[EXCLUSIVE PROGRAMS] [BUG BOUNTY LIST ] [HACKTIVITY] | |
Account [RegistrationRole [Anonymous] Researcher: 1603 Advisories: 1041 Documents: 41 Videos: 237 Date: 19.10.2019 TZ: 13:51

[ Home ] [ Mobile ] [ Vendor ] [ Web-Application ] [ Remote ] [ Local ] [ Websites ] [ Documents ] [ Videos ] [ Search ] [ FAQ ]

Commercial Talks - Event Speakers, PenTest Shows or Workshops

Vulnerability-Lab provides stable commercial talks which are getting extended in a period of every quartal per year to make them unique and perfect. This talks are very informativ for researchers, security companies or penetration tester to learn about manually exploitation, protection, bypass technics, secure programming & more ...

Our company does not only offers workshops and presentations, it does as well live shows for hacking events and conferences. As in other subject areas, the emphasis here is on IT security. To get an overview on the various training courses, workshops and to give live shows, we have extra hacking compiled for you the following information. All our training courses, lectures and performances require no previous IT knowledge. Only if a workshop or a presentation with advanced or expert is instantly highlighted in the title, we require a technical knowledge for your understanding. The training courses and workshops take an average of 1-2 day (s) to complete and include short breaks. The live shows of Hacking take between 30-60 minutes and 60-120 minutes between our presentations, those are ideal for conferences or training sessions.


[ Workshops ]

We have excellent & exclusive workshops around topics like phone/mobile security, zero-day software & application bugs, firewall & filter pentests. Review and book one or two workshops for your industry, company, event or private team. Enjoy the advanced live workshops by our official vulnerabilityy laboratory experts.

Total List: Workshops

480 MinutesiOS 6.x - v12.x - Forensics & Local Passcode Protection Bypass MethodsKunz Mejri
300 MinutesBug Bounty Programs - Advanced Management of Company ProgramsKunz Mejri
240 MinutesBug Bounty Programs - The Researcher Perspective ScoresKunz Mejri
120 MinutesSnort as an IDS/IPS and exporting logs to ELKStack or SnorbyKaleem

Copyrights, Permission & Trademarks

All pictures, texts, advisories, sourcecodes, ressources, videos and other information of the vulnerability lab website is trademark of the evolution security gmbh company & the specific authors, manufacturer or manager team. To record, public list(feed/auto), modify, public demo usage, copy or edit our material contact the administrators or managers of the program to get a permission.

Vulnerability Laboratory - Vulnerability Research Program (EU)
www.vulnerability-lab.com or www.vuln-lab.com


[Vulnerability Magazine][October] Critical: 0 High: 0 Medium: 0 Low: 0 Best Researcher: [] Threat:

© EVOLUTION SECURITY GmbH ™