsColHeader,\n#ptsBlock_358261 .ptsColDesc {\n    background:#fafafa;\n    padding: 40px 5px 30px 5px;\n  \tposition: relative;\n}\n\n#ptsBlock_358261 .ptsColDesc:before {\n\tcontent: '';\n  \tposition: absolute;\n  \tleft: 25%;\n  \tbottom: 0;\n  background-color:#333;\n  \theight: 1px;\n  \twidth: 50%;\n}\n\n#ptsBlock_358261 .ptsColHeader .ptsIcon i {\n\tfont-size: 55px;\n  \tcolor:#333;\n}\n\n#ptsBlock_358261 .ptsColHeader span,\n#ptsBlock_358261 .ptsColHeader p {\n    font-size: 28px;\n    color:#333;\n}\n\n#ptsBlock_358261 .ptsColDesc {\n    padding: 0 5px 20px 5px;\n}\n\n#ptsBlock_358261 .ptsRows {\n\tpadding-top: 20px;\n}\n\n#ptsBlock_358261 .ptsColDesc span,\n#ptsBlock_358261 .ptsColDesc p {\n    font-size: 24px;\n  \tcolor:#333;\n}\n\n#ptsBlock_358261 .ptsCell {\n  color:#333;\n}\n\n#ptsBlock_358261 .ptsCell span,\n#ptsBlock_358261 .ptsCell p {\n  font-size: 14px;\n}\n\n#ptsBlock_358261 .ptsColFooter {\n  padding: 20px 0 20px 0;\n}\n\n#ptsBlock_358261 .ptsColFooter .ptsActBtn a {\n    background-color:#fafafa;\n    text-decoration: blink;\n \tcolor:#fff;\n    font-size: 18px;\n    padding: 10px 20px;\n    border-radius: 4px;\n    position: relative;\n  \ttext-align: center;\n}\n\n#ptsBlock_358261 .ptsColFooter .ptsActBtn {\n\tmargin: 10px 0;\n  \ttext-align: center;\n}\n\n#ptsBlock_358261 .ptsColFooter .ptsActBtn a:before {\n    content: '';\n    position: absolute;\n    top: 0;\n    right: 0;\n    left: 0;\n    bottom: 0;\n    background-color: #fff;\n    opacity: 0;\n    transition: all .5s ease-out;\n}\n\n#ptsBlock_358261 .ptsColFooter .ptsActBtn a:hover:before {\n    opacity: .3;\n}<\/style>\n\t\t\t\t<div class=\"ptsBlockContent\"><div class=\"ptsContainer\">\n\t<div class=\"ptsColsWrapper ui-sortable\">\n\t\t<!-- Start Test Element -->\n             \t<div class=\"ptsEl ptsCol ptsCol-0 ptsElWithArea ptsTableDescCol\" data-el=\"table_col_desc\" style=\"min-height: auto;width: 33.3333%\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-pencil\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\"><i class=\"fa fa-2x ptsInputShell fa-pencil\"><\/i><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> PLAN - PRICE <\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Description<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 12px;background-color: #333\">READ MORE<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #333\">BUY NOW<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \t       \t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-1\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-space-shuttle\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\" target=\"_blank\"><i class=\"fa fa-2x ptsInputShell fa-space-shuttle\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Personal - \u20ac 150 (Early) \/&nbsp;<\/span><\/p><p><span style=\"text-align: center\" data-mce-style=\"text-align: center;\">\u20ac 200 (Normal)<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"><\/span><\/p><p><span data-mce-style=\"\">Personal tickets are for<\/span><\/p><p><span data-mce-style=\"\">individuals where the&nbsp;<\/span><\/p><p><span data-mce-style=\"\">company does not <\/span><\/p><p><span data-mce-style=\"\">reimburse&nbsp; or pays for your tickets.<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon0x0d.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-2\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-briefcase\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\"><i class=\"fa fa-2x ptsInputShell fa-briefcase\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> Business - \u20ac&nbsp;480&nbsp;<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>If your company pays for your entrance,<\/p><p>please purchase a business ticket.<\/p><p><span data-mce-style=\"\">Doing it this way, allows us to <\/span><\/p><p><span data-mce-style=\"\">keep the conference affordable <\/span><\/p><p><span data-mce-style=\"\">for everyone!&nbsp;<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon0x0d.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-3\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\" id=\"\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-university\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\"><i class=\"fa fa-2x ptsInputShell fa-university\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Student&nbsp;- \u20ac 75<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>Tickets for students only,<\/p><p>you will have to provide a&nbsp;<\/p><p>valid student ID.&nbsp;<\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon0x0d.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \n\t\t\n\t\t<!