44CON Announce logo

44CON Announce

Subscribe
Archives
November 26, 2020

[44Con Announce] 44CON December Live Online Training

|IF:MC_PREVIEW_TEXT|

[if !gte mso 9]>|MC_PREVIEW_TEXT|

img
Try viewing this email in your browser
end header bar header left
44CON December Training
We are back with some online training this December.
We have four courses, one with Dawid Czagan who has run a training course for us a few years ago and three new ones with 7aseurity.
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to earn $100 million by the end of 2020. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters.
Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks and maximise your payouts. Say ‘No’ to classical web application hacking. Join this unique hands-on training and become a full‑stack exploitation master.
Read more →
Hacking Android, iOS and IoT apps by Example
This course is a 100% hands-on deep dive into the OWASP Mobile Security Testing Guide (MSTG) and relevant items of the OWASP Mobile Application Security Verification Standard (MASVS), so this course covers and goes beyond the OWASP Mobile Top Ten.
Learn about Android, iOS and IoT app security by improving your mobile security testing kung-fu. Ideal for Penetration Testers, Mobile Developers and everybody interested in mobile app security.
All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.
Read more →
Hacking Modern Desktop apps: Master the Future of Attack Vectors

This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.

Long are the days since desktop apps were written in Delphi. What is common between Microsoft Teams, Skype, Bitwarden, Slack and Discord? All of them are written in Electron: JavaScript on the client.

Modern Desktop apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review modern desktop apps, showcasing Node.js and Electron but using techniques that will also work against any other desktop app platform. Ideal for Penetration Testers, Desktop app Developers as well as everybody interested in JavaScript/Node.js/Electron app security.

All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.

Read more →
Hacking Modern Web apps: Master the Future of Attack Vectors

This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.

Long are the days since web servers were run by perl scripts apps written in Delphi. What is common between Walmart, eBay, PayPal, Microsoft, LinkedIn, Google and Netflix? They all use Node.js: JavaScript on the server.

Modern Web apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review modern web apps, showcasing Node.js but using techniques that will also work against any other web app platform. Ideal for Penetration Testers, Web app Developers as well as everybody interested in JavaScript/Node.js and Modern app stack security.

All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.

Read more →
end header left 1/2 right 1 end 1/2 right 1 1/2 left 1 end 1/2 left 1 cta end cta headline end headline 1/1 panel end 1/1 panel 2/2 content end 2/2 content 3/3 content end 3/3 content 2/2 panel end 2/2 panel 3/3 panel end 3/3 panel profile end profile contact end contact 1/2 left 2 end 1/2 left 2 1/2 right 2 end 1/2 right 2 header right end header right content right end content right content left end content left quote end quote 1/3 left end 1/3 left 1/3 right end 1/3 right 1/1 content end 1/1 content footer

end footer

img
img @44CON
About 44CON
Since 2011 we've been breaking things, highlighting flaws and presenting the latest international research in London, UK. We have gone online for the time being.
If you’d prefer not to receive updates, you can unsubscribe here.
Don't miss what's next. Subscribe to 44CON Announce:
Website Bluesky X LinkedIn Facebook
Powered by Buttondown, the easiest way to start and grow your newsletter.