2 day training sessions on the Mon and Tue after DEF CON. There will be an additional cost for these.
One Page All Paid Training list with descriptions
DEF CON 33 All Paid Training Forum page
DEF CON 33 Training Signup Pages
You may need to scroll to the right to see all info
A Complete Practical Approach to Malware Analysis & Threat Hunting Using Memory Forensics
Training Info |
A Practical Approach to Breaking & Pwning Kubernetes Clusters
Training Info |
Active Directory Attacks for Red and Blue Teams – Advanced Edition
Training Info |
Advanced Cloud Incident Response in Azure and Microsoft 365
Training Info |
Advanced Red Team Operations Certification by White Knight Labs
Training Info |
Adversarial Thinking: The Art of Dangerous Ideas
Training Info |
AI SecureOps: Attacking & Defending AI Applications and Services
Training Info |
APT Tactics: Lazarus, Ransomware, and Advanced Exploitation
Training Info |
Attack and Defend Software Supply Chain
Training Info |
Attacking & Securing CI/CD Pipeline Certification (ASCPC) by White Knight Labs
Training Info |
Azure Cloud Attacks for Red & Blue Teams – Advanced Edition
Training Info |
Azure Cloud Attacks for Red & Blue Teams – Beginner Edition
Training Info |
Beginner’s Guide to Attacks and Defenses
Training Info |
Binary Exploitation on Windows
Training Info |
BRIDGING THE GAP – An Introduction to IoT Security from Serial to Bluetooth
Training Info |
Cloud Native Kill Chain
Training Info |
Cyber Threat Intelligence Analysis (CTIA) by Deloitte
Training Info |
Deep Dive into Fuzzing
Training Info |
Dodging the EDR bullet: A Training on Malware Stealth Tactics
Training Info |
Everyday Ghidra: Practical Windows Reverse Engineering
Training Info |
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
Training Info |
Hack the Connected Plant!
Training Info |
Hacking Cryptography: Attacks, Tools, and Techniques
Training Info |
Hacking Modern Web Apps: Master the Future of Attack Vectors
Training Info |
Hands-on Car Hacking & Automotive Cybersecurity
Training Info |
Harnessing LLMs for Application Security
Training Info |
Hunting for Hackers by Deloitte
Training Info |
Influence Operations: Tactics, Defense, and Exploitation
Training Info |
Loudmouth Security – Offensive IoT Exploitation
Training Info |
Medical Device Penetration Testing
Training Info |
Offensive Cyber Security Operations: Mastering Breach and Adversarial Attack Simulation Engagements
Training Info |
Offensive Development Practitioner Certification (On-Site) by White Knight Labs
Training Info |
Red Team Tunneling, Pivoting, and Redirection by Deloitte
Training Info |
RFID and Electronic Physical Access Control System Hacking
Training Info |
Simulated Adversary: Tactics & Tools Training
Training Info |
SOC 101 – SOC 1 Analyst Bootcamp
Training Info |
Software Defined Radios
Training Info |
Solving Modern Cybersecurity Problems with AI
Training Info |
Tactical OSINT for Pentesters – DEFCON Edition
Training Info |
Vulnerability Research and Exploitation on Edge Devices
Training Info |
Windows Payload Development: EDR Evasion and Initial Access Tradecraft
Training Info |