From BruCON 2015
Jump to: navigation, search
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ...on|Practical Malware Analysis: Rapid Introduction by Andrew Honig]] (3 day training) ...ion and Response|Tactical Exploitation and Response by Colin Ames]] (3 day training)
    3 KB (418 words) - 10:14, 17 September 2015
  • '''Day 3 – Pentesting SCADA Field and Floor Devices Continued''' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    9 KB (1,234 words) - 08:27, 5 September 2013
  • ...niques from an experienced exploit developer, at a conference. During this 3 day course, students will be able to learn all ins and outs about writing r ...elves. Combined with the way the course is built up, this will turn these 3 days into a truly unique experience.
    9 KB (1,415 words) - 09:18, 28 January 2014
  • 3. http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol3.pdf - Cha ===Day 3 – Pentesting ICS Field and Floor Devices Continued===
    9 KB (1,301 words) - 09:18, 28 January 2014
  • This training is based on the best selling book “Backtrack 5 Wireless Penetration Testi During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a
    3 KB (396 words) - 11:35, 25 August 2014
  • This training deals with performing digital forensics with open source tools on Windows a * Digital Forensics with Open Source tools is a training which aims to present only open source tools used at each step of an invest
    3 KB (492 words) - 10:59, 8 September 2014