Infiltrate Security Conference

Training
Learn more about the training offered at Infiltrate

INFILTRATE 2019 TRAINING

We are pleased to announce that the INFILTRATE training course options have been expanded for 2019, raising the total available classes to seven. Below you will find detailed information about each course option available. Certain courses do offer CPE credits, while others do not. If you are trying to determine which course is best suited for you, email us at infiltrate@immunityinc(dot)com and we will supply you with either an evaluation quiz to take and/or prerequisite for the class.

All of the training courses offered are eligible for the bundle discount on the INFILTRATE conference briefings pass, which is a $1,000 USD flat priced ticket (pretty good deal!) If you wish to take advantage of this discounted conference briefings pass, you will first need to register for your training course. After you complete the registration, you will receive a discount code to use when you register for the conference.

All of the training courses offered include breakfast and lunch for the registered student on class days. Guest meal tickets can be purchased during checkout if you have a guest that would like to also attend breakfast and lunch.

Not all of the training courses include a laptop to use in class. All of the IMMUNITY courses will include a laptop for the student to use during class. Azeria’s ARM-based IoT Exploitation Development course and Vector 35’s Reverse Engineering with Binary Ninja course require students to bring their own laptops. Specifications will be provided.

Title
Dates
Price
CPE Credits
(CISSP, CSSLP, SSCP)
April 28th - May 1st
$4,900
28
April 28th - May 1st
$4,900
28
April 28th - May 1st
$4,900
28
April 28th - May 1st
$4,900
28
April 29th - May 1st
$3,700
21
April 29th - May 1st
$3,700
0

Training Event Details

IMMUNITY: Click Here For Ring0 SOLD OUT
28 CPE Credits
Immunity's Click Here for Ring0 class teaches both Windows clientside exploitation as well as Windows kernel exploitation. These two combined courses complement each other perfectly through hands-on exploitation that takes the student from gaining remote access to elevating privileges on modern Windows systems. This is an intermediate class that requires a solid grasp of userland and kernel debugging on Windows platforms. STUDENT LAPTOPS FOR USE IN CLASS WILL BE SUPPLIED.
IMMUNITY: Applied Cryptanalysis SOLD OUT
28 CPE Credits
The Immunity Cryptanalysis class takes traditionally dense Academic cryptanalytic theory and presents it in a practical way. The course relates each topic to practical examples. As students progress through the course they will take away real world cryptanalytic skills they can start employing immediately. Students learn to effectively recognize and exploit weakly implemented cryptography based on real world examples. More importantly, students will learn a methodology for expanding their own cryptanalytic prowess by learning to use a practical cryptanalytic tool chain. This course sets experienced vulnerability researchers up with the base they need to expand into the world of flawed cryptography. This is an advanced class that requires a solid understanding of Python, some C and familiarity with mathematics for cryptography. STUDENT LAPTOPS FOR USE IN CLASS WILL BE SUPPLIED.
IMMUNITY: Linux Kernel Exploitation SOLD OUT
28 CPE Credits
The Immunity Kernel Exploitation Master Track focuses on modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to attend this class. STUDENT LAPTOPS FOR USE IN CLASS WILL BE SUPPLIED.
IMMUNITY: Web Hacking SOLD OUT
28 CPE Credits
Immunity's Web Hacking class has a heavy emphasis with hands-on-learning, going in-depth on XSS, SQLi, XXE and Web Crypto. The token system has been improved from previous years, which allows us to track how each individual student is performing in class and indicates if a student could use extra help with a particular subject. The token system also allows for students to compete for the top score (often for fabulous prizes). Come to Web Hacking and receive instruction from members of Immunity's senior consulting team! STUDENT LAPTOPS FOR USE IN CLASS WILL BE SUPPLIED.
IMMUNITY: Java Exploitation SOLD OUT
21 CPE Credits
This class will cover auditing modern Java applications, exploiting vulnerabilities from a wide variety of vulnerability classes. From the home desktop, to the enterprise, Java is consistently present in ways you would not expect it to be. This class will teach you how to take advantage of the insidious layer of Java bubbling through the cracks of the modern enterprise attack surface. STUDENT LAPTOPS FOR USE IN CLASS WILL BE SUPPLIED.
Azeria's ARM-based IoT Exploitation Development SOLD OUT
0 CPE Credits
This is a fast-paced course. Unlike similar courses, this course is not stretched out into 4-5 days. Comprehensive and clear graphical illustrations and a 60 page workbook will help students go from zero to advanced ARM exploit development in only three days. This course includes two real-world IoT targets that we will emulate and exploit. The labs provide real-world scenarios and teach students the process of building and debugging an exploit from an initial memory-corruption crash, and how to bypass exploit mitigations such as NX and ASLR. Rather than ending our NX bypass with a noisy Ret2Libc via the system() api, students will instead learn how to create a reliable ROP chain that marks the stack executable and enables them to take full control of the process directly. The last day of this course will be an introduction to format string vulnerabilities and heap exploitation, followed by a lab where students write an exploit for a heap-based vulnerability. STUDENTS WILL NEED TO BRING THEIR OWN LAPTOP TO USE IN CLASS.
Vector 35's Reverse Engineering with Binary Ninja
0 CPE Credits
Ready to be more efficient with the time you spend reverse engineering? Reverse Engineering with Binary Ninja covers everything you need to be faster with your manual RE tasks and also build automation using Binary Ninja's API for both RE and VR. Students will also learn how to extend CPU architectures and create their own binary views for custom file formats. You'll become immersed in the type system, all the layers of Binary Ninja's Intermediate Languages (BNIL), and come out with the ability to write concise powerful scripts to solve a wide variety of RE and VR challenges. A free student license to Binary Ninja is included with each registration -- if you already have a license, feel free to gift it to a friend! STUDENTS WILL NEED TO BRING THEIR OWN LAPTOP TO USE IN CLASS.

SPONSORS

Click on the images below to visit the sponsor’s homepage. Click here if you want to become a sponsor for INFILTRATE 2019.

Raytheon
Amazon Web Services
Google
Corellium
Trail of Bits
Zerodium
Exodus Intelligence
Intel
Microsoft
Resecurity
Immunity Inc.