From BruCON 2015
- 04:28, 3 October 2015 Hacker Run (hist) [483 bytes] Seba (talk | contribs) (Created page with "=Hacker Run= What better way is there to start the second conference day than running 10km with a bunch of hackers? Put on your running shoes and join us at the entrance of...")
- 10:40, 26 May 2015 Training 2015 - Offensive IoT Exploitation (hist) [5,329 bytes] Tom.Gilis (talk | contribs) (Created page with "=Offensive IoT Exploitation= ==Objectives== IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up eve...")
- 14:02, 15 May 2015 Training 2015 - Assessing and Exploiting Control Systems (hist) [10,511 bytes] Tom.Gilis (talk | contribs) (Created page with "=Tactical Exploitation and Response= ===Course Description=== This is not your traditional SCADA security course! How many courses send you home...")
- 20:47, 28 April 2015 Training 2015 - Cyber Breach Management (hist) [2,166 bytes] Tom.Gilis (talk | contribs) (Created page with "=Cyber Breach Management= ===Course Description=== The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach...")
- 20:51, 21 January 2015 Training 2015 - Tactical Exploitation and Response (hist) [5,034 bytes] Tom.Gilis (talk | contribs) (Created page with "=Tactical Exploitation and Response= ===Course Description=== This unique class offers a view into attacker and defender models in one single session. Tactical Exploitation...") originally created as "Spring Training 2015 - Tactical Exploitation and Response"
- 20:16, 21 January 2015 Training 2015 - Wireshark WiFi and Lua-Packet Class (hist) [8,975 bytes] Tom.Gilis (talk | contribs) (Created page with "=Wireshark Wifi training= ===Course Description=== TBC = Requirements = THC =Trainers Biography= 125px Didier Stevens (Security Consultan...") originally created as "Spring Training 2015 - Wireshark WiFi and Lua-Packet Class"
- 12:23, 21 January 2015 Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more (hist) [3,892 bytes] Tom.Gilis (talk | contribs) (Created page with "TEST") originally created as "Spring Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more"
- 20:07, 12 January 2015 Spring Training 2015 - Red Team Testing (hist) [4,112 bytes] Tom.Gilis (talk | contribs) (Created page with "his is is NOT a tools course! Becoming proficient in Red Teaming is NOT something that can be taught only in a classroom. We will have multiple field exercises as well as hand...")
- 15:44, 9 January 2015 Training 2015 - Practical Malware Analysis - Rapid Introduction (hist) [3,344 bytes] Tom.Gilis (talk | contribs) (Created page with "=Practical Malware Analysis: Rapid Introduction= ===Course Description=== Get a rapid introduction to Malware Analysis and Reverse Engineering from the guy who wrote the book...") originally created as "Spring Training 2015 - Practical Malware Analysis - Rapid Introduction"