-- End Test Element -->\n\t<\/div>\n\t<div style=\"clear: both\"><\/div>\n<\/div><\/div>\n\t\t<a title=\"WordPress Pricing Table\" style=\"display:none;\" href=\"https:\/\/supsystic.com\/plugins\/pricing-table\/?utm_medium=love_link_hide\" target=\"_blank\">WordPress Pricing Table<\/a><div style=\"clear: both;\"><\/div><\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<b>Conference training\u00a0<\/b>is taking place between 4 and 6 October 2021. Depending on the evolution of the current pandemic, this will be either virtually or in person. Check out the <a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/\" target=\"_blank\" rel=\"noopener\">training page<\/a> for more information[\/vc_column_text][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Advanced&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong> The Corelan \u201cADVANCED\u201d exploit development class is a fast-paced, mind-bending, hands-on course where you will learn advanced exploit development techniques from an experienced exploit developer. During this (typically 3 \u2018long\u2019 day) course, students will get the opportunity to learn how to write exploits that bypass modern memory protections for the Win32 platform, using Windows 7 and Windows 10 as the example platform, but using techniques that can be applied to other operating systems an applications. We will discuss differences between Windows 7 and Windows 10 and explore previously undocumented techniques to achieve important exploitation primitives in Windows 10.\u00a0 The trainer will share his \u201cnotes from the field\u201d and various tips &amp; tricks to become more effective at writing exploits. This is most certainly not an entry level course. In fact, this is one of the finest and most advanced courses you will find on Win32 exploit development.<\/p>\n<p><strong>REMARK :<\/strong> This training starts at 9:00 and will end around 22:00 PM. That means +10 hours each day (Dinner will be foreseen)<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Type: <\/strong>In-person<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/corelan-advanced\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e32529fb32197 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e32529fb32197 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e32529fb32197    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Practical DevSecOps &#8211; Continious Security in the age of cloud&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>Ever wondered how to handle the deluge of security issues and reduce the cost of fixing before software goes to production? How unicorns like Google, Facebook, Amazon, Etsy handle security at scale? In Practical DevSecOps training, you will learn how to handle security at scale using DevSecOps practices. We will start o\ufb00 with the basics of the DevOps, DevSecOps and move towards advanced concepts such as Security as Code, Compliance as Code, Con\ufb01guration management, Infrastructure as code, etc.,<\/p>\n<p>The training will be based on DevSecOps Studio, a distribution for DevSecOps enthusiasts. We will cover real-world DevSecOps tools and practices in order to obtain an in-depth understanding of the concepts learned as part of the course. We will also cover how to use static analysis (SAST), Dynamic Analysis (DAST), OS hardening and Security Monitoring as part of the Secure SDLC and how to select tools that fit your organization\u2019s needs and culture. After the training, the students will be able to successfully hack and secure applications before hackers do.<\/p>\n<p>This course will cover the following DevSecOps topics and techniques:<\/p>\n<ul>\n<li>Overview of DevSecOps<\/li>\n<li>Overview of the Tools of the trade<\/li>\n<li>Secure SDLC and CI\/CD pipeline<\/li>\n<li>Security Requirements and Threat Modelling (TM)<\/li>\n<li>Static Analysis(SAST) in CI\/CD pipeline<\/li>\n<li>Dynamic Analysis(DAST) in CI\/CD pipeline<\/li>\n<li>Runtime Analysis(RASP\/IAST) in CI\/CD pipeline<\/li>\n<li>Infrastructure as Code(IaC) and Its Security<\/li>\n<li>Secrets management on mutable and immutable infra<\/li>\n<li>Vulnerability Management with custom tools<\/li>\n<\/ul>\n<p><strong>Instructor: <\/strong>Mohammed A. \u201csecfigo\u201d Imran and Marudhamaran Gunasekaran<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Type:<\/strong> <del>In-person<\/del> (Virtual)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/practical-devsecops-continuous-security-in-the-age-of-cloud\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a00f9885 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a00f9885 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a00f9885    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Assessing and Exploiting PLCs&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description: <\/strong>This is not your traditional SCADA\/ICS\/IIoT security course! How many courses send you home with a PLC and non-expiring software to program it?!? This course teaches hands-on penetration testing techniques used to test PLCs, including their logic, field buses, network protocols, and proprietary maintenance interfaces. Skills you will learn in this course will apply directly to any current or past PLC in the industry. This course is structured around the formal penetration testing methodology created by ControlThings LLC and their opensource suite of tools found at ControlThings.io.