CanSecWest DOJOs

secwest.net DOJOs

Although no DOJOs are available for registration at this time, we’ve listed the ones we offered at the most recent secwest.net conference below to demonstrate the type of training and/or courses that we offer.
Filtering by: “3 Days”

Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access.  (3 DAY Version)
May
6
to May 8

Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access. (3 DAY Version)

  • New York, New York United States (map)
  • Google Calendar ICS

Modern IT systems are complex and it’s all about full-stack nowadays. To become a pentesting expert, you need to dive into full-stack exploitation and gain a lot of practical skills. That’s why I created the Full-Stack Pentesting Laboratory.

For each attack, vulnerability and technique presented in this training there is a lab exercise to help you master full-stack pentesting step by step. What’s more, when the training is over, you can take the complete lab environment home to hack again at your own pace.

I found security bugs in many companies including Google, Yahoo, Mozilla, Twitter and in this training I’ll share my experience with you. The content of this training has been carefully selected to cover the topics most frequently requested by professional penetration testers.

View Event →
Attacking Hybrid Multi-Cloud Environment
Mar
16
to Mar 18

Attacking Hybrid Multi-Cloud Environment

Enterprises across the globe are moving to the Hybrid Multi-Cloud Technology. The technical understanding and enormous cost of rewriting infrastructure-applied applications to re-platform and work with the new cloud concept is a difficult task. The irregularities caused due to mis-understanding / deficit knowledge of New Cloud Concepts offered by leading Cloud Service Providers like AWS, Microsoft Azure and GCP etc have introduced multiple loopholes easily identified and exploited by Threat Actors to abuse and exploit the organization infrastructure.

CyberWarFare Labs training on "Attacking Hybrid Multi-Cloud Environment" aims to provide the trainees with the insights of the offensive techniques used by the Red Teamers and Blue Teamers in an Enterprise Cloud Infrastructure.

View Event →
StealthOps: Red Team Tradecraft Targeting Enterprise Security Controls
Mar
16
to Mar 18

StealthOps: Red Team Tradecraft Targeting Enterprise Security Controls

Introducing a cutting-edge training program crafted to empower penetration testers, red team members, and blue team defenders with the advanced skills needed to combat and outmaneuver apex threat actors. In the rapidly evolving landscape of cybersecurity, where attackers employ sophisticated methods such as in-memory implants, custom coding to bypass antivirus and EDR systems, and bespoke tools for lateral movement, the need for robust defensive strategies has never been more critical.

This course is meticulously designed to bridge the gap between conventional security measures and the advanced tactics utilized by adversaries, offering an in-depth exploration of the techniques and methodologies employed by these threat actors to evade host and network-level security solutions. Through a comprehensive curriculum that emphasizes hands-on experience and real-world scenarios, participants will gain unparalleled insights into enhancing enterprise-grade security postures, ensuring readiness to detect, respond to, and neutralize advanced cyber threats with precision and stealth.

View Event →

Discover more about the DOJO philosophy.