Training

Social Media

Sponsors












Advertisement

Training

In addition to the lecture tracks, we have specialized and in-depth training courses available before the conference proper. Please review the available courses listed below if you are interested in advanced training.

All training courses listed are available, however in order to ensure that it is worth our trainers' time and effort, each course is pre-registration only until the attendance threshold indicated is met. Once the attendance threshold is met, pre-registrants will be contacted with full registration and tuition payment instructions. Please pre-register for courses listed below by clicking the PRE-REGISTRATION link on the course listing.

Please use the navigation menu to the left to quickly jump to the desired course.

Eric Michaud
Brian O'Shea

Tuition: $2000.00
Discount: 10% for groups of 5 or more
Dates: April 8th - 10th
Minimum Attendance Threshold: 25
CANCELLED

Reception Reception

Art of Escape participants can expect to garner skills such as how to pick, bypass, and open locks, open handcuffs, duct tape, and rope, as well as effectively utilize social engineering and active confidence schemes to their advantage. This three-day-long intensive, led by head trainer Brian O'Shea and Rift Recon CEO Eric Michaud, will close with a realistic abduction simulation designed to put the students' newfound knowledge into practice. They'll have to gain the trust of their captors, break free of their restraints, escape by gaining access to restricted or unauthorized areas without detection, and much, much more!

Reception

Students are equipped with all necessary gear, to keep. They should dress for outdoor urban movement in comfortable, practical clothing and carry a smartphone, ID, and at least $50 in cash on them each day.

Prerequisites

  • Dress for outdoor urban movement
  • Smartphone
  • Photo ID
  • $50 in cash per day

Art of Escape Media

Rift Recon

Founded in 2013, Rift Recon is a premiere physical security agency comprised of researchers, former military and private security detail contractors, and computer and hardware hackers that equips its clients from a suite of exclusive services including specialized trainings, hardware tampering and forensics work, assessment reports, tool creation and team outfitting. Rift can get into, and out of, anything (www.riftrecon.com, @riftrecon, info@riftrecon.com)

Eric Michaud

Reception

Rift Recon founder and CEO Eric Michaud has advised on physical security, lock picking, and hackerspaces for over a decade. He is a professional physical security advisor; an R&D, test and analysis expert; and specializes in forecast and strategy. Michaud started HacDC and Pumping Station: One, is the author of the "How To Start A Hackerspace Series", and advises hackerspaces - bringing the movement to over 900 locations worldwide. His skill opening impossible-to-pick locks earned him a place in locksport history with the "Michaud Attack." He co-founded and served on the Board of Directors for TOOOL US and is referenced widely in academic papers, talks and books including "Open in Thirty Seconds."

Brian O'Shea

Reception

Brian O'Shea is an international security, risk, and intelligence consultant to several Fortune 500 CEOs and NGO leaders. Brian started his career as a trained Arabic linguist and led several small intelligence and collection teams while serving in 5th and 1st Special Forces. Brian has also contracted with several government intelligence agencies and performed counter terror, counter proliferation, and special activities in South America, the Middle and Near East, South East Asia, and Europe. Brian also is the owner of Striker Pierce LLC in Virginia, a boutique investigative and solutions firm. Brian has a Master's in Criminology from Boston University, is a Certified Private Security Instructor, and has over 20 years of related experience. Brian now is the Senior Intelligence and Risk Advisor for Rift Recon. Brian instructs Rift's Clients in Best Practices in order to avoid capture, harm, and potentially dangerous situations in domestic and overseas environments. For more on Brian O'Shea please visit www.strikerpierce.com.

Basics of Pentesting with Metasploit

Rob "Mubix" Fuller
James "egypt" Lee

Tuition: $600.00
Dates: April 8th
Minimum Attendance Threshold: 6
REGISTER

From CEO to IT SysAdmin ninja, if you're looking to get some hands on experience with the tools and techniques the bad guys are using, this is the class for you. We'll take you from zero to hero using Metasploit to familiarize you with its capabilities and get you ready to take the Metasploit Mastery course.

Course Outline

Day 1:

  • Concepts and Tools
  • Attacker Decision Making
  • Getting Metasploit Installed and Setup
  • Internals of Metasploit
  • Enumeration of Targets
  • Exploiting the LAN
  • Exploiting Windows Hosts
  • Exploiting Linux Hosts
  • Exploiting Web Servers
  • Post Exploitation

Rob "Mubix" Fuller

Rob "Mubix" Fuller is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine.