<\/p>\n<p><strong>Instructor: <\/strong>Justin Searle<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Type:<\/strong> In-person<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/assessing-and-exploiting-plcs\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a05d5090 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a05d5090 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a05d5090    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Azure AD Attacks for Red and Blue Teams &#8211; Basic Edition&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>More than 95 percent of Fortune 500 use Azure today! A huge number of organizations now\u00a0 use Azure AD as an Identity and Access Management platform using the hybrid cloud model.\u00a0 This makes it imperative to understand the risks associated with Azure AD as not only the\u00a0 Windows infrastructure and apps use it but also identities of users across an enterprise are\u00a0 authenticated using it.<\/p>\n<p>In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications\u00a0 and infrastructure to Azure AD brings some very interesting opportunities and risks too. Often complex to understand, this setup of components, infrastructure and identity is a security\u00a0 challenge.\u00a0This hands-on training aims towards abusing Azure AD and a number of services offered by it.\u00a0 We will cover multiple complex attack lifecycles against a lab containing\u00a0<b>multiple live Azure\u00a0 tenants<\/b>.<\/p>\n<p>All the phases of Azure red teaming and pentesting \u2013 Recon, Initial access, Enumeration,\u00a0 Privilege Escalation, Lateral Movement, Persistence and Data mining are covered. We will also\u00a0 discuss detecting and monitoring for the techniques we use.<\/p>\n<p>The course is a mixture of fun, demos, exercises, hands-on and lecture. The training focuses\u00a0 more on methodology and techniques than tools.<\/p>\n<p>If you are a security professional trying to improve your skills in Azure AD cloud security, Azure\u00a0 Pentesting or Red teaming the Azure cloud this is the right class for you!<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Type:<\/strong> Virtual<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/azure-ad-attacks-for-red-and-blue-teams-basic-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a0b47578 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a0b47578 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a0b47578    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;A Complete Practical Approach to Malware Analysis and Memory Forensics&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffca&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>This hands-on training teaches the concepts, tools, and techniques to analyze, investigate and hunt malwares by combining two powerful techniques malware analysis and memory forensics.This course will introduce attendees to basics of malware analysis, reverse engineering, Windows internals and memory forensics, it then gradually progresses deep into more advanced concepts of malware analysis &amp; memory forensics.<\/p>\n<p>Attendees will learn to perform static, dynamic, code and memory analysis. This course consists of scenario-based hands-on labs after each module which involves analyzing real-world malware samples and infected memory images (crimeware, APT malware, fileless malwares, Rootkits etc). This hands-on training is designed to help attendees gain a better understanding of the subject in short span.<\/p>\n<p>Throughout the course, the attendees will learn the latest techniques used by the adversaries to compromise and persist on the system. The training also demonstrates how to integrate the malware analysis and forensics techniques into a custom sandbox to automate the analysis of malicious code. After taking this course attendees will be better equipped with skills to analyze, investigate and respond to malware-related incidents.<\/p>\n<p><strong>Instructor:<\/strong>Monnappa K A<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Type:<\/strong> Virtual<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/a-complete-practical-approach-to-malware-analysis-and-memory-forensics\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a0fc773 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a0fc773 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a0fc773    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Operational Threat Intelligence&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>When used properly, cyber threat intelligence allows an organization to leverage another\u2019s breach or incident to their own benefit. Yet while many cyber threat intelligence courses and guides exist, these are primarily designed for developing long-range, in-depth intelligence products for strategic or similar overview with an overemphasis on theory and little experience in practice. Operational threat intelligence instead supports a different audience: day to day security work and network defense. While cyber threat intelligence must always meet standards for accuracy, relevancy, and timeliness, SOC watch-standers and IR personnel need enriched information now in order to execute their jobs.