Red Team
-
Multiple InstructorsLive16 Hrs
Active Directory Security and Hardening
-
Multiple InstructorsLive16 Hrs
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
-
Multiple InstructorsLiveOD8 Hrs
Attacking and Defending AI
-
Multiple InstructorsLive16 Hrs
Attacking, Defending, and Leveraging AI-LLM Systems
Mar 15 - Mar 16
-
Beau BullockLiveOD16 Hrs
Breaching the Cloud
-
John StrandLive16 Hrs
Fundamentals of Android Application Security Testing
-
Doc BlackburnLive16 Hrs
Fundamentals of Cybersecurity: Threats and Defenses
-
Ralph MayLiveOD16 Hrs
HackerOps
-
Dale HobbsLiveOD16 Hrs
Hacking Active Directory: Fundamentals and Techniques
-
Ralph MayLive16 Hrs
Hacking and Defending Satellite Infrastructure
-
Multiple InstructorsLive16 Hrs
Intro to IoT Hacking
-
Steve BoroshLive16 Hrs
Intro to Penetration Testing of Non-Western IT Infrastructures
-
John StrandLiveOD16 Hrs
Introduction to Pentesting
-
BB KingLiveOD16 Hrs
Modern Webapp Pentesting
-
Multiple InstructorsLive16 Hrs
Offense for Defense
-
Chris TraynorLiveOD16 Hrs
Offensive Tooling for Operators
-
Chris TraynorLiveOD8 Hrs
Offensive Tooling Foundations
Mar 20
-
Tim MedinLive16 Hrs
Penetration Testing: Beyond the Basics
-
Carrie RobertsLiveOD16 Hrs
PowerShell for InfoSec: What You Need to Know
May 4 - May 5
-
Multiple InstructorsLive24 Hrs
Practical Physical Exploitation
-
Jordan BonaguraLive16 Hrs
Professionally Evil Application Security: From Mapping to Exploitation
-
Giovanni CofréLiveOD16 Hrs
Professionally Evil ICS & OT Fundamentals
-
Eric KuehnLive16 Hrs
Red Team Fundamentals for Active Directory
Mar 23 - Mar 24
-
Michael AllenLiveOD16 Hrs
Red Team Initial Access
-
Multiple InstructorsLive4 Hrs
Workshop: Hacking AI-LLM Applications
Mar 6
