OffensiveX Trainings

Before the main event begins, we’re dropping high-intensity, limited-seat trainings led by experts who actually do the work. Whether you're tearing through malware, breaking AI models, ghosting EDRs, or ripping apart corporate Wi-Fi, this is where you level up.

DAYS
00
HRS
00
MINS
00
SECS
00

Before the main event begins, we’re dropping high-intensity, limited-seat trainings led by experts who actually do the work. Whether you're tearing through malware, breaking AI models, ghosting EDRs, or ripping apart corporate Wi-Fi, this is where you level up.

Trainings

Trainer 1

THÉO LETAILLEUR
(SYNACKTIV)

Advanced Malware Analysis

Trainer 2

MAREK ZMYŚLOWSKI AND
KONRAD JĘDRZEJCZYK

Strategic AI Penetration: Mastering Offensive Techniques for Large Language Models

Trainer 4

CHARLES HAMILTON
@MRUN1KD03R

How to Bypass EDR (Endpoint Detection and Response) Systems During Red Team Exercises

*Restricted session – invitation required.

Why should you join a training?

Trainings like these fast-track your entry into new territory. You’ll dodge weeks of trial and error and walk out with real tactics you can use—right now. And if you’re already deep in the game? Good. This is your chance to go head-to-head with people who know the niche inside out.

It is also where networking works well. You will meet others who are obsessed with the same aspects of the cybersecurity landscape, such as cloud security, vulnerability management, or AI threats.

Real talk, real skill exchange, real community.

To ensure high-quality engagement, all trainings have limited seats to maintain an ideal trainer-to-participant ratio. So, don’t wait too long to get that green light from your security manager or chief information security officer.

Important: Trainings do not take place at the main conference venue. A separate location will be announced soon.