<\/p>\n<p>This course fills a critical role that other training does not address: how to successfully embed cyber threat intelligence operations into the daily rhythm of security to support everyday tasks, and extraordinary incidents. Toward that end, while this course will briefly touch on theoretical concepts such as analysis of competing hypotheses, kill chain methodology, and other ideas, the real focus will be on what efforts make operational threat intelligence possible and sustainable:<\/p>\n<ul>\n<li>Establishing roles, responsibilities, and service agreements in advance.<\/li>\n<li>Determining priorities, intelligence requirements, and customer threat landscape.<\/li>\n<li>Molding threat intelligence information to security tools to make enriched information useful and actionable.<\/li>\n<li>How to analyze internal and external data sources to extract actionable threat intelligence for operational defenders.<\/li>\n<li>An extensive walk-through of IOC analysis, pivoting, and information enrichment to demonstrate how to better equip defenders to respond to emerging threats.<\/li>\n<li>Discussions on reporting, feedback, and closing the intelligence loop to definitively show how threat intelligence operations link to SOC, IR, and security policy entities.<\/li>\n<\/ul>\n<p>The course then concludes with the nature of pivoting, data and observable enrichment, and quick analysis reporting to close out instruction.<\/p>\n<p>Attendees will receive a certificate of completion following the course to record for training and CPE purposes.<\/p>\n<p><strong>Instructor: <\/strong>Joe Slowik<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday)<\/p>\n<p><strong>Type:<\/strong> In-person<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/operational-threat-intelligence\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a1431838 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a1431838 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a1431838    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Defending Enterprises \u2013 NEW for 2021!&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcb&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>New for 2021, our immersive 2-day Defending Enterprises training is the natural counterpart to our popular Hacking Enterprises course. From SIEM configuration to monitoring, alerting and threat hunting, you\u2019ll play a SOC analyst in our cloud-based lab and try to rapidly locate IOA\u2019s and IOC\u2019s from an enterprise breach.<\/p>\n<p>You\u2019ll use a combination of Microsoft Azure Sentinel and Elastic platforms to perform practical exercises. In each instance, filters and\/or expressions will be supplied for both platforms (where applicable). We know 2 days isn\u2019t a lot of time, so you\u2019ll also get 14-days FREE lab time after class and Discord<br \/>\naccess for support.<\/p>\n<p><strong>Instructor: <\/strong>Owen Shearing and William Hunt<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday)<\/p>\n<p><strong>Type:<\/strong> <del>In-person<\/del> (Virtual)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/defending-enterprises\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a1883492 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a1883492 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a1883492    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Black Belt Pentesting \/ Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation (Virtual &#8211; Live online training)&#8221; tab_id=&#8221;1528018036023-50094a93-3fee&#8221;][vc_column_text]<strong>Description: <\/strong>HackerOne bug hunters have earned over $100 million in bug bounties so far. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters.<\/p>\n<p>Modern web applications are complex and it\u2019s all about full-stack nowadays. That\u2019s why you need to dive into full-stack exploitation if you want to master web attacks and maximize your payouts. Say \u2018No\u2019 to classical web application hacking. Join this unique hands-on training and become a full\u2011stack exploitation master.