Paid Training Table

2 day training sessions on the Mon and Tue after DEF CON. There will be an additional cost for these.

One Page All Paid Training list with descriptions

DEF CON 33 All Paid Training Forum page
DEF CON 33 Training Signup Pages

You may need to scroll to the right to see all info

A Complete Practical Approach to Malware Analysis & Threat Hunting Using Memory Forensics
Training Info
A Practical Approach to Breaking & Pwning Kubernetes Clusters
Training Info
Active Directory Attacks for Red and Blue Teams – Advanced Edition
Training Info
Advanced Cloud Incident Response in Azure and Microsoft 365
Training Info
Advanced Red Team Operations Certification by White Knight Labs
Training Info
Adversarial Thinking: The Art of Dangerous Ideas
Training Info
AI SecureOps: Attacking & Defending AI Applications and Services
Training Info
APT Tactics: Lazarus, Ransomware, and Advanced Exploitation
Training Info
Attack and Defend Software Supply Chain
Training Info
Attacking & Securing CI/CD Pipeline Certification (ASCPC) by White Knight Labs
Training Info
Azure Cloud Attacks for Red & Blue Teams – Advanced Edition
Training Info
Azure Cloud Attacks for Red & Blue Teams – Beginner Edition
Training Info
Beginner’s Guide to Attacks and Defenses
Training Info
Binary Exploitation on Windows
Training Info
BRIDGING THE GAP – An Introduction to IoT Security from Serial to Bluetooth
Training Info
Cloud Native Kill Chain
Training Info
Cyber Threat Intelligence Analysis (CTIA) by Deloitte
Training Info
Deep Dive into Fuzzing
Training Info
Dodging the EDR bullet: A Training on Malware Stealth Tactics
Training Info
Everyday Ghidra: Practical Windows Reverse Engineering
Training Info
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
Training Info
Hack the Connected Plant!
Training Info
Hacking Cryptography: Attacks, Tools, and Techniques
Training Info
Hacking Modern Web Apps: Master the Future of Attack Vectors
Training Info
Hands-on Car Hacking & Automotive Cybersecurity
Training Info
Harnessing LLMs for Application Security
Training Info
Hunting for Hackers by Deloitte
Training Info
Influence Operations: Tactics, Defense, and Exploitation
Training Info
Loudmouth Security – Offensive IoT Exploitation
Training Info
Medical Device Penetration Testing
Training Info
Offensive Cyber Security Operations: Mastering Breach and Adversarial Attack Simulation Engagements
Training Info
Offensive Development Practitioner Certification (On-Site) by White Knight Labs
Training Info
Red Team Tunneling, Pivoting, and Redirection by Deloitte
Training Info
RFID and Electronic Physical Access Control System Hacking
Training Info
Simulated Adversary: Tactics & Tools Training
Training Info
SOC 101 – SOC 1 Analyst Bootcamp
Training Info
Software Defined Radios
Training Info
Solving Modern Cybersecurity Problems with AI
Training Info
Tactical OSINT for Pentesters – DEFCON Edition
Training Info
Vulnerability Research and Exploitation on Edge Devices
Training Info
Windows Payload Development: EDR Evasion and Initial Access Tradecraft
Training Info