CodeCourse TitleStart DateFinish dateLocationPrice*
M63-21-02Hardening Microsoft Environments - Online WorkshopFeb 3, 2021Feb 4, 2021online1750.00 EUR Full
M65-21-02TLS in the Enterprise - Online WorkshopFeb 24, 2021Feb 25, 2021online1750.00 EUR Full
M64-21-03Incident Analysis - Online WorkshopMar 3, 2021Mar 5, 2021online2490.00 EUR pro PlatzFull
M37-21-03Advanced Network Security - Online WorkshopMar 9, 2021Mar 11, 2021online1990.00 EUR Full
M50-21-03Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopMar 16, 2021Mar 18, 2021online1990.00 EUR Full
M66-21-03BloodHound – Visualizing and Evaluating Critical Attack Paths in Active Directory Environments - Online Workshop (English)Mar 24, 2021Mar 25, 2021online1990.00 EUR
M63-21-04Hardening Microsoft Environments - Online WorkshopApr 21, 2021Apr 22, 2021online1750.00 EUR
M65-21-04TLS in the Enterprise - Online WorkshopApr 28, 2021Apr 29, 2021online1750.00 EUR
M50-21-05Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopMay 4, 2021May 6, 2021online1990.00 EUR
M51-21-05Hacking 101May 4, 2021May 6, 2021Wien2490.00 EUR
M08-21-06Docker, DevOps & Security in EnterpriseJun 8, 2021Jun 10, 2021Mainz2490.00 EUR
M63-21-06Hardening Microsoft Environments - Online WorkshopJun 16, 2021Jun 17, 2021online1750.00 EUR
M64-21-06Incident Analysis - Online WorkshopJun 22, 2021Jun 24, 2021online2490.00 EUR pro Platz
*VAT excl.


Troopers20 16.-17. March 2020, Heidelberg



Docker, Kubernetes & Security in Enterprise Environments
Jan Harrie, Simon Janz

Hacking 101
Sven Nobis, Julian Suleder

Hacking Mobile Apps
Tobias Kopf, Ahmad Abolhadid

Hardening Microsoft Environments
Heinrich Wiederkehr, Friedwart Kuhn

Incident Analysis
Dr.-Ing. Andreas Dewald, Frank Block, Florian Bausch

Insight into Windows Internals
Dr. Aleksandar Milenkoski, Dominik Phillips

TLS in the Enterprise
Michael Thumann

Windows & Linux Binary Exploitation
Oliver Matula, Dennis Mantz

ATTACK based hunt engineering on Windows
Eduardo Gerosa, Olaf Hartong

Advanced Deployment and Architecture for Network Traffic Analysis
Peter Manev, Eric Leblond

Advanced Pwning & Fixing of Node.js & Electron apps, shells, injections and fun!
Anirudh Anand, Abraham Aranguren

Assessing Business-Critical Systems: Attack & Secure SAP Platforms
Yvan Genuer, Pablo Artuso

Attack and Defense in AWS: Chaining vulnerabilities to go beyond the OWASP 10
Bharath, Riyaz Walikar 

Fuzzing source-code &  binary-only targets like a pro
Marc ''van Hauser'' Heuse

Hacking the USB World with FaceDancer & USB-Tools 
Kate Temkin, Mikaela Szekely 

Hands-on BloodHound - Intro to Cypher Workshop
Walter Legowski

Machine Learning for Security & Security for Machine Learning
Nikhil Joshi

Mastering Mimikatz 
Carlos Perez

Pentesting Industrial Control Systems
Arnaud Soullié

Pentesting the Modern Application Stack
Francis Alexander

Practical Exploitation of IoT Networks and Ecosystems
Sumanth Naropanth, Sunil Kumar

RFID/NFC: Rise of Proxmark3 - directors' cut
Philippe Teuwen

SensePost Unplugged; Modern WiFi Hacking

Software Defined Radio
Michael Ossmann

Web Application Security
Hannes Molsen

Windows Instrumentation With Frida
Hannes Molsen

Automation with Ansible - Radically simplify IT Operations
Maximilian Eschenbacher



We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.