<\/p>\n<p><a href=\"https:\/\/silesiasecuritylab.com\/black-belt-pentesting-bug-hunting-millionaire-mastering-web-attacks-with-full-stack-exploitation\/?v=BruCON\" target=\"_blank\" rel=\"noopener\"><strong>Watch 3 exclusive videos (~1 hour)<\/strong><\/a>\u00a0and feel the taste of this live online training<\/p>\n<p>After completing this live online training, you will have learned about \u2026<\/p>\n<ul>\n<li>REST API hacking<\/li>\n<li>AngularJS-based application hacking<\/li>\n<li>DOM-based exploitation<\/li>\n<li>bypassing Content Security Policy<\/li>\n<li>server-side request forgery<\/li>\n<li>browser-dependent exploitation<\/li>\n<li>DB truncation attack<\/li>\n<li>NoSQL injection<\/li>\n<li>type confusion vulnerability<\/li>\n<li>exploiting race conditions<\/li>\n<li>path-relative stylesheet import vulnerability<\/li>\n<li>reflected file download vulnerability<\/li>\n<li>subdomain takeover<\/li>\n<li>XML attacks<\/li>\n<li>deserialization attacks<\/li>\n<li>HTTP parameter pollution<\/li>\n<li>bypassing XSS protection<\/li>\n<li>clickjacking attack<\/li>\n<li>window.opener tabnabbing attack<\/li>\n<li>RCE attacks<\/li>\n<li>and more..<\/li>\n<\/ul>\n<p><strong>Instructor: <\/strong>Dawid Czagan<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/black-belt-pentesting-bug-hunting-millionaire-mastering-web-attacks-with-full-stack-exploitation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252a1ca8113 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252a1ca8113 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252a1ca8113    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Spring Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center\"><strong>Spring Training program and tickets will be made available <span style=\"color: #b43836\">December 2020<\/span><\/strong><\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;200px&#8221;][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Exploit Dev Bootcamp for Windows 10 (In person)&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong> The Corelan\u00a0 Exploit Dev Bootcamp for Windows 10 is a truly unique opportunity to learn both basic &amp; advanced techniques from an experienced exploit developer, at a conference. During this (typically 3 \u2018long\u2019 day) course, students will be able to learn all ins and outs about writing reliable exploits for the Windows platform.\u00a0 The trainer will share his \u201c<em>notes from the field<\/em>\u201d and various tips &amp; tricks to become more effective at writing exploits.<\/p>\n<p><strong>Remarks :\u00a0<\/strong><\/p>\n<ul>\n<li>This training will be hosted onsite in Ghent Belgium in the Novotel Ghent Centrum. Please read the FAQ below for more information.<\/li>\n<\/ul>\n<p><strong>Update 8 March 2021 :\u00a0<\/strong>We decided to move this training to 2,3 and 4 June 2021 to allow it to be easier for the students to join us given the current COVID restrictions.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong>\u00a03-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/corelan-bootcamp-exploit-development-for-windows-10\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a> [\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b1736559 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b1736559 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b1736559    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0d-spring-training-corelan.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;SOC-Class &#8211; BruCON 0x0D Edition (Virtual)&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This course provides a comprehensive picture of a Cyber Security Operations Center (CSOC or SOC). Discussion on the technology needed to run a SOC are handled in a vendor agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well as budgets with global scope. Staff roles needed are enumerated. Informing and training staff through internal training and information sharing is addressed.<\/p>\n<p>The interaction between functional areas and data exchanged is detailed. Processes to coordinate the technology, the SOC staff, and the business are enumerated. After attending this class, the participant will have a roadmap (and Gantt chart) for what needs to be done in the organization seeking to implement security operations.<\/p>\n<p><strong>Instructor: <\/strong>Christopher Crowley<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/soc-class-brucon-0x0d-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b1ce9130 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b1ce9130 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b1ce9130    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-spring.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking Enterprises &#8211; 2021 Edition (Virtual)&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description: <\/strong>This is an immersive hands-on course aimed at a technical audience. Over 3 days we will fully compromise a simulated enterprise covering a multitude of TTP&#8217;s. The training is based around modern operating systems, using modern techniques and emphasising the exploitation of configuration weaknesses rather than throwing traditional exploits. This means logical thinking and creativity will definitely be put to the test.