Seminare

Dates

CodeCourse TitleStart DateFinish dateLocationPrice*
M51-18-12Hacking 101Dec 4, 2018Dec 6, 2018Mainz2490.00 EUR Full
M56-18-12Sicherheitsaspekte in WLAN-UmgebungenDec 5, 2018Dec 6, 2018Mainz1750.00 EUR
M08-18-12Docker, DevOps & Security in EnterpriseDec 11, 2018Dec 13, 2018Berlin2490.00 EUR Full
M60-18-12Security & Governance in der Public Cloud Dec 12, 2018Dec 13, 2018Berlin1990.00 EUR
M41-19-01Advanced Web Application Security Jan 29, 2019Jan 31, 2019Dresden2490.00 EUR
M63-19-02Hardening Microsoft EnvironmentsFeb 6, 2019Feb 7, 2019Düsseldorf1990.00 EUR
M37-19-02Advanced Network SecurityFeb 19, 2019Feb 21, 2019Berlin1990.00 EUR
M44-19-04Effektive IPv6-Migration und Security (1. und 2.Tag)Apr 1, 2019Apr 2, 2019Mainz1750.00 EUR
M44-19-04Effektive IPv6-Migration und Security (3 Tage)Apr 1, 2019Apr 3, 2019Mainz1990.00 EUR
M44-19-04Effektive IPv6-Migration und Security (3.Tag)Apr 3, 2019Apr 3, 2019Mainz880.00 EUR
M63-19-04Hardening Microsoft EnvironmentsApr 3, 2019Apr 4, 2019Wien1990.00 EUR
M65-19-04TLS in the EnterpriseApr 10, 2019Apr 11, 2019Hamburg1990.00 EUR
M08-19-05Docker, DevOps & Security in EnterpriseMay 14, 2019May 16, 2019Düsseldorf2490.00 EUR
M51-19-05Hacking 101May 21, 2019May 23, 2019Hamburg2490.00 EUR
M60-19-05Security & Governance in der Public Cloud May 22, 2019May 23, 2019Hamburg1990.00 EUR
M59-19-06Virtualisierung und Private Cloud SecurityJun 25, 2019Jun 27, 2019Berlin2490.00 EUR
M56-19-06Sicherheitsaspekte in WLAN-UmgebungenJun 26, 2019Jun 27, 2019Berlin1750.00 EUR
*VAT excl.

USER REGISTRATION


Troopers19 18.-22. March 2019, Heidelberg

Trainings:

Attacking ARM TrustZones
Maxime Peterlin,  Joffrey Guilbon,  Alexandre Adamski

Docker, Kubernetes & Security in Enterprise Environments
Jan Harrie,  Simon Janz

Electronics & Microsoldering training for security researchers & reversers
Guillaume Heilles,  Philippe Teuwen

Hacking 101
Sven Nobis,  Julian Suleder

Hacking the USB World with FaceDancer
Kate Temkin

Hardening Microsoft Environments
Florian Gattermeier,  Nina Matysiak

Incident Analysis
Andreas Dewald,  Frank Block

Insight into Windows Internals
Aleksandar Milenkoski,  Dominik Phillips

Mobile Applications Pentesting
Ahmad Abolhadid

Network Forensics
Erik Hjelmvik

Pentesting the Modern Application Stack
Francis Alexander,  Bharadwaj Machiraju

RFID/NFC fully reloaded and even dirtier: Interaction, Cloning, Emulation, Replaying and Relaying
Salvador Mendoza,  Philippe Teuwen,  Nahuel Grisolia

SECURITY AND PENETRATION TESTING IN INDUSTRIAL CONTROL SYSTEMS
Mohammad-Reza Zamiri

Secure CI/CD Pipelines
Kevin Kelpen,  Simon Lipke

TLS in the Enterprise
Michael Thumann

Windows & Linux Binary Exploitation
Oliver Matula,  Dennis Mantz

Windows PowerShell for Security Professionals
Carlos Perez

 

https://www.troopers.de

 

VIDEOS

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
Ok