NorthSec is pleased to announce its high-quality training sessions, given by the absolute best experts in their field. We strive to provide you with the highest level of exclusive content, giving you a unique opportunity to improve your applied security knowledge during NorthSec.
FalconForce - Detection Engineering for Windows
Olaf Hartong FalconForce
Gijs Hollestelle FalconForce
Henri Hambartsumyan FalconForce
This class will be held in four half day, from 9am to 13pm EDT June 8th to 11th
Detection engineering is a methodology to research, develop and improve your detection capabilities. The Detection Engineering for Windows training brings you up-to-speed in 2 full day sessions. More information
SpecterOps - Adversary Tactics: Vulnerability Research for Operators
Relying on publicly available and stock tooling to leverage weaknesses in enterprise Windows environments to execute effective red team operations is becoming increasingly difficult. However, complex environments, with custom applications and configurations, often contain significant exploit potential attackers could utilize. Red team operators capable of taking advantage of these weaknesses can simulate more advanced adversaries, and help organizations remove difficult to identify attack chains. This course teaches the methodology and tools to find, triage, and utilize exploitable vulnerabilities on Windows systems in time-sensitive engagements. You will dive into the vulnerability classes that SpecterOps routinely finds in mature environments and practice methods of identification, triage, and exploitation. More information
Brian King - Modern WebApp Pentesting
Brian King Black Hills Information Security
This course is different from other webapp pentesting courses. Here, we focus first on the fundamental concepts that every web application requires, and then look at how those concepts are used in modern web applications. This helps a tester stay flexible as new technologies evolve, giving a mental framework that is valid and useful for any web-based system. The instructor has been a full-time webapp tester for more than 10 years and the lessons in this class are based on what real webapps look like today. More information
FortyNorth - Intrusion Operations
Chris Truncer FortyNorth
Matt Grandy FortyNorth
The Intrusion Operations class provides students a unique opportunity to learn and implement real-world techniques used by advanced adversaries. An attacker can easily break into an organization by abusing misconfigurations, but the inverse also applies - defenders can easily detect red teams and malicious actors using commodity malware, default indicators, and more. You will learn how to overcome enterprise defenses and hardened infrastructure. You will leverage custom tooling and advanced configurations to break into a simulated corporate network and develop targeted malware profiles to remain undetected. You will leave this class with the skills and tools to develop custom tradecraft for long term persistence. More information
Getting Your Hands Dirty: Understanding & Hunting Down Malware Attacks in Your Network
Veronica Valeros Czech Technical University
Sebastian Garcia Czech Technical University
This hands-on training teaches the essential know-how of malware traffic analysis: the experience and knowledge of understanding malware behaviors on the network. The core of the training is not about the tools, but the experience transmitted and gained by students. Students should leave with the knowledge to recognize malicious actions of malware in the network. More information
NCC Group - Offensive Cloud Security (Sold-Out)
While security awareness and collective experience regarding the Cloud has been steadily improving, one common difficulty is applying theoretical knowledge to real-life scenarios. This training’s goal is to help attendees bridge this gap by understanding how conventional technologies integrate with Cloud solutions. The training is scenario-based and focuses on applied exercises. More information
Charles Hamilton - Red Team Training (Sold-Out)
Charles Hamilton Egyde-KPMG
The purpose of the Red Team Training is to understand the underlying concept of red teaming. The training will cover payloads generation, lateral movement techniques, initial foothold and internal reconnaissance. The training is aiming to provide a deep understanding of all the previously described aspects of a red team. More information
Training sessions take place right after the conference from Tuesday till Friday. Dates vary by individual training, make sure to check. Training sessions start at 9am and finish at 5pm. Trainers can lengthen the schedule if they want to.
See individual training pages for pricing.
- Early bird until January 31st
- Student pricing (50% off) is available upon request and on selected training. Contact us for details.
- Prices are in $CAD before taxes and eventbrite fees
Continuing Professional Education (CPE) Credits
We can emit proof of CPE credits for those who are certified through (ISC)2 upon request.
- 16 CPE credits for a two-day training session
- 24 CPE credits for a three-day training session
- 32 CPE credits for a four-day training session