Account [Researcher: 999 Advisories: 850 Documents: 32 Videos: 177 Date: 25.05.2016 TZ: 05:19

[ Home ] [ Upcoming ] [ Mobile ] [ Vendor ] [ Web-Application ] [ Remote ] [ Local ] [ Websites ] [ Documents ] [ Videos ] [ ? ]

Commercial Talks - Event Speakers, PenTest Shows or Workshops

Vulnerability-Lab provides stable commercial talks which are getting extended in a period of every quartal per year to make them unique and perfect. This talks are very informativ for researchers, security companies or penetration tester to learn about manually exploitation, protection, bypass technics, secure programming & more ...

Our company does not only offers workshops and presentations, it does as well live shows for hacking events and conferences. As in other subject areas, the emphasis here is on IT security. To get an overview on the various training courses, workshops and to give live shows, we have extra hacking compiled for you the following information. All our training courses, lectures and performances require no previous IT knowledge. Only if a workshop or a presentation with advanced or expert is instantly highlighted in the title, we require a technical knowledge for your understanding. The training courses and workshops take an average of 1-2 day (s) to complete and include short breaks. The live shows of Hacking take between 30-60 minutes and 60-120 minutes between our presentations, those are ideal for conferences or training sessions.


[ Presentation ]

120 MinutesSkype Software Vulnerabilities - Advanced 0 Day Exploitation 2011-2014Kunz Mejri
120 MinutesUTM, Filter or Web Firewalls - 0Day Bugs, Exploitation and Filter Bypass TechnicsKunz Mejri
120 MinutesBug Bounty Programs in 2015 - The Researcher Perspective ScoresKunz Mejri
120 MinutesVulnerability Management Business - Markets, Infrastructure and IntelligenceKunz Mejri
120 MinutesBug Bounty Programs in 2015 - Requirements, Stability and SeriousnessSöhlke
120 MinutesCyber Threat Intelligence Management using Big Data AnalyticsKaleem
120 MinutesSnort as an IDS/IPS and exporting logs to ELKStack or SnorbyKaleem
120 MinutesExploit Pack Framework - Advanced PenTestingJuan Sacco
120 MinutesDiscovering own Zero Day Vulnerabilities & Exploits in OSXJuan Sacco

Website Copyrights & Trademarks

All pictures, texts, advisories, sourcecode, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list(feed/auto), modify, use or edit our material contact the administrator of the vlab to get a permission ...

Vulnerability Laboratory - Intelligence Vulnerability Program (EU)
www.vulnerability-lab.com or www.vuln-lab.com

[ Search ] [ News ] [ Submit ] [ Stats ] [ Team ] [ Partner ] [ Talks & Workshop ] [ Awards ] [ Customer ] [ Contact ] [ Impressum ]

[Statistics] [May] 10 Critical: 0 High: 3 Medium: 7 Low: 0 Best Researcher: [VL APT SECURITY TEAM] Threat: