PRAGUE, May 25-26, 2022
Register
  • Agenda
    • Program Guide
    • Speakers
    • Speaking Bureau
    • Training: How to implement risk management in an organization
    • Training: Introduction to Hacking Gamification
    • Virtual training: Targeted Threat Hunting
    • CPE & ECE
  • Sponsors
    • Call for Sponsors
    • Sponsors
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Networking
  • Venue
  • Contact us
  • Agenda
    • Program Guide
    • Speakers
    • Speaking Bureau
    • Training: How to implement risk management in an organization
    • Training: Introduction to Hacking Gamification
    • Virtual training: Targeted Threat Hunting
    • CPE & ECE
  • Sponsors
    • Call for Sponsors
    • Sponsors
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Networking
  • Venue
  • Contact us
Cybersecurity Conference Prague 2022 Registration open

In-person training

Introduction to Hacking GamificationLearn Hacker Techniques

Staying up to date and learning hacking techniques is one of the best ways to know how to defend your organization from cyber-attacks. Hacking gamification is on the rise to help keep security professionals up to date on the latest exploits and vulnerabilities. This workshop is about helping you get started with hacking gamification to strengthen your security team whether it is about understanding hacker techniques, pentesting or incident response.

Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Endpoints provide many opportunities to gain entry to IT environments and access to sensitive information.

The ethical hacking community has created numerous tools and techniques to help organisations better secure their Windows environments.  In this training you will learn how to use many the tools used such as Metasploit framework, nmap, burpsuite and netcat which are just a few of the tools you will learn to use.

In this workshop, you’ll learn strategies and resources ethical hackers use at each stage of an ethical hack:

Armed with this knowledge, you’ll be able to try your hand at an ethical hack to test your own organization’s defenses. Most importantly, you’ll also learn endpoint security strategies that block malicious attackers from reaching their goals.

This half day workshop, Joseph Carson an Ethical Hacker with more than 25 years’ experience will choose up to five systems from Hack the Box and walk through each of them in detail explaining each step along with recommendations on how to reduce the risks. Going from initial enumeration, exploitation, abusing weak credentials to a full privileged compromise. Attendees have the option to completely follow along and practice their own skills at hacker techniques.

WHAT YOU WILL LEARN

  • How to perform system and service enumeration on endpoints
  • Discover vulnerabilities and modify exploit payloads to obtain initial access
  • Perform Reverse Shells
  • Basic Knowledge on how to use BurpSuite
  • Create Payloads
  • Privilege Escalation Techniques

WHAT YOU SHOULD BRING

  • Your own laptop to use running either VMWare or VirtualBox to be used for Kali Linux
  • More info below in pre-requisites
Register

Trainers

Qubit Conference Prague 2021 Joe Carson

Joseph Carson

Chief Security Scientist and Advisory CISO
Delinea
Register

More info about training

DATE

24 May 2022 (In-person)
9:00 – 14:00 (5 hours including small breaks)

TARGET AUDIENCE:

  • IT Security Professionals
  • IT operations
  • Incident Response Teams
  • Beginner Pentesters
  • Systems Administrators
  • Infrastructure Management
  • Workstation Management
  • Professionals looking to move into security roles

PRE-REQUISITES:

  • Your own Laptop that can run kali Linux
  • Familiar with Linux however the trainer will help walk through each of the steps so only basic Linux knowledge is sufficient.

You can download Kali Linux from here, the best option is to choose a Virtual Machine either VMWare or VirtualBox https://www.kali.org/get-kali/

You can download VirtualBox from https://www.virtualbox.org/

Register for training

QUBIT CONFERENCE
PRAGUE | 22

QuBit Security, s.r.o.
J. Kozáčeka 2, 960 01
Zvolen, Slovakia

info@qubitconference.com
+421 949 000 338

JOIN THE QUBIT COMMUNITY




SECURE PAYMENT
© 2013-2022 Qubit Conference, The Universe of Cyber Security - Privacy Policy - Privacy Policy in Slovak language - Terms & Conditions - Terms & Conditions in Slovak language - About cookies - O cookies