<\/p>\n<p><strong>Instructor: <\/strong>Owen Shearing \/ Will Hunt<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/hacking-enterprises-2021-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b219750 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b219750 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b219750    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-spring.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Active Directory Attacks for Red and Blue Teams &#8211; Advanced Edition (Virtual)&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description: <\/strong>Enterprises are managed using Active Directory (AD) and it often forms the backbone of the complete enterprise network. Therefore, to secure an enterprise from an adversary, it is inevitable to secure its AD environment. To secure AD, you must understand different techniques and attacks used by adversaries against it. Often burdened with maintaining backward compatibility and interoperability with a variety of products, AD environments lack ability to tackle latest threats.<\/p>\n<p>This training is aimed towards attacking modern AD Environment using built-in tools like PowerShell and other trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/active-directory-attacks-for-red-and-blue-teams-advanced-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b2616011 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b2616011 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b2616011    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-spring.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking and Securing Cloud Infrastructure (Virtual)&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcb&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>This 3-day course cuts through the mystery of Cloud Services (including AWS, Azure, and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical.<\/p>\n<p>This course covers both the theory as well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure. Prior pentest\/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.<\/p>\n<p><strong>Instructor: <\/strong>Scott Isaac<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/hacking-and-securing-cloud-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b2a6770 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b2a6770 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b2a6770    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-spring.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Deep Dive into Fuzzing (Virtual)&#8221; tab_id=&#8221;1528018036023-50094a93-3fed&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Attendees would be emulating techniques which would provide a comprehensive understanding of \u201cCrash, Detect &amp; Triage\u201d of fuzzed binaries or software. In \u201cDeep dive into fuzzing\u201d we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.<\/p>\n<p>Finding vulnerabilities in software requires in-depth knowledge of different technology stacks. Modern day software\u2019s have a huge codebase and may contain vulnerabilities, manually verifying such vulnerabilities is a tedious task and may not be possible in all cases. This training is designed in such a way that it introduces the concept of fuzzing and vulnerability discovery in software\u2019s covering multiple platforms such as Linux &amp; Windows and triage analysis for those vulnerabilities<\/p>\n<p><strong>Instructor: <\/strong>Dhiraj Mishra \/ Zubin Devnani<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Thursday 22nd of April)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2021\/brucon-2021-training\/deep-dive-into-fuzzing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e3252b2ec6174 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e3252b2ec6174 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e3252b2ec6174    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0d-spring.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][vc_empty_space height=&#8221;200px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Conference Tickets [\/vc_column_text][vc_column_text] Ticket sale will start on June 1st 2021 at 5 PM CET.\u00a0 REMARK: Please check out this page about the specifics regarding this ticket sale in light of the COVID-19 restrictions [\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Training Tickets [\/vc_column_text][vc_column_text]Conference training\u00a0is taking place between 4 and 6 October 2021. Depending on the evolution of the current pandemic, this will be either virtually or in person. Check out the training page for more information[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] Spring Training&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":47,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":2805,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/pages\/6\/revisions\/2805"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}