
Friday, May 15, 2026
Hands-On Training Day
Learn from people who do this stuff every day. Whether you're just getting started or looking to go deeper, there's a course for you.
Training Day is the day before the main conference. Training tickets go on sale Tuesday, April 7 at 7 PM EST. Conference admission is also required.
“The quality and pricing of your trainings is second to none!”
— 2025 Training Participant
Plan Your Day
Mix and match a morning + afternoon course, or choose a full-day session.
Full Day Courses
9:00 AM - 5:00 PM
Hunting Through The SIEM: Turning Logs Into Stories
Trey Bilbrey & Tyler Casey|9:00 AM - 5:00 PM|Room 3704
Join our immersive full-day workshop where you'll dive deep into defensive cybersecurity by deploying a multi-staged threat via SCYTHE, and hunting for it across the SIEM! This hands-on experience will guide you through the intricacies of using enterprise tooling, such as Splunk (SIEM), to hunt for and identify malicious activity.
One‑Day CISSP Exam Review Course
Peter Bagley|9:00 AM - 5:00 PM|Room 3711
A fast-paced, high-impact CISSP review designed to reinforce core concepts across all eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK). This course focuses on exam-relevant topics, test-taking strategies, and memory techniques to maximize exam readiness.
Wrangling Identity and Access in AWS
Andrew Krug & Tara Schofield|9:00 AM - 5:00 PM|Room 3707
In this full day training learners will navigate the world of identity and access management in the AWS. Sandbox environments will provided for every learner as we navigate policy grammar and becoming familiar with the PARC model (principal, action, resource, and condition), resource policies, permissions boundaries, and introduce guardrails like condition keys. Learners will be hands on in AWS and leveraging open source tools to simulate various identity misconfigurations.
Morning Session
9:00 AM - 1:00 PM
Breaking AI: Prompt Injection, Data Exfiltration and Practical Defenses That Work
Pavan Reddy|9:00 AM - 1:00 PM|Room 3705
AI systems don’t break like software, they fail in silence, misclassify with confidence, and hallucinate under pressure. This 4-hour hands-on workshop exposes the core vulnerabilities of modern AI, from adversarial image attacks to LLM manipulation. The focus is practical: how do these attacks work, how can you launch them, and what can actually stop them?
Binary Jiu-jitsu: White Belt Fundamentals
Joshua Connolly|9:00 AM - 12:30 PM|Room 3708
Binary exploitation can feel overwhelming for beginners. With so many tools, techniques, and architectures to learn, it’s easy to get lost without a structured path. Binary Jiu-Jitsu is designed to guide students through the fundamentals of binary exploitation using a skill-based, hands-on approach inspired by martial arts training.
Threat Hunting using MITRE ATT&CK™ TTPs to Identify Adversarial Behaviors
Joel Sierra|9:00 AM - 1:00 PM|Room 3709
Participants will assume the role of a security analyst and be asked to identify any undetected threats on AcmeCorp's network.
Afternoon Session
1:30 PM - 5:00 PM
From Datasheet to .data Section
RJ Crandall|1:00 PM - 5:00 PM|Room 3708
This fast-paced workshop teaches you how to red team microcontroller code protection features. You will analyze a real-world consumer device microcontroller, review the datasheet, discover a flawed configuration, use custom tooling to recover the protected internal flash, and load it into a disassembler to reverse engineer.
Kraken in the Clouds: A Hands on FaaS Defense Workshop
Shivam Dhar, Nimish Sharma & Niveadita Razdan|1:30 PM - 3:30 PM|Room 3705
While serverless abstracts the underlying infrastructure, it doesn’t reduce responsibility. In highly dynamic, event-driven cloud environments, security teams face fast-moving threats that traditional models weren’t designed to handle. Misconfigurations, fuzzy trust boundaries, and insecure integrations create new attack surfaces, including vulnerable libraries, leaky secrets, wildcard IAM roles, and misconfigured triggers.
Stop Reacting, Start Predicting: Practical Threat Modeling
Mudassir Syed|1:30 PM - 4:30 PM|Room 3709
Threat Modeling is the most underrated skill, yes its a skill, that can be honed. We will explore how threat modeling helps teams move from a reactive security mindset to a proactive, design-first approach. You will learn how to identify vulnerabilities before they become incidents, map out potential attack paths, and make risk-informed decisions.
Branch of the Future
Christa McHugh & Jason Czaplewski|4:00 PM - 5:00 PM|Room 3705
Vendor agnostic walk through of network and cybersecurity design best practices of the store or branch office architecture. Includes how to implement and operationalize a zero trust network architecture, including network segmentation, IoT, WiFi, Cloud access and AI safely and securely in a branch environment.
Training tickets on sale Tuesday, April 7 at 7 PM EST
Each course has its own ticket. Conference admission is also required.