Training

May 12-13-14-15, 2019

NorthSec is pleased to announce its high-quality training sessions, given by the absolute best experts in their field. We strive to provide you with the highest level of exclusive content, giving you a unique opportunity to improve your applied security knowledge during NorthSec.

Training Sessions include
Full ticket to the NorthSec Conference
Full ticket to the NorthSec Conference
Coffee, refreshments, snacks and lunch
Coffee, refreshments, snacks and lunch
Special Networking Event
Special Networking Event

This year’s sessions

Windows Enterprise Incident Response (Sold-Out)

  • John Atrache FireEye Mandiant

  • Lovell Smith FireEye Mandiant

  • Jess Hays FireEye Mandiant

  • Martin Tremblay FireEye Mandiant

May 13, 14 and 15th

This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms and investigate an incident throughout an enterprise. More information

Reverse Engineering Crash Course (Cancelled)

  • Filip Kafka ESET

May 13, 14 and 15th

Do you want to start with reverse engineering or malware analysis, and learn it from the ground up? Do you want to know how to examine closed source software to find bugs, or maybe even exploit it? Or do you just want to understand the low-level concepts, and dig deeper to learn how your source code is translated into the binary and then executed by the processor? Then this course is for you. More information

Windows Kernel Exploitation

  • Ashfaq Ansari Payatu Software Labs LLP.

May 13, 14 and 15th

This training is focused on exploitation of different Windows Kernel Mode vulnerabilities ranging from Pool Overflow to Use after Free. We will cover basics of Windows Kernel Internals and hands-on fuzzing of Windows Kernel Mode drivers. We will dive deep into exploit development of various kernel mode vulnerabilities. We will also look into different vulnerabilities in terms of code and the mitigations applied to fix the respective vulnerabilities. More information

Mastering Burp Suite Pro 100% Hands-On (Sold-Out)

  • Nicolas Gregoire Agarri

May 13, 14 and 15th

Burp Suite Pro is the leading tool for auditing Web applications at large. Mastering it allows users to get the most out of the tool, optimizing time spent. Work will be faster, more effective and more efficient. What’s more, advanced automation techniques allow detection of additional vulnerabilities whether complex or subtle. Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. More information

Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation

  • Dawid Czagan Silesia Security Lab

May 12, 13th

HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to earn $100 million by the end of 2020. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters. More information

Evil Mainframe Hacking

  • Philip Young

  • Chad Rikansrud RSM Partners

May 14, 15th

Have you ever been mid pentest with mainframe credentials and thought 'now what?' Or were you ever asked to do a mainframe pentest and didn't even know where to start? Maybe you're a sysprog and think your systems are impenetrable. No matter your background this course is for you! More information

Adversary Tactics: Red Team Ops (Sold-Out)

  • Ryan Cobb SpecterOps

  • Brian Reitz SpecterOps

  • Calvin Hedler SpecterOps

  • Lee Christensen SpecterOps

May 12, 13, 14 and 15th

Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a mature real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses. More information

Fine print

Dates

Training sessions take place right before the conference from Sunday til Wednesday. Dates vary by individual training, make sure to check. Training sessions start at 9am and finish at 5pm. Trainers can lengthen the schedule if they want to.

Included

  • Full ticket to the NorthSec Conference (Thursday and Friday)
  • Coffee, refreshments, snacks and lunch
  • Access to a special networking event with drinks on May 14th

If you already purchased your conference ticket, write us un email at registration@nsec.io to get a refund. Note that we reserve the right to cancel a training if a minimum number of participants isn’t met.

Pricing

See individual training pages for pricing.

  • Early bird until December 31st: 20% off*
  • Not-so Early bird until February 28th: 10% off*
  • Student pricing (50% off) is available upon request and on selected training. Contact us for details.
  • Prices are in $CAD before taxes and eventbrite fees

* NEW: There is a 5 ticket per training limit on the number of early bird and not-so early bird tickets. The next early bird pricing will be automatically available when the previous one is sold out.

Venue

The training sessions will be hosted at the Downtown Holiday Inn Hotel this year. See our Venue page for details.

Continuing Professional Education (CPE) Credits

We can emit proof of CPE credits for those who are certified through (ISC)2 upon request.

  • 16 CPE credits for a two-day training session
  • 24 CPE credits for a three-day training session
  • 32 CPE credits for a four-day training session