Conference Training
Enhance your cybersecurity skills with expert-led, hands-on training sessions by Byt3Con Academy. Learn from industry professionals across multiple security domains.
May 28th & 29th, 2026
Byt3Con Academy
Meet Your Trainers
Learn from industry experts at Byt3Con Academy with years of hands-on experience
coming soon
Web Application Security
Byt3Con Academy
coming soon
Network Penetration Testing
Byt3Con Academy
Available Courses
Choose from our curated selection of hands-on training programs
Advanced Hands-On AI Security Workshop
Byte3con Academy
AdvancedHands-on training to identify, exploit, and secure modern AI systems and model-driven applications.
Topics Covered
- AI Threat Modeling
- Model Abuse Attacks
- Data Poisoning
- AI Pipeline Security
- Deployment Hardening
Offensive AI: Attacking AI-Native Apps, IDEs & Browsers
Byte3con Academy
AdvancedOffensive techniques to exploit AI-native applications, copilots, IDE integrations, and browser-based AI agents.
Topics Covered
- Prompt Injection
- AI Attack Chains
- IDE Exploitation
- Browser AI Abuse
- Adversarial Prompting
AI SecureOps: Building and Breaking AI-Powered Security Systems
Byte3con Academy
AdvancedLearn how AI-driven security systems work, fail, and can be attacked or hardened in real environments.
Topics Covered
- AI SOC Tools
- Detection Evasion
- Adversarial Testing
- Model Trust Failures
- Secure AI Ops
Secure by Design: Mastering DevSecOps
Byte3con Academy
IntermediateIntegrate security into development pipelines using DevSecOps principles and real-world CI/CD workflows.
Topics Covered
- Secure CI/CD
- IaC Security
- Secrets Management
- Pipeline Hardening
- Shift-Left Security
Cyber Threat Intelligence Bootcamp
Byte3con Academy
IntermediateHands-on threat intelligence training using real attacker data, frameworks, and investigation workflows.
Topics Covered
- Threat Actor Profiling
- MITRE ATT&CK
- IOC Analysis
- Intelligence Workflows
- Threat Reporting
Attack & Defend Software Supply Chain
Byte3con Academy
AdvancedUnderstand and exploit software supply chain weaknesses, then apply defensive controls and mitigations.
Topics Covered
- Dependency Confusion
- CI/CD Attacks
- Open-Source Risks
- Pipeline Compromise
- Supply Chain Defense
HACK THE CLOUD – AWS & Google Cloud Exploitation
Byte3con Academy
AdvancedPractical cloud exploitation techniques targeting AWS and GCP misconfigurations and identity weaknesses.
Topics Covered
- IAM Abuse
- Cloud Misconfigurations
- Privilege Escalation
- Persistence Techniques
- Cloud Hardening
Read. Break. Fix: Secure Code Review in Practice
Byte3con Academy
IntermediateHands-on secure code review to identify vulnerabilities, exploit them, and apply secure fixes.
Topics Covered
- Code Review Patterns
- Vulnerability Discovery
- Exploitation Paths
- Secure Remediation
- Best Practices
Malware Analysis 0x65
Byte3con Academy
AdvancedAnalyze malware to understand attacker behavior, tooling, and real-world malicious techniques.
Topics Covered
- Static Analysis
- Dynamic Analysis
- Obfuscation Methods
- C2 Communication
- Attacker Mindset
Why Choose Our Training?
Expert Instructors
Learn from industry veterans with years of hands-on experience in cybersecurity.
Hands-On Labs
Practical exercises in safe, isolated environments designed for real-world scenarios.
Certification Ready
Training content aligns with industry certifications and standards you care about.