Sponsor signage deadline is May 1. Expo hall booths, podium banners, and track signage still available.

Friday, May 15, 2026

Hands-On Training Day

Learn from people who do this stuff every day. Whether you're just getting started or looking to go deeper, there's a course for you.

Training Day is the day before the main conference. Training tickets go on sale Tuesday, April 7 at 7 PM EST. Conference admission is also required.

$10–99per course

“The quality and pricing of your trainings is second to none!”

— 2025 Training Participant

Plan Your Day

Full Day Courses

9:00 AM - 5:00 PM

Introduction/EntryFull DayThreat HuntingSIEM
$10

Hunting Through The SIEM: Turning Logs Into Stories

Trey BilbreyTyler Casey

Trey Bilbrey & Tyler Casey|9:00 AM - 5:00 PM|Room 3704

Join our immersive full-day workshop where you'll dive deep into defensive cybersecurity by deploying a multi-staged threat via SCYTHE, and hunting for it across the SIEM! This hands-on experience will guide you through the intricacies of using enterprise tooling, such as Splunk (SIEM), to hunt for and identify malicious activity.

On Sale Soon
View details
Mid-RangeFull DayCertification Prep
$35

One‑Day CISSP Exam Review Course

Peter Bagley

Peter Bagley|9:00 AM - 5:00 PM|Room 3711

A fast-paced, high-impact CISSP review designed to reinforce core concepts across all eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK). This course focuses on exam-relevant topics, test-taking strategies, and memory techniques to maximize exam readiness.

On Sale Soon
View details
Mid-RangeFull DayCloud Security
$10

Wrangling Identity and Access in AWS

Andrew KrugTara Schofield

Andrew Krug & Tara Schofield|9:00 AM - 5:00 PM|Room 3707

In this full day training learners will navigate the world of identity and access management in the AWS. Sandbox environments will provided for every learner as we navigate policy grammar and becoming familiar with the PARC model (principal, action, resource, and condition), resource policies, permissions boundaries, and introduce guardrails like condition keys. Learners will be hands on in AWS and leveraging open source tools to simulate various identity misconfigurations.

On Sale Soon
View details

Morning Session

9:00 AM - 1:00 PM

Introduction/Entry4 HoursAI/ML Security
$10

Breaking AI: Prompt Injection, Data Exfiltration and Practical Defenses That Work

Pavan Reddy

Pavan Reddy|9:00 AM - 1:00 PM|Room 3705

AI systems don’t break like software, they fail in silence, misclassify with confidence, and hallucinate under pressure. This 4-hour hands-on workshop exposes the core vulnerabilities of modern AI, from adversarial image attacks to LLM manipulation. The focus is practical: how do these attacks work, how can you launch them, and what can actually stop them?

On Sale Soon
View details
Introduction/Entry3.5 HoursBinary Exploitation
$60

Binary Jiu-jitsu: White Belt Fundamentals

Joshua Connolly

Joshua Connolly|9:00 AM - 12:30 PM|Room 3708

Binary exploitation can feel overwhelming for beginners. With so many tools, techniques, and architectures to learn, it’s easy to get lost without a structured path. Binary Jiu-Jitsu is designed to guide students through the fundamentals of binary exploitation using a skill-based, hands-on approach inspired by martial arts training.

On Sale Soon
View details
Mid-Range4 HoursThreat Hunting
$10

Threat Hunting using MITRE ATT&CK™ TTPs to Identify Adversarial Behaviors

Joel Sierra

Joel Sierra|9:00 AM - 1:00 PM|Room 3709

Participants will assume the role of a security analyst and be asked to identify any undetected threats on AcmeCorp's network.

On Sale Soon
View details

Afternoon Session

1:30 PM - 5:00 PM

Mid-Range4 HoursHardware Security
$99

From Datasheet to .data Section

RJ Crandall

RJ Crandall|1:00 PM - 5:00 PM|Room 3708

This fast-paced workshop teaches you how to red team microcontroller code protection features. You will analyze a real-world consumer device microcontroller, review the datasheet, discover a flawed configuration, use custom tooling to recover the protected internal flash, and load it into a disassembler to reverse engineer.

On Sale Soon
View details
Introduction/Entry2 HoursCloud SecurityServerless
$10

Kraken in the Clouds: A Hands on FaaS Defense Workshop

Shivam DharNimish SharmaNiveadita Razdan

Shivam Dhar, Nimish Sharma & Niveadita Razdan|1:30 PM - 3:30 PM|Room 3705

While serverless abstracts the underlying infrastructure, it doesn’t reduce responsibility. In highly dynamic, event-driven cloud environments, security teams face fast-moving threats that traditional models weren’t designed to handle. Misconfigurations, fuzzy trust boundaries, and insecure integrations create new attack surfaces, including vulnerable libraries, leaky secrets, wildcard IAM roles, and misconfigured triggers.

On Sale Soon
View details
Mid-Range3 HoursThreat Modeling
$35

Stop Reacting, Start Predicting: Practical Threat Modeling

Mudassir Syed

Mudassir Syed|1:30 PM - 4:30 PM|Room 3709

Threat Modeling is the most underrated skill, yes its a skill, that can be honed. We will explore how threat modeling helps teams move from a reactive security mindset to a proactive, design-first approach. You will learn how to identify vulnerabilities before they become incidents, map out potential attack paths, and make risk-informed decisions.

On Sale Soon
View details
Mid-Range1 HourNetwork Security
$10

Branch of the Future

Christa McHughJason Czaplewski

Christa McHugh & Jason Czaplewski|4:00 PM - 5:00 PM|Room 3705

Vendor agnostic walk through of network and cybersecurity design best practices of the store or branch office architecture. Includes how to implement and operationalize a zero trust network architecture, including network segmentation, IoT, WiFi, Cloud access and AI safely and securely in a branch environment.

On Sale Soon
View details

Training tickets on sale Tuesday, April 7 at 7 PM EST

Each course has its own ticket. Conference admission is also required.