Conference Training

Enhance your cybersecurity skills with expert-led, hands-on training sessions by Byt3Con Academy. Learn from industry professionals across multiple security domains.

May 28th & 29th, 2026

Byt3Con Academy

Register for Training
Expert Trainers

Meet Your Trainers

Learn from industry experts at Byt3Con Academy with years of hands-on experience

image

coming soon

Web Application Security

Byt3Con Academy

image

coming soon

Network Penetration Testing

Byt3Con Academy

Available Courses

Choose from our curated selection of hands-on training programs

Advanced Hands-On AI Security Workshop

Byte3con Academy

Advanced

Hands-on training to identify, exploit, and secure modern AI systems and model-driven applications.

Topics Covered

  • AI Threat Modeling
  • Model Abuse Attacks
  • Data Poisoning
  • AI Pipeline Security
  • Deployment Hardening
May 28thMay 29th

Offensive AI: Attacking AI-Native Apps, IDEs & Browsers

Byte3con Academy

Advanced

Offensive techniques to exploit AI-native applications, copilots, IDE integrations, and browser-based AI agents.

Topics Covered

  • Prompt Injection
  • AI Attack Chains
  • IDE Exploitation
  • Browser AI Abuse
  • Adversarial Prompting
May 28thMay 29th

AI SecureOps: Building and Breaking AI-Powered Security Systems

Byte3con Academy

Advanced

Learn how AI-driven security systems work, fail, and can be attacked or hardened in real environments.

Topics Covered

  • AI SOC Tools
  • Detection Evasion
  • Adversarial Testing
  • Model Trust Failures
  • Secure AI Ops
May 28thMay 29th

Secure by Design: Mastering DevSecOps

Byte3con Academy

Intermediate

Integrate security into development pipelines using DevSecOps principles and real-world CI/CD workflows.

Topics Covered

  • Secure CI/CD
  • IaC Security
  • Secrets Management
  • Pipeline Hardening
  • Shift-Left Security
May 28thMay 29th

Cyber Threat Intelligence Bootcamp

Byte3con Academy

Intermediate

Hands-on threat intelligence training using real attacker data, frameworks, and investigation workflows.

Topics Covered

  • Threat Actor Profiling
  • MITRE ATT&CK
  • IOC Analysis
  • Intelligence Workflows
  • Threat Reporting
May 28thMay 29th

Attack & Defend Software Supply Chain

Byte3con Academy

Advanced

Understand and exploit software supply chain weaknesses, then apply defensive controls and mitigations.

Topics Covered

  • Dependency Confusion
  • CI/CD Attacks
  • Open-Source Risks
  • Pipeline Compromise
  • Supply Chain Defense
May 28thMay 29th

HACK THE CLOUD – AWS & Google Cloud Exploitation

Byte3con Academy

Advanced

Practical cloud exploitation techniques targeting AWS and GCP misconfigurations and identity weaknesses.

Topics Covered

  • IAM Abuse
  • Cloud Misconfigurations
  • Privilege Escalation
  • Persistence Techniques
  • Cloud Hardening
May 28thMay 29th

Read. Break. Fix: Secure Code Review in Practice

Byte3con Academy

Intermediate

Hands-on secure code review to identify vulnerabilities, exploit them, and apply secure fixes.

Topics Covered

  • Code Review Patterns
  • Vulnerability Discovery
  • Exploitation Paths
  • Secure Remediation
  • Best Practices
May 28thMay 29th

Malware Analysis 0x65

Byte3con Academy

Advanced

Analyze malware to understand attacker behavior, tooling, and real-world malicious techniques.

Topics Covered

  • Static Analysis
  • Dynamic Analysis
  • Obfuscation Methods
  • C2 Communication
  • Attacker Mindset
May 28thMay 29th

Why Choose Our Training?

Expert Instructors

Learn from industry veterans with years of hands-on experience in cybersecurity.

Hands-On Labs

Practical exercises in safe, isolated environments designed for real-world scenarios.

Certification Ready

Training content aligns with industry certifications and standards you care about.