CodeCourse TitleStart DateFinish dateLocationPrice*
M44-20-11Effektive IPv6-Migration und Security (1. und 2.Tag)Nov 3, 2020Nov 4, 2020Hamburg1750.00 EUR
M44-20-11Effektive IPv6-Migration und Security (3 Tage)Nov 3, 2020Nov 5, 2020Hamburg1990.00 EUR
M63-20-11Hardening Microsoft Environments - Online WorkshopNov 4, 2020Nov 5, 2020online1750.00 EUR Full
M44-20-11Effektive IPv6-Migration und Security (3.Tag)Nov 5, 2020Nov 5, 2020Hamburg880.00 EUR
M59-20-11Virtualisierung und Private Cloud SecurityNov 10, 2020Nov 12, 2020Düsseldorf2490.00 EUR Canceled
M64-20-11Incident Analysis - Online WorkshopNov 10, 2020Nov 12, 2020online2200.00 EUR pro PlatzFull
M50-20-12Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopDec 1, 2020Dec 3, 2020online1990.00 EUR Full
M63-20-12Hardening Microsoft EnvironmentsDec 9, 2020Dec 10, 2020online1750.00 EUR
M08-20-12Docker, DevOps & Security in EnterpriseDec 8, 2020Dec 10, 2020Mainz2490.00 EUR Full
M56-20-12Sicherheitsaspekte in WLAN-UmgebungenDec 9, 2020Dec 10, 2020Berlin1990.00 EUR pro PlatzCanceled
M63-21-02Hardening Microsoft Environments - Online WorkshopFeb 3, 2021Feb 4, 2021online1750.00 EUR Full
M65-21-02TLS in the Enterprise - Online WorkshopFeb 24, 2021Feb 25, 2021online1750.00 EUR
M37-21-03Advanced Network SecurityMar 3, 2021Mar 5, 2021Mainz1990.00 EUR
M64-21-03Incident Analysis - Online WorkshopMar 3, 2021Mar 5, 2021online2490.00 EUR pro Platz
M50-21-05Sicherheitsaspekte von Unified Communication - Umgebungen - Online WorkshopMay 4, 2021May 6, 2021online1990.00 EUR
M08-21-06Docker, DevOps & Security in Enterprise - Online WorkshopJun 8, 2021Jun 10, 2021online2490.00 EUR
M64-21-06Incident Analysis - Online WorkshopJun 22, 2021Jun 24, 2021online2490.00 EUR pro Platz
*VAT excl.


Troopers20 16.-17. March 2020, Heidelberg



Docker, Kubernetes & Security in Enterprise Environments
Jan Harrie, Simon Janz

Hacking 101
Sven Nobis, Julian Suleder

Hacking Mobile Apps
Tobias Kopf, Ahmad Abolhadid

Hardening Microsoft Environments
Heinrich Wiederkehr, Friedwart Kuhn

Incident Analysis
Dr.-Ing. Andreas Dewald, Frank Block, Florian Bausch

Insight into Windows Internals
Dr. Aleksandar Milenkoski, Dominik Phillips

TLS in the Enterprise
Michael Thumann

Windows & Linux Binary Exploitation
Oliver Matula, Dennis Mantz

ATTACK based hunt engineering on Windows
Eduardo Gerosa, Olaf Hartong

Advanced Deployment and Architecture for Network Traffic Analysis
Peter Manev, Eric Leblond

Advanced Pwning & Fixing of Node.js & Electron apps, shells, injections and fun!
Anirudh Anand, Abraham Aranguren

Assessing Business-Critical Systems: Attack & Secure SAP Platforms
Yvan Genuer, Pablo Artuso

Attack and Defense in AWS: Chaining vulnerabilities to go beyond the OWASP 10
Bharath, Riyaz Walikar 

Fuzzing source-code &  binary-only targets like a pro
Marc ''van Hauser'' Heuse

Hacking the USB World with FaceDancer & USB-Tools 
Kate Temkin, Mikaela Szekely 

Hands-on BloodHound - Intro to Cypher Workshop
Walter Legowski

Machine Learning for Security & Security for Machine Learning
Nikhil Joshi

Mastering Mimikatz 
Carlos Perez

Pentesting Industrial Control Systems
Arnaud Soullié

Pentesting the Modern Application Stack
Francis Alexander

Practical Exploitation of IoT Networks and Ecosystems
Sumanth Naropanth, Sunil Kumar

RFID/NFC: Rise of Proxmark3 - directors' cut
Philippe Teuwen

SensePost Unplugged; Modern WiFi Hacking

Software Defined Radio
Michael Ossmann

Web Application Security
Hannes Molsen

Windows Instrumentation With Frida
Hannes Molsen

Automation with Ansible - Radically simplify IT Operations
Maximilian Eschenbacher



We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.