SPTechCon Developer Days
SPTechCon Developer Days will feature Microsoft speakers and MVPs, the brightest minds in Microsoft, Web and SharePoint development, to help …
Big Data World Show 2014
Big Data World Show 2014 Big Data World Tour Speakers WE ARE JUST 1 WEEK AWAY FROM THE BIG DATA …
Oil & Gas ICS Cybersecurity Forum / Abu Dhabi, UAE; October 7-10.2013
Organizing Company: Dome Exhibitions Event Name: Oil & Gas ICS Cyber Security Forum Start date of the event: October 7th …
CMO World Forum 2013 - Digital Communications Expo
CMO World Forum 2013 - Digital Communications Expo It will be held on April 26, 2013 at Sofitel Hotel, …
Nullcon Delhi 2012
As the tradition of Nullcon continues, we spread and get connected with more and more enthusiasts and evangelists to bring …
Hack in Paris
For its first edition, Hack In Paris (HIP) will be held from June 14 to 17, 2011 in Disneyland Paris …
RSA® Conference Europe 2012.
Hacktivism. Cloud computing. Cyber attacks, malware and data theft. From managing smartphones and tablets to assessing risks from workplace social …
Source Boston
SOURCE Boston 2011 is April 20th-22nd, at the Seaport Hotel in downtown Boston. Here's what the organizers say about their …
TakeDownCon in May
TakeDownCon is a brand new information security conference series, created by EC-Council. This highly technical information security conference series is …
The OWASP AppSec Ireland Conference
The OWASP AppSec Ireland Conference will be held at Trinity College Dublin from September 4th through 6th 2012. There will be training …
Cyber Security Forum Asia: A Threat to Critical National Infrastructure, 3-4 December 2012, Singapore
IB Consultancy is organising, Cyber Security Forum Asia: A Threat to Critical National Infrastructure, taking place in Singapore on the …
The Cyber Security for Chemical Industry USA
27th-28th September, 2012, Houston, Texas “Among the top 10 fields affected by cyber-crime, companies in the pharmaceutical and chemical industries …
Big Data World Show 2014
Big Data World Show 2014 Big Data World Tour Speakers WE ARE JUST 1 WEEK AWAY FROM THE BIG DATA …
Oil & Gas ICS Cybersecurity Forum / Abu Dhabi, UAE; October 7-10.2013
Organizing Company: Dome Exhibitions Event Name: Oil & Gas ICS Cyber Security Forum Start date of the event: October 7th …
QCon New York returns. Special offer to the PenTest Magazine community.
Special offer to the PenTest Magazine community: Save $50 if you enter the following promotion code “Pentestmag” upon registration. …
OWASP AppSec USA 2013, NYC November 18-21, Announces Call for Papers, Call for Trainers
Application security practitioners invited to submit speaker and trainer proposals to premier Security Conference; Deadline: April 30, 2013 NEW YORK, …
Security Bsides Conference in Poland
Security Bsides is the only worldwide security-oriented event series where young learners meet lifelong experts. It's a one-of-a-kind event also …
Hacker Halted 2012
Introduced in 2004, the Hacker Halted series has been a constant source of knowledge to the information security community. With …
ROOTCON Premier Philippines' Hacker Conference
ROOTCON is an annual hacker conference and Information Security gathering. It aims to share best practices and technologies through talks …
OWASP Conference
Cyber security gurus from around the world to gather in India to discuss strategic, tactical and technical initiatives to counter …
Techno Security 2012 & Mobile Forensics 2012 VIP Invitation for PenTest Magazine readers
The management team of TheTrainingCo., producers of the annual Techno Security Conference and the Mobile Forensics Conference at Myrtle Beach, …
III Security Forum May 21st
III Security Forum will take place in the Techinical Scool, in Carlos Casares, Buenos Aires, Argentina. Security experts will talk …
10 Burning Questions About PentestLab - Interview with Ross Moore
What are the primary objectives of setting up a pentest lab in 2024, and how have they evolved in recent …
SETTING UP A PERSONAL PENETRATION TESTING LAB IN 2024
INTRODUCTION TO PENETRATION TESTING Penetration Testing is used to evaluate a computer system’s security by performing authorized simulated attacks. A …
Security at the Edge
What is Edge Computing? Imagine a personal assistant who anticipates your business needs and provides solutions immediately without having to …
Improve your Pentest Skills in 2024: Comprehensive Laboratory Setup
Building your own penetration testing (pentest) lab is a great way to enhance your cybersecurity skills and test your knowledge …
Aerial Assault: Combining Drones and Pentesting (W54)
Enter a short description of the course.This course explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. As drones become more accessible and advanced, their potential for both offensive operations and defensive strategies grows. Participants will learn how to leverage drones for penetration testing while understanding the opportunities and challenges presented by aerial platforms in cybersecurity. This course covers the technical foundations of drones, offensive drone operations, defensive strategies against drones, and the ethical and legal implications of drone use in cybersecurity.
Aerospace Cybersecurity: Satellite Hacking (W53)
This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.
AutoSec Pro: Vehicle Cybersecurity Mastery (W52)
AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.
Creating Advanced Ransomware with Golang (W51)
In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang