All these workshops are structured in a fun CTF format. Each participant works at their own pace. The techniques will be demonstrated, with complete step-by-step instructions to lead beginners through the easy challenges and there are also harder challenges for more experienced participants. We will help participants who get stuck as needed, to ensure that everyone learns new techniques.
Workshop 1: Go the Wrong Way
Good developers study documentation carefully and thoroughly understand their language. However, some people just want to code fast, break into things, and skip over the details. This CTF is for them.
Even if you’ve never programmed before, you can make simple attack tools in Go.
Workshop 2: Introduction to Attack Techniques
Learn how to take over Windows, Linux, and Android systems, and how to defend them. We begin with common tools: Nmap, Metasploit, and Armitage, and then go into buffer overflows, packet crafting, command injection, and SQL injection. We will also exploit Android and iOS apps, including WhatsApp, Bank of America, and Progressive Insurance.
No previous experience with programming or attacking is required.
Workshop 3: Securing Web Apps
Participants will attack Web applications with: command injection; SQL injection; Cross-Site Request Forgery; Cross-Site Scripting; cookie manipulation; and Server-Side Template Injection. We will also exploit Drupal and SAML. We will then implement network defenses and monitoring agents. We will use Burp, Splunk, and Suricata. Prerequisites: participants should know basic security and networking. Experience with Web development is helpful but not necessary.
Workshop 4: Security Auditing Android and iOS Apps
Practice finding flaws in real Android and iOS apps in this workshop, and you will be ready to avoid making similar security errors in your own apps.
Android apps are very easy to unpack, analyze, modify, and repack; partly because of the open nature of the system, and partly because most companies neglect basic security measures. In this workshop, participants will hack apps from the Bank of America, IBM, Harvard, Home Depot, the Indian government, and other large organizations. We will find insecure network transmissions, broken cryptography, improper logging, and pervasive lack of binary protections. We will also analyze the way iOS apps use network transmissions, and observe serious vulnerabilities in iOS apps from major companies.
|May 18, 2020 - May 22, 2020||11|
Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about the information. Data analytics is used in many industries to allow companies and organization to make better business decisions and in the sciences to verify or disprove existing models or theories. Learn to become a better data analyst who is able to communicate Business Intelligence (BI) visually. This hands-on workshop is designed for anyone who wants to learn to analyze data from a variety of sources. Starting off with a foundation in data visualization techniques and principles effective data analysis techniques, industry standard visualization best practices are discussed. Through hands-on labs participants learn how to build insightful and interactive dashboards from a variety of data sources. There is an overview of current analytics tools however the focus of this course is the correct use of Microsoft Excel 2016 power tools (Power Map, Power Pivot, Power Query, and Power View), Microsoft Power BI desktop, and Tableau software products. By the end of this workshop, successful participants will become better communicators who are able to produce highly interactive graphs, reports and dashboards that access and visualize data from a multitude of sources. Here are the sites to download or register Power BI and Tableau:
|May 18, 2020 - May 22, 2020||9|
In this week-long training you will learn everything from the PowerShell basics up to and including systems automation. This course is composed of a lecture and workshop component which focuses on implementing the concepts after they are introduced.
-Lecture: Introduction to PowerShell
-Workshop: Hello World & the Basics
-Lecture: Objects, Variables, PSDrives
-Workshop: Creating a Custom Object & Splatting
-Lecture: PowerShell Pipeline
-Workshop: Using the Pipeline
-Lecture: Notable Cmdlets, Importing Modules
-Workshop: Importing Modules & Formatting
-Lecture: Conditions, Loops and Functions
– Workshop: Conditions, Loops and Functions
-Lecture: Scripting / Arguments
-Workshop: Advanced Scripting & Arguments
-Lecture: Active Directory
-Workshop: Automation of Active Directory with PowerShell
-Lecture: Using PowerCli for Automation in a Virtual Environment
|May 18, 2020 - May 22, 2020||7|
Join us on a technology journey and stay up to date on new Office 2019 product including Microsoft Stream, Microsoft Planner, Microsoft Power BI, and 100s of new features. And wait until you see the major changes in Windows 10 with Mixed Reality, Eye Tracking, Story Remix, and so much more. Let’s push the limits by making our first hologram using Unity programming (yes I will be gentle), and see the cutting edge changes happening in personal security! Whew what a week!
|May 18, 2020 - May 22, 2020||8|