10-11-12-13 mai 2020

NorthSec est heureux d’annoncer ses sessions de formation de haute qualité, données par les meilleurs experts absolus dans leur domaine. Nous nous efforçons de vous fournir le plus haut niveau de contenu exclusif, vous offrant ainsi une occasion unique d’améliorer vos connaissances en sécurité appliquée au cours de NorthSec.

Les formations incluent
Billet complet pour la conférence NorthSec
Billet complet pour la conférence NorthSec
Café, rafraîchissements, collations et dîner
Café, rafraîchissements, collations et dîner
Événement de réseautage spécial
Événement de réseautage spécial

Les formations de l’année 2020

IMPORTANT: Les formations seront données en anglais seulement.

Blackhoodie: Crash Course in Binary Exploitation

  • Mary Walker Malware Analysis Specialist

May 12, 13th

This two day workshop aims to shed some light on reverse engineering with a crash course in the wild and weird world of binary exploitation, or taking advantage of a software bug to get a program to do something you, a hacker, want it to. More information

Crypto Attacks and Defenses

  • JP Aumasson Teserakt

  • Philipp Jovanovic EPFL DEDIS Lab

May 12, 13th

This training familiarizes developers and security professionals of any level with modern cryptography concepts and best practices. It covers basic notions, including randomness generation, authenticated encryption, and elliptic curves, as well as applications like TLS 1.3, password security protocols, libraries and APIs, and software side-channel attacks. Finally, our training offers an overview of advanced topics including post-quantum cryptography. More information

Mastering Burp Suite Pro 100% Hands-On

  • Nicolas Gregoire Agarri

May 11, 12 and 13th

Burp Suite Pro is the leading tool for auditing Web applications at large. Mastering it allows users to get the most out of the tool, optimizing time spent. Work will be faster, more effective and more efficient. What’s more, advanced automation techniques allow detection of additional vulnerabilities whether complex or subtle. Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. More information

Advanced Web Hacking

  • Dhruv Shah NotSoSecure

May 11, 12 and 13th

Advanced Web Hacking class talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This class focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on class covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this class vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known. More information

Mastering Container Security

  • Rory McCune NCC Group

May 12, 13th

Containers and container orchestration platforms such as Kubernetes are on the rise throughout the IT world, but how do they really work and how can you attack or secure them? This course takes a deep dive into the world of Linux containers, covering fundamental technologies and practical approaches to attacking and defending container-based systems such as Docker and Kubernetes. In the 2020 version of the course we'll be focusing more on Kubernetes as it emerges as the dominant core of cloud native systems and looking at the wider ecosystem of products which are used in conjunction with Kubernetes. More information

Dark Side Ops: Malware Dev

  • SilentBreak Security

May 10, 11th

Dark Side Ops: Malware Dev focuses on the goals, challenges, architecture, and operations of advanced persistent threat (APT) tooling. Participants will dive deep into source code to gain a strong understanding of execution vectors, payload generation, automation, staging, command and control, and exfiltration. More information

Adversary Tactics: Detection

  • SpecterOps

May 10, 11, 12 and 13th

Enterprise networks are under constant attack from adversaries of all skill levels. Blue teamers are facing a losing battle; as the attacker only needs to be successful once to gain access. This course builds on standard network defense and incident response (which target flagging known malware) by focusing on abnormal behaviors and the use of attacker Tactics, Techniques, and Procedures (TTPs). We will teach you how to create threat hunting hypotheses based on attacker TTPs to perform threat hunting operations and detect attacker activity. In addition, you will use free and open source data collection and analysis tools (Sysmon, ELK and Automated Collection and Enrichment Platform) to gather and analyze large amounts of host information to detect malicious activity. You will use these techniques and toolsets to create threat hunting hypotheses and perform threat hunting in a simulated enterprise network undergoing active compromise from various types of threat actors. More information

Adversary Tactics: Red Team Ops

  • SpecterOps

May 10, 11, 12 and 13th

Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a mature real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses. More information

Les détails


Les séances de formation ont lieu juste avant la conférence du dimanche au mercredi. Les dates varient selon la formation, assurez-vous de vérifier. Les séances d’entraînement commencent à 9 heures et se terminent à 17 heures. Les formateurs peuvent étendre leur emploi du temps s’ils le souhaitent.


  • Billet complet pour la conférence NorthSec (jeudi et vendredi)
  • Café, rafraîchissements, collations et dîner
  • Accès à un événement spécial de réseautage avec boissons le 12 mai

Si vous avez déjà acheté votre billet de conférence, écrivez-nous à l’adresse suivante: pour obtenir un remboursement. Notez que nous nous réservons le droit d’annuler une formation si un nombre minimum de participants n’est pas atteint.


Voir les pages de formation spécifique pour les prix.

  • Réservation anticipée jusqu’au 31 décembre : 20% de réduction *
  • Oublié jusqu’au 29 février : 10% de réduction *
  • Le tarif étudiant (50% de réduction) est disponible sur demande et selon la formation choisie. Contactez-nous pour plus de détails.
  • Les prix sont en $ CAD avant taxes et frais Eventbrite

* NOUVEAU : Il y a une limite de 5 billets pour les trarifs “early bird” et “not-so early”. Le prochain tarif anticipé sera automatiquement disponible lorsque le précédent sera épuisé.


Les séances de formation auront lieu au Downtown Holiday Inn Hôtel cette année. Voir notre page Lieu pour plus de détails.

Crédits de formation professionnelle continue (CPE)

Nous pouvons émettre une preuve de crédits CPE pour ceux qui sont certifiés par (ISC) 2 sur demande.

  • 16 crédits CPE pour une session de formation de deux jours
  • 24 crédits CPE pour une session de formation de trois jours
  • 32 crédits CPE pour une session de formation de quatre jours