Before the main event begins, we’re dropping high-intensity, limited-seat trainings led by experts who actually do the work. Whether you're tearing through malware, breaking AI models, ghosting EDRs, or ripping apart corporate Wi-Fi, this is where you level up.
Trainings

THÉO LETAILLEUR
(SYNACKTIV)
Advanced Malware Analysis

MAREK ZMYŚLOWSKI AND
KONRAD JĘDRZEJCZYK
Strategic AI Penetration: Mastering Offensive Techniques for Large Language Models

CHARLES HAMILTON
@MRUN1KD03R
How to Bypass EDR (Endpoint Detection and Response) Systems During Red Team Exercises
*Restricted session – invitation required.
Why should you join a training?
Trainings like these fast-track your entry into new territory. You’ll dodge weeks of trial and error and walk out with real tactics you can use—right now. And if you’re already deep in the game? Good. This is your chance to go head-to-head with people who know the niche inside out.
It is also where networking works well. You will meet others who are obsessed with the same aspects of the cybersecurity landscape, such as cloud security, vulnerability management, or AI threats.
Real talk, real skill exchange, real community.
To ensure high-quality engagement, all trainings have limited seats to maintain an ideal trainer-to-participant ratio. So, don’t wait too long to get that green light from your security manager or chief information security officer.