Formation

10-11-12-13 mai 2020

NorthSec est heureux d’annoncer ses sessions de formation de haute qualité, données par les meilleurs experts absolus dans leur domaine. Nous nous efforçons de vous fournir le plus haut niveau de contenu exclusif, vous offrant ainsi une occasion unique d’améliorer vos connaissances en sécurité appliquée au cours de NorthSec.

Dans la vague du COVID-19 nous avons dû annuler certaines formations et d'autres ont été converties dans un format en ligne. Nous savons par expérience qu'une formation en ligne ne remplace pas une formation en personne. C'est pourquoi nous avons déployé de très grands efforts pour nos participants:

  • un coût réduit pour les formations en-ligne
  • la possibilité d'avoir un remboursement complet ou un transfert
  • la meilleure expérience possible de formation en ligne incluant une assistance présente par notre équipe

Les formations de l’année 2020

IMPORTANT: Les formations seront données en anglais seulement.

Crypto Attacks and Defenses (Annulé)

  • JP Aumasson Teserakt

  • Philipp Jovanovic EPFL DEDIS Lab

May 12, 13th

This training familiarizes developers and security professionals of any level with modern cryptography concepts and best practices. It covers basic notions, including randomness generation, authenticated encryption, and elliptic curves, as well as applications like TLS 1.3, password security protocols, libraries and APIs, and software side-channel attacks. Finally, our training offers an overview of advanced topics including post-quantum cryptography. More information

Mastering Burp Suite Pro 100% Hands-On (Annulé)

  • Nicolas Gregoire Agarri

May 11, 12 and 13th

Burp Suite Pro is the leading tool for auditing Web applications at large. Mastering it allows users to get the most out of the tool, optimizing time spent. Work will be faster, more effective and more efficient. What’s more, advanced automation techniques allow detection of additional vulnerabilities whether complex or subtle. Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. More information

Advanced Web Hacking

  • Dhruv Shah NotSoSecure

May 11, 12 and 13th

Advanced Web Hacking class talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This class focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on class covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this class vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known. More information

Mastering Container Security

  • Rory McCune NCC Group

May 12, 13th

Containers and container orchestration platforms such as Kubernetes are on the rise throughout the IT world, but how do they really work and how can you attack or secure them? This course takes a deep dive into the world of Linux containers, covering fundamental technologies and practical approaches to attacking and defending container-based systems such as Docker and Kubernetes. In the 2020 version of the course we'll be focusing more on Kubernetes as it emerges as the dominant core of cloud native systems and looking at the wider ecosystem of products which are used in conjunction with Kubernetes. More information

Dark Side Ops: Malware Dev

  • SilentBreak Security

May 10, 11th

Dark Side Ops: Malware Dev focuses on the goals, challenges, architecture, and operations of advanced persistent threat (APT) tooling. Participants will dive deep into source code to gain a strong understanding of execution vectors, payload generation, automation, staging, command and control, and exfiltration. More information

Adversary Tactics: Detection

  • SpecterOps

May 11, 12, 13 and 14th

Enterprise networks are under constant attack from adversaries of all skill levels. Blue teamers are facing a losing battle; as the attacker only needs to be successful once to gain access. This course builds on standard network defense and incident response (which target flagging known malware) by focusing on abnormal behaviors and the use of attacker Tactics, Techniques, and Procedures (TTPs). We will teach you how to create threat hunting hypotheses based on attacker TTPs to perform threat hunting operations and detect attacker activity. In addition, you will use free and open source data collection and analysis tools (Sysmon, ELK and Automated Collection and Enrichment Platform) to gather and analyze large amounts of host information to detect malicious activity. You will use these techniques and toolsets to create threat hunting hypotheses and perform threat hunting in a simulated enterprise network undergoing active compromise from various types of threat actors. More information

Adversary Tactics: Red Team Ops

  • SpecterOps

May 11, 12, 13 and 14th

Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a mature real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses. More information

Les détails

Dates

Les séances de formation ont lieu juste avant la conférence du dimanche au jeudi. Les dates varient selon la formation, assurez-vous de vérifier. Les séances d’entraînement commencent généralement à 9 heures et se terminent à 17 heures. Les formateurs peuvent légèrement ajuster leur emploi du temps s’ils le souhaitent.

Prix

Voir les pages de formation spécifique pour les prix.

  • Le tarif étudiant (50% de réduction) est disponible sur demande et selon la formation choisie. Contactez-nous pour plus de détails.
  • Les prix sont en $ CAD avant taxes et frais Eventbrite

Lieu de formation en ligne

Nous évaluons toujours les différentes options de formation en ligne actuellement.

Crédits de formation professionnelle continue (CPE)

Nous pouvons émettre une preuve de crédits CPE pour ceux qui sont certifiés par (ISC) 2 sur demande.

  • 16 crédits CPE pour une session de formation de deux jours
  • 24 crédits CPE pour une session de formation de trois jours
  • 32 crédits CPE pour une session de formation de quatre jours