James "egypt" Lee

James "egypt" Lee is a software developer for Rapid7 where he is a core developer for the Metasploit Framework. Before devoting all his time to Metasploit, he was a Cybersecurity researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems. egypt has presented at DefCon, BSidesLV, Black Hat, Derbycon and other venues. Note that egypt is not Egypt. The two can be distinguished easily by their relative beards - Egypt has millions, while egypt only has the one.

Cloud Computing Security Knowledge - Foundation

Chris Simpson

Tuition: $895.00
Discount: $50.00 for active Military or Government Employees (email for discount code)
Dates: April 9th
Minimum Attendance Threshold: 6
CCSK_Course_Modules.pdf
PRE-REGISTRATION OPEN

The CCSK - Foundation course is based on V3.0 of the CCSK exam and the CSA Security Guidance for Critical Areas of Cloud Computing V3.0.

The Cloud Computing Security Knowledge- Foundation class provides students a comprehensive one day review of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK v3.0 certificate exam. Starting with a detailed description of cloud computing, the course covers all major domains in the Guidance v3.0 document from the Cloud Security Alliance, and the recommendations from the European Network and Information Security Agency (ENISA).

This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. (We recommend attendees have at least a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management).

Prerequisites

  • A laptop

Chris Simpson

Chris Simpson is the owner of Bright Moon Security a Cyber Security consulting firm in San Diego, CA. He spent 27 years in the Navy and has extensive experience in the information security field. Previous assignments include a tour as the Information Assurance Manager for Commander, Combined Forces Command Afghanistan and the Third Fleet Information Systems Security Manager. Since leaving the Navy, Chris has focused on cloud security and helping people understand the security issues related to operating in the cloud. He is also an adjunct professor in Cyber Security and Information Assurance at National University.

Cloud Computing Security Knowledge - Foundation and Plus

Chris Simpson

Tuition: $1495.00
Discount: $100.00 for active Military or Government Employees (email for discount code)
Dates: April 10th
Minimum Attendance Threshold: 6
CCSK_Course_Modules.pdf
PRE-REGISTRATION OPEN

The CCSK- Plus class includes and builds upon the CCSK Foundation class with expanded material and extensive hands-on activities with a second day of training. Students will learn to apply their knowledge as they perform a series of exercises as they complete a scenario bringing a fictional organization securely into the cloud.

This second day of training includes additional lecture, although students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises.

Prerequisites

  • A laptop with wireless networking, SSH software such as PuTTY, and VirtualBox installed.
  • An Amazon EC2 account (instructions will be made available two weeks prior to class)

NOTE: When registering for the Plus course, you do *NOT* need to also register for the Foundation course; it is included with the Plus course.

Chris Simpson

Chris Simpson is the owner of Bright Moon Security a Cyber Security consulting firm in San Diego, CA. He spent 27 years in the Navy and has extensive experience in the information security field. Previous assignments include a tour as the Information Assurance Manager for Commander, Combined Forces Command Afghanistan and the Third Fleet Information Systems Security Manager. Since leaving the Navy, Chris has focused on cloud security and helping people understand the security issues related to operating in the cloud. He is also an adjunct professor in Cyber Security and Information Assurance at National University.

Metasploit Mastery

Rob "Mubix" Fuller
James "egypt" Lee

Tuition: $1200.00
Discount: $200.00 for enrollees in the Basics of Pentesting with Metasploit course
Dates: April 9th - 10th
Minimum Attendance Threshold: 6
REGISTER

Already cut your teeth with the beginners course? Just want to increase your already ninja level Metasploit skills? if you're looking to get some hands on experience with the tools and techniques the bad guys are using, this is the class for you. In this class you'll go from simply using Metasploit to molding it to do things you never imagined it could do.

Course Outline

Day 1:

  • Setup, and capabilities demo
  • Ruby crash course
  • MSF Design and Architecture
  • Writing Auxiliary Modules
  • Writing Exploit Modules

Day 2:

  • Writing Post Exploitation Modules
  • Writing Plugins
  • Presence, Persistence, and Pivoting
  • Privilege Escalation
  • Bypassing Anti-Virus
  • Global Capture the Flag

Prerequisites

  • Completion of the Metasploit Introduction course

Rob "Mubix" Fuller

Rob "Mubix" Fuller is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine.

James "egypt" Lee

James "egypt" Lee is a software developer for Rapid7 where he is a core developer for the Metasploit Framework. Before devoting all his time to Metasploit, he was a Cybersecurity researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems. egypt has presented at DefCon, BSidesLV, Black Hat, Derbycon and other venues. Note that egypt is not Egypt. The two can be distinguished easily by their relative beards - Egypt has millions, while egypt only has the one.