November 26, 2020
[44Con Announce] 44CON December Live Online Training
|IF:MC_PREVIEW_TEXT|
[if !gte mso 9]>|MC_PREVIEW_TEXT|
|
|
Try viewing this email in your browser |
|
|
end header bar
header left
|
|
|
44CON December Training |
|
We are back with some online training this December.
We have four courses, one with Dawid Czagan who has run a training course for us a few years ago and three new ones with 7aseurity. |
|
|
|
|
|
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation |
|
HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to earn $100 million by the end of 2020. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters.
Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks and maximise your payouts. Say ‘No’ to classical web application hacking. Join this unique hands-on training and become a full‑stack exploitation master.
|
|
|
|
|
|
|
|
Hacking Android, iOS and IoT apps by Example |
|
This course is a 100% hands-on deep dive into the OWASP Mobile Security Testing Guide (MSTG) and relevant items of the OWASP Mobile Application Security Verification Standard (MASVS), so this course covers and goes beyond the OWASP Mobile Top Ten.
Learn about Android, iOS and IoT app security by improving your mobile security testing kung-fu. Ideal for Penetration Testers, Mobile Developers and everybody interested in mobile app security.
All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.
|
|
|
|
|
|
|
|
Hacking Modern Desktop apps: Master the Future of Attack Vectors |
|
This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.
Long are the days since desktop apps were written in Delphi. What is common between Microsoft Teams, Skype, Bitwarden, Slack and Discord? All of them are written in Electron: JavaScript on the client.
Modern Desktop apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review modern desktop apps, showcasing Node.js and Electron but using techniques that will also work against any other desktop app platform. Ideal for Penetration Testers, Desktop app Developers as well as everybody interested in JavaScript/Node.js/Electron app security.
All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.
|
|
|
|
|
|
|
|
Hacking Modern Web apps: Master the Future of Attack Vectors |
|
This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.
Long are the days since web servers were run by perl scripts apps written in Delphi. What is common between Walmart, eBay, PayPal, Microsoft, LinkedIn, Google and Netflix? They all use Node.js: JavaScript on the server.
Modern Web apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review modern web apps, showcasing Node.js but using techniques that will also work against any other web app platform. Ideal for Penetration Testers, Web app Developers as well as everybody interested in JavaScript/Node.js and Modern app stack security.
All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support and lifetime access to training portal with step-by-step video recordings and interesting apps to practice, including all future updates for free.
|
|
|
|
|
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
1/1 content
end 1/1 content
footer