Latest news on LayerOne

Subscribe to the RSS Feed

Training Spotlight: In & Out – Network Data Exfiltration Techniques

Posted on 29 April 2019 (0)

This course is designed to present modern and emerging tools and techniques for network data exfiltration, testing and bypassing DLP/IDS/IPS/FW systems, protocol tunneling, hiding, pivoting and generating malicious network events. Highly technical content and only a hands-on practical approach guarantees that the usage of this transferred knowledge & technologies in real production environments will be easy, smooth, and repeatable.

This course is intended for red teams, blue teams, penetration testers, incident response personnel, security analysts, security administrators, network administrators, SOC personnel, and anyone else interested in learning about data exfiltration techniques used by red teams and black hats. This course is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Building and Maintaining Secure Active Directory Environments

Posted on 26 April 2019 (0)

A major component of modern enterprise security is the proper congfiguration of your networks via Microsoft’s Active Directory. Poorly configured AD environments are often bigger holes than the latest and greatest hacking tools and techniques. Learn how to find and patch those holes in this hands-on course!

This course is intended for penetration testers, red teams, security analysts, system administrators, security administrators, DevOps engineers, and anyone else interested in learning about Active Directory security. This course is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Introduction to Stack-based Exploitation

Posted on 25 April 2019 (0)

Learn the essentials of memory corruption and binary exploitation in this hands-on course! A must-have for those getting started with hacking, bug bounties, software development, software QA, and penetration testing! Instructor proceeds for this training go directly to Hackers for Charity!

This course is intended for bug bounty hunters, software developers, software QA testers, penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about . This course focuses on the fundamentals of binary exploitation and is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Red Teaming as a Service

Posted on 24 April 2019 (0)

This hands-on focused course is designed to teach you how to hack like a pro and take down large networks! Learn the basics of red-teaming, penetration testing, and vulnerability analysis from two industry experts! This training covers: system and network recon, intel gathering, vulnerability identification and analysis, system exploitation, pivoting, privilege escalation, and more!

This course is intended for penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about offensive reconnaissance and exploitation techniques used by red teams and black hats. This course focuses on the fundamentals of penetration testing and ethical hacking as is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!

Sincerely,
The LayerOne Staff

New for 2019: Threat Hunting Mini-CTF!

Posted on 23 April 2019 (0)

New for 2019! Competitors will be searching for network attacks in data from a multi-server corporate-style network using a Splunk server, and they will also be deploying their own cloud servers, sending attacks, and detecting them. All challenges are freely available and will remain so after the event. This event will use BOSS OF THE SOC data published by Splunk, Google Cloud, Suricata, Drupal, and Metasploit.

The Threat Hunting CTF takes place on Sunday, May 26th, 2019 at 14:00 in the Lockpicking Village!

This event is graciously hosted by Sam Bowne! Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences.

Don’t forget the following!

Sincerely,
The LayerOne Staff