Cordoba Trainings 2020

 The best place in Latin America to learn about IT security. Our trainings take place on the days previous to the conference and are dictated by the most well-known infosec leaders at a national and international level.


#EkoFederal Trainings - Cordoba 2020

Most of these courses are not available elsewhere - You can't miss them!

  DATE June June 7, 8, 9, 10

  PLACE TBC  

  TIME TBC


INCLUDES 

   Trainings of 2, 3 or 4 days     Certificate of assistance     2 coffee breaks and lunch

OFFENSIVE MOBILE REVERSING AND EXPLOITATION

Gone are the days when knowledge of just SQL Injection or XSS could help you land a lucrative high-paying infoSec job. This course is designed to introduce beginners and advanced security enthusiasts to mobile security using a fast-paced learning approach through intensive hands-on labs.                                                               

THE DEVSECOPS MASTERCLASS

This training is designed to give a practical approach of implementing Security across Continuous Delivery Pipelines by leveraging the plethora of cloud offerings and is backed by a ton of hands-on labs, original research and real-world implementations of DevSecOps that work
                                                        

STEALING THE CROWN - RED TEAMING ACTIVE DIRECTORY ENVIRONMENTS

Como 2 días no te alcanzaron, este año decidimos redoblar la apuesta: 4 días de puro hacking... nuevos contenidos, más profundidad, más técnicas, más ejercicios, más laboratorios, más diversión...

En este entrenamiento explicaremos Técnicas, Tácticas y Procedimientos actuales para infiltrarse en las redes, mantener persistencia e ir escalando hasta conseguir los objetivos buscados en infraestructuras Active Directory.

Para aquellos dedicados al pentesting y que quieren acercarse al red teaming, permite conocer las técnicas tácticas y procedimientos (TTPs) utilizados por atacantes reales.

Para aquellos que se dedican a la defensa comprender como funcionan los ataques para idear y fortalecer la defensa de su infraestructura (conociendo al enemigo).

                       

ADVANCED ICS HACKING

Industrial control systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services. There are many vulnerabilities in ICS systems that could expose an installation to attacks. Downtime or infiltration of an ICS network  could result in massive outages, hundreds of thousands of impacted users and even national disaster. Penetration testing on ICS systems is a very specific that requires in-depth knowledge and hardware availability.

                       

Introducción a la Explotación de aplicaciones en Android


Este training permitirá a los que lo cursen aprender técnicas de penetration testing de aplicaciones y métodos de explotación de vulnerabilidades en Android.

Se pone foco en la práctica de las técnicas explicadas durante el curso, para que el alumno incorpore no solo la teoría sino que también pueda incorporar experiencia en la explotación de las vulnerabilidades

                                          Read More


More trainings on the way!

ADVANCED INVESTIGATIONS, PRIVACY & OPEN SOURCE INTELLIGENCE TECHNIQUES


Knowledge will be imparted to obtain information about users and assets of a company, using physical and logical techniques. Conventional and unconventional sites will be analyzed, which will allow a more comprehensive and thorough investigation.



HACKING & HARDENING HUMAN OS (SOCIAL ENGINEERING)

This course seeks to train students in the different techniques and tools used within Social Engineering, in order to be able to include them within their Pentest as well as to carry out different campaigns that help detect this type of deception and thus raise user security.

ATTACKING AND DEFENDING CONTAINERS, KUBERNETES AND SERVERLESS

This training will be extremely hands-on with exercises that are similar to real-world threat scenarios. Attendees will understand ways to attack and securely deploy on Container Orchestration technology like Kubernetes and on Serverless.


ALICE IN MALWARELAND: FALLING INTO THE THREAT INTELLIGENCE RABBIT HOLE

Threat Intelligence techniques will be unveiled, including collection, analysis and attribution, as well as the difficulties that can be found in Malwareland and how to sort them.

Ingeniería Inversa Aplicada a Análisis de Malware

Curso introductorio de ingeniería inversa y análisis de código para personas que quieran incursionar en el análisis de malware. Está diseñado para que personas con poca o sin experiencia en ingeniería inversa y análisis de código puedan tener herramientas para entender rápidamente el funcionamiento de una amenaza, al concentrarse en los aspectos más prácticos del análisis. De esta manera, el curso se desarrollará primero presentando una base teórica para nivelar conceptos y luego analizando casos reales.


                                          Read More


From Zero to Hero: Pentesting and Securing Docker, Swarm & Kubernetes Environments

Containerisation and orchestration have changed the way in which technologies  are deployed and managed today. Attack techniques and securitization  processes need to be reinvented, we are forced to learn new ways to audit and protect this kind of environments.  This training is designed for RedTeam and BlueTeam professionals who are  looking for practical applied security knowledge on containerisation and  orchestration from an offensive and defensive point of view. Black Box, Grey Box  and White Box analysis are covered on Docker, Docker Swarm and Kubernetes. 

                                          Read More