EKOPARTY TRAININGS
Intensive, hands-on cybersecurity courses with limited seats.
- Each course is led by renowned security researchers and industry experts from around the world, offering practical knowledge, real-world attack techniques, and deep technical insights.
- Trainings run for 8 hours per day and are designed to provide a highly immersive learning experience through technical content, live demonstrations, and hands-on exercises.
- Many of these courses are rarely available elsewhere, making them a unique opportunity to learn directly from some of the professionals shaping today’s cybersecurity landscape.
- Ekoparty Trainings take place before the conference begins, giving participants the chance to level up their skills and connect with the community ahead of the main event.
Seats are limited, so we recommend reserving your spot early.
Your training registration also includes a ticket to Ekoparty Miami.
Important Information:
Participants must bring a laptop to attend the trainings.
Additional technical requirements may apply depending on the course, so please review the general information section of each training for details.
For questions about the trainings or available payment methods, please contact capacitacion@ekoparty.org
MIAMI 2026
ATTACKING AND DEFENDING THE CLOUD – AWS
Trainer: Santiago Abastante
Cloud platforms such as Amazon Web Services (AWS) are essential to numerous critical infrastructures and enterprise applications, rendering them attractive targets for malicious actors. In this training, we will examine the most pertinent attack vectors employed by cybercriminals to infiltrate AWS infrastructures, while also simulating these attacks utilizing authentic threat actor techniques within an adversary emulation environment.
Covering everything from initial access to sophisticated persistence mechanisms, this training will offer an in-depth perspective on how attackers function within AWS environments.
📆 May 18 & 19, 2026
📍Miami
MOBILE APPLICATION EXPLOITATION: ADVANCED ANDROID & IOS HANDS-ON TRAINING: EXPLOTACIÓN AVANZADA DE APLICACIONES MÓVILES Y APIS EN ESCENARIOS REALES
Trainer: Juan Urbano y Juan Martinez Blanco
A comprehensive two-day, fully immersive training program centered on the advanced exploitation of Android and iOS mobile applications.
During the training, participants will engage with vulnerable applications crafted to simulate real-world scenarios. This will encompass techniques for bypassing protections, exploitation of exposed components, insecure deep links, vulnerable WebViews, Account Takeover (ATO) scenarios linked to these vulnerabilities, and significant flaws in backend APIs.
📆 May 18 & 19, 2026
📍Miami
ADVANCED BINARY ANALYSIS: LEARN HOW TO DISSECT MALWARE AND VULNERABILITIES WITH A WHOLISTIC SKILLSET
Trainer: Marion Marschalek
Binary analysis is an essential competency across various domains of cybersecurity, including malware analysis, vulnerability assessment, and software verification. These distinct areas of application necessitate different aspects of analysis, which, in practice, encompass a broad spectrum of skills that can be challenging to develop.
This training offers a robust foundation and is replete with strategies and techniques that enable us to conserve time when feasible and explore more thoroughly when required to attain our objectives.
📆 May 18 & 19, 2026
📍Miami
OPERACION INMERSIVA: ACCESO INICIAL CON INGENIERIA SOCIAL
Trainers: Daniel Isler & César Soto
This theoretical and hands-on training is designed for professionals who want to refine their initial access skills in real-world environments, applying advanced social engineering techniques.
Prepare for a unique and immersive experience: over two intensive days, participants will work in realistic scenarios where they will apply techniques such as reconnaissance, profile building, persuasion, pretexting, and physical security evasion.
You will also use specialized devices for data exfiltration and remote system access, while performing Wi-Fi attacks and digital social engineering operations such as vishing, phishing, and deepfake-based attacks.
All activities are conducted within a clear ethical framework and defined rules of engagement. Each module combines theoretical knowledge, practical field exercises… and a healthy dose of fun.
This is not just a course, it’s a live undercover operation.
Are you ready to infiltrate, persuade, and take control?
📆 May 18 & 19, 2026
📍 Miami