Trainings 2025
Get Your Training Tickets Here!
Training Location: Rochester Institute of Technology 1 Lomb Memorial Drive, Rochester, NY, 14623, United States
Specific classroom details will be sent to ticket holders.
The following workshops will be offered on Friday, the day before the main conference:
Date: Friday, March 21st 2025
Open Source 5G Network Deployment
Length: 8:00 a.m. - Noon
Instructors:
- Andrew Fox
In the networking industry, there is a lack of tools and software that provide a testing platform to experiment with mobile networks. Without these platforms to experiment with, researchers can only present concepts for changes to mobile networks and cannot prove their work is practical. Open AI Cellular (OAIC) provides the software and tools to install, deploy, and configure a 5G network. OAIC is a 5G network research and experimentation platform where researchers can learn more about mobile networks with simulated equipment that matches today’s networking standards. You will learn more about the core components needed to create a 5G network and experiment with a wireless mobile network.
Requirements:
Laptop with latest version of Ubuntu installed or a laptop that can run a virtual machine with Ubuntu.
Price: $50
A Bug Hunters Way of Assessing Web application Security
Length: 8am - Noon
Instructors:
- Saurabh Singh
This session will delve into the step-by-step methodology employed by bug hunters and penetration testers to assess the security of web applications. By focusing on practical techniques and tools, the talk will empower attendees with actionable knowledge to find vulnerabilities and enhance the overall security of their applications. The session will focus on how to use this tools in real applications to find security issues in real-time with few live targets and vulnerable machines. This session also focuses on understanding multiple types of attack vectors on a single vulnerability from OWASP, SANS and Business logic flaws.
Requirements:
Laptop
Price: $50
Introduction to Computer Forensics
Length: 8am to 5pm
Instructors:
- Tyler Hudak
Computer forensics and investigation skills have become a top priority for many organizations. As cyber threats continue to grow in complexity, organizations need skilled professionals who can analyze digital evidence, uncover malicious activity, and respond to security incidents effectively. This course teaches students the skills to analyze core Windows forensics artifacts, enabling them to help their organization combat ongoing cybersecurity threats.
Requirements:
Laptop
Price: $50