Trainings:
Docker, Kubernetes & Security in Enterprise Environments
Jan Harrie, Simon Janz
Hacking 101
Sven Nobis, Julian Suleder
Hacking Mobile Apps
Tobias Kopf, Ahmad Abolhadid
Hardening Microsoft Environments
Heinrich Wiederkehr, Friedwart Kuhn
Incident Analysis
Dr.-Ing. Andreas Dewald, Frank Block, Florian Bausch
Insight into Windows Internals
Dr. Aleksandar Milenkoski, Dominik Phillips
TLS in the Enterprise
Michael Thumann
Windows & Linux Binary Exploitation
Oliver Matula, Dennis Mantz
ATTACK based hunt engineering on Windows
Eduardo Gerosa, Olaf Hartong
Advanced Deployment and Architecture for Network Traffic Analysis
Peter Manev, Eric Leblond
Advanced Pwning & Fixing of Node.js & Electron apps, shells, injections and fun!
Anirudh Anand, Abraham Aranguren
Assessing Business-Critical Systems: Attack & Secure SAP Platforms
Yvan Genuer, Pablo Artuso
Attack and Defense in AWS: Chaining vulnerabilities to go beyond the OWASP 10
Bharath, Riyaz Walikar
Fuzzing source-code & binary-only targets like a pro
Marc ''van Hauser'' Heuse
Hacking the USB World with FaceDancer & USB-Tools
Kate Temkin, Mikaela Szekely
Hands-on BloodHound - Intro to Cypher Workshop
Walter Legowski
Machine Learning for Security & Security for Machine Learning
Nikhil Joshi
Mastering Mimikatz
Carlos Perez
Pentesting Industrial Control Systems
Arnaud Soullié
Pentesting the Modern Application Stack
Francis Alexander
Practical Exploitation of IoT Networks and Ecosystems
Sumanth Naropanth, Sunil Kumar
RFID/NFC: Rise of Proxmark3 - directors' cut
Philippe Teuwen
SensePost Unplugged; Modern WiFi Hacking
SensePost
Software Defined Radio
Michael Ossmann
Web Application Security
Hannes Molsen
Windows Instrumentation With Frida
Hannes Molsen
Automation with Ansible - Radically simplify IT Operations
Maximilian Eschenbacher