NorthSec is pleased to announce its high-quality training sessions, given by the absolute best experts in their field. We strive to provide you with the highest level of exclusive content, giving you a unique opportunity to improve your applied security knowledge during NorthSec.
Training Sessions include
Full ticket to the NorthSec Conference
Coffee, refreshments, snacks and lunch
Special Networking Event
This year’s sessions
Windows Enterprise Incident Response (Sold-Out)
John Atrache FireEye Mandiant
Lovell Smith FireEye Mandiant
Jess Hays FireEye Mandiant
Martin Tremblay FireEye Mandiant
This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s cyber threats. The fast-paced course is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms and investigate an incident throughout an enterprise. More information
Reverse Engineering Crash Course (Cancelled)
Filip Kafka ESET
Do you want to start with reverse engineering or malware analysis, and learn it from the ground up? Do you want to know how to examine closed source software to find bugs, or maybe even exploit it? Or do you just want to understand the low-level concepts, and dig deeper to learn how your source code is translated into the binary and then executed by the processor? Then this course is for you. More information
Windows Kernel Exploitation
Ashfaq Ansari Payatu Software Labs LLP.
This training is focused on exploitation of different Windows Kernel Mode vulnerabilities ranging from Pool Overflow to Use after Free. We will cover basics of Windows Kernel Internals and hands-on fuzzing of Windows Kernel Mode drivers. We will dive deep into exploit development of various kernel mode vulnerabilities. We will also look into different vulnerabilities in terms of code and the mitigations applied to fix the respective vulnerabilities. More information
Mastering Burp Suite Pro 100% Hands-On (Sold-Out)
Nicolas Gregoire Agarri
Burp Suite Pro is the leading tool for auditing Web applications at large. Mastering it allows users to get the most out of the tool, optimizing time spent. Work will be faster, more effective and more efficient. What’s more, advanced automation techniques allow detection of additional vulnerabilities whether complex or subtle. Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. More information
Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
Dawid Czagan Silesia Security Lab
HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to earn $100 million by the end of 2020. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters. More information
Evil Mainframe Hacking
Chad Rikansrud RSM Partners
Have you ever been mid pentest with mainframe credentials and thought 'now what?' Or were you ever asked to do a mainframe pentest and didn't even know where to start? Maybe you're a sysprog and think your systems are impenetrable. No matter your background this course is for you! More information
Adversary Tactics: Red Team Ops (Sold-Out)
Ryan Cobb SpecterOps
Brian Reitz SpecterOps
Calvin Hedler SpecterOps
Lee Christensen SpecterOps
Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a mature real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses. More information
Training sessions take place right before the conference from Sunday til Wednesday. Dates vary by individual training, make sure to check. Training sessions start at 9am and finish at 5pm. Trainers can lengthen the schedule if they want to.
- Full ticket to the NorthSec Conference (Thursday and Friday)
- Coffee, refreshments, snacks and lunch
- Access to a special networking event with drinks on May 14th
If you already purchased your conference ticket, write us un email at firstname.lastname@example.org to get a refund. Note that we reserve the right to cancel a training if a minimum number of participants isn’t met.
See individual training pages for pricing.
- Early bird until December 31st: 20% off*
- Not-so Early bird until February 28th: 10% off*
- Student pricing (50% off) is available upon request and on selected training. Contact us for details.
- Prices are in $CAD before taxes and eventbrite fees
* NEW: There is a 5 ticket per training limit on the number of early bird and not-so early bird tickets. The next early bird pricing will be automatically available when the previous one is sold out.
Continuing Professional Education (CPE) Credits
We can emit proof of CPE credits for those who are certified through (ISC)2 upon request.
- 16 CPE credits for a two-day training session
- 24 CPE credits for a three-day training session
- 32 CPE credits for a four-day training session