GET YOUR TICKET FOR ALL CONFERENCES, WORKSHOPS AND CHALLENGES

GENERAL TICKET
 
660€
VAT included
 

28th & 29th September

  • Access to the whole event from the Thursday morning to Friday afternoon (to conferences, workshops and challenges)
  • Access to the Thursday evening party
  • A Welcome coffee each mornings
  • 2 coffee breaks per day
  • Lunch is also provided during these 2 days (buffet style)
STUDENT PASS/UNEMPLOYED
 
96€
VAT included
 

28th & 29th September

  • Access to the whole event from the Thursday morning to Friday afternoon (to conferences, workshops and challenges)
  • Access to the Thursday evening party
  • A Welcome coffee each mornings
  • 2 coffee breaks per day
  • Lunch is also provided during these 2 days (buffet style)
BUNDLE PACK
FROM
3360€
VAT included
 

September 26th & 27th or September 25th, 26th & 27th

  • Access to one training on September 26th & 27th or September 25th, 26th & 27th
  • A Welcome coffee each mornings
  • 2 coffee breaks per day
  • Lunch is also provided during these 2 days (buffet style)

28th & 29th September

  • Access to the whole event from the Thursday morning to Friday afternoon (to conferences, workshops and challenges)
  • Access to the Thursday evening party
  • A Welcome coffee each mornings
  • 2 coffee breaks per day
  • Lunch is also provided during these 2 days (buffet style)

GET YOUR TICKET FOR A TRAINING

Buffer Overflow Exploitation
3 Days
25-26-27 sept
SysDream - Marc Legendre SysDream - Marc Legendre
4224€
VAT included
 

Cette formation vous permettra d’avoir une meilleure compréhension du fonctionnement de la mémoire sous Linux et Windows et des diverses protections en place afin de réaliser des exploitations applicatives avec succès.

Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
3 Days
25-26-27 sept
Dawid Czagan Dawid Czagan
4224€
VAT included
 

Modern IT systems are complex and it’s all about full-stack nowadays. To become a pentesting expert, you need to dive into full-stack exploitation and gain a lot of practical skills. That’s why I created the Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access.

Hacking Cloud Infrastructure
3 Days
25-26-27 sept
Manish Rohilla Manish Rohilla
4224€
VAT included
 

From build/migration to management/innovation, the pressure to secure cloud infrastructure is felt by all. Over 3 days you will deploy over 25 fresh and novel attacks via our state-of-the-art labs. At the end, you’ll be able to confidently and competently identify weaknesses in the cloud deployment.

Advanced Red Teaming: Weaponization & Adversary Simulation
3 Days
25-26-27 sept
Amr Thabet Amr Thabet
4224€
VAT included
 

This is a live instructor-led training that focuses on developing cyber weapons that can evade AV detection, EDR logs, and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your organization’s overall detections and security posture.

Bug Bounty
3 Days
25-26-27 sept
SysDream - Issam Rabhi SysDream - Issam Rabhi
4224€
VAT included
 

Cette formation dans laquelle les travaux pratiques ont un rôle central, présente le concept du bug bounty pour toute personne souhaitant acquérir des connaissances avancées dans ce domaine.

Il s’agit d’une formation issue de l’expérience du formateur sur les méthodologies et techniques utilisées par les bug hunters dans le cadre d’un programme de bug bounty.

L’objectif est de vous fournir des astuces nécessaires à la participation de programmes de bug bounty, en se basant sur des scénarios et des études de cas réels (publics et privés) et en mettant l’accent sur la mise en pratique via une session live de bug bounty.

Deep Dive into Fuzzing
3 Days
25-26-27 sept
Zubin Devnani Zubin Devnani Dhiraj Mishra Dhiraj Mishra
4224€
VAT included
 

Fuzzing is a technique of identifying software vulnerabilities by automated corpus generation. It has produced immense results and attracted a lot of visibility from security researchers and professionals in the industry.

Industrial Control Systems: Build, Break, Secure.
3 Days
25-26-27 sept
Arnaud Soullié Arnaud Soullié
4224€
VAT included
 

Discover the world of Industrial Control Systems security! A hands-on approach, with 3 words in mind:
– Build: how does it work?

– Break: what are the weaknesses and how to exploit it?

– Secure: what can we do to fix it?

Get your own personal virtual ICS setup, the WhiskICS simulation platform!

Advanced Ethical Hacking
3 Days
25-26-27 sept
SysDream - Erwan Robin SysDream - Erwan Robin
4224€
VAT included
 

Cette formation permet la mise en pratique de méthodologies d’attaques avancées, utilisées dans le cadre de tests d’intrusion et d’exploitation de vulnérabilités. La mise en situation par l’application confère une meilleure compréhension technique des attaques évoquées lors du cours. L’objectif est de vous fournir une meilleure appréhension des risques liés aux attaques informatiques.

Defending Enterprises - 2023 Edition
2 Days
26-27 sept
Will Hunt Will Hunt Owen Shearing Owen Shearing
2880€
VAT included
 

You’ll play a SOC analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA’s and IOC’s from a live enterprise breach executed by the trainers in real time. Whether you’re new to Kusto Query Language or a seasoned pro, there’s plenty for you in the 2-days!

Attacking 5G infrastructure and Defense
3 Days
25-26-27 sept
Akkib Sayad Akkib Sayad
4224€
VAT included
 

This Training will help security professional, telecom security,telecom professionals to get an understanding of the key concepts of 5G, security, different attacking technique. security threat modeling the implementation of such architectures and the impact in terms of related risks.

Sécurité des Applications Mobiles
3 Days
25-26-27 sept
SysDream - Guerric Eloi SysDream - Guerric Eloi
4224€
VAT included
 

Cette formation vous permettra de mettre en place une méthodologie offensive d’audit des applications mobiles sur Android et iOS. Les nombreux cas pratiques, fondés sur des cas réels, permettront aux apprenants de s’exercer au plus prêt de la réalité. Des approches différentes permettront de couvrir l’ensemble des possibilités de l’analyse des applications mobiles.