Most of these courses are not available elsewhere - You can't miss them!
#Eko2020 Trainings
These trainings take place on the days prior to the conference and have limited seats. Some are dictated in other international conferences at higher prices, and some are Ekoparty exclusive. Don't miss your chance!
ONLINE September 20-23
INCLUDES
Trainings of 2, 3 & 4 days Certificate of attendance
MAIN TRAINING
PRACTICAL ANDROID EXPLOITATION LITE
The Practical Android Exploitation course from Xipiter is a comprehensive course aimed to teach all about Android security. Students get hands on experience with the Android SDK/NDK and related toolchains and use that knowledge to write and analyze exploits and malware on Android. In this course participants will exploit userland and kernel Android vulnerabilities as well as discuss jailbreaks and the various attack surface of Android applications. This class is aimed to an indispensable training for mobile developers, forensics investigators, software security professionals, pen-testers, and others.
OFFENSIVE MOBILE REVERSING AND EXPLOITATION
Ever wondered how different attacking a Mobile application would be, from a traditional web application? Gone are the days when knowledge of just SQL Injection or XSS could help you land a lucrative high-paying infoSec job. This course is designed to introduce beginners as well as advanced security enthusiasts to the world of mobile security using a fast-paced learning approach through intensive hands-on labs.
ATTACKING AND DEFENDING CONTAINERS, KUBERNETES AND SERVERLESS
With Organizations rapidly moving towards micro-service style architecture for their applications, container and serverless technology seem to be taking over at a rapid rate. Leading container technologies like Docker have risen in popularity and have been widely used because they have helped package and deploy consistent-state applications. Serverless and Orchestration technologies like Kubernetes help scale such deployments to a massive scale which can potentially increase the overall attack-surface to a massive extent, if security is not given the attention required
FROM ZERO TO HERO: PENTESTING AND SECURING DOCKER, SWARM & KUBERNETES ENVIRONMENTS
El uso de contenedores y orquestadores cambió la forma en que las tecnologías son utilizadas. Las técnicas de ataque y defensa necesitan ser reinventadas, tenemos la obligación de aprender nuevas formas de auditar y proteger ambientes que implementan este tipo de tecnologías.
Nuestro training está diseñado para profesionales que sean parte de RedTeams o BlueTeams, que estén buscando aprender sobre seguridad en containers y orquestadores desde una perspectiva ofensiva y defensiva. Análisis con metodologías Black Box, Grey Box y White Box en Docker, Docker Swarm y Kubernetes serán explicados.
ADVANCED ICS HACKING
Los sistemas de control industrial (ICS) suelen ser un blanco atractivo para los ciberdelincuentes. La mayoría de estos sistemas supervisan procesos industriales complejos e infraestructuras críticas que suministran energía, agua, transporte, manufactura y otros servicios esenciales. Existen muchas vulnerabilidades en estos sistemas que podrían exponer una instalación a ataques. Un ataque en una red de ICS podría dar lugar a interrupciones masivas, cientos de miles de usuarios afectados e incluso a un desastre nacional. El pentesting en los sistemas de control industrial es un campo muy específico que requiere un vasto conocimiento y disponibilidad de hardware.