Trainings and workshops for Qubit Conference® Prague 2025.

Offensive Emailing

The training will take place on May 26, 2025

In-person | Duration: 6 hours | Suitable for: Penetration Testers, Red Teamers | Maximum number of participants: 15

Email remains a critical vector in the modern cybersecurity landscape, serving as a primary channel for various threats, including malware distribution, phishing campaigns, and social engineering attacks. The Offensive Emailing training equips penetration testers and red team professionals with advanced skills to perform comprehensive email-based security assessments.

During this hands-on training, participants will explore:

  • Fundamentals of email and advanced protocols essential for security testing
  • Techniques for mapping and analyzing target infrastructure
  • Building email-sending infrastructure for optimal campaign execution
  • Designing and implementing realistic attack scenarios
  • Methodologies for measuring and analyzing campaign effectiveness

This practical training enables security professionals to simulate real-world email-based threats, helping organizations identify vulnerabilities in their email security and assess employee security awareness. Participants will gain practical skills to conduct thorough email security assessments and provide actionable recommendations to enhance organizational resilience.

Participants will gain expertise in designing and conducting sophisticated email security assessments.

They will learn techniques to bypass common email security controls, understand their limitations, and gain practical experience in building and maintaining sending infrastructure for security testing.

Participants will also learn to create realistic scenarios that test both technical defenses and human awareness.

Requirements for training participants:
  • Basic knowledge of Linux
  • Understanding of DNS

Trainer

Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

Mastering Threat Hunting

The training will take place on May 26, 2025

In-person | Duration: 6 hours | Maximum number of participants: 20.
Threat Hunting is the New Cat-and-Mouse Game! Threat hunting has always been about sorting through a flood of alerts, logs, the unknown, and the known. But what if we combine proactive and reactive methods, structured and unstructured threat searches, and criminal profiling all while having fun during training? Grab your keyboards, prepare an extra set of eyes, bring paper and pen, and hunt the unknown from the known from the ground to the cloud!

What We’ll Cover in the “Pure Hands-on” Training:

  • Fundamentals of Threat Hunting: Reactive vs. proactive approaches, what to pursue and ignore.
  • Frameworks for Threat Hunting: Structured and unstructured methods, hunting threats via blogs, scraping Paste Bin, and following rumors.
  • Criminal Profiling: MITRE vs. Any.run vs. the hunter’s instinct.
  • Staying Grounded: Preliminary threat hunting, Indicators of Compromise (IOC), and Indicators of Attacks (IOA).
  • You’ve Got the Gold Pack: Scouting for MOV in Pcaps.
  • Hunting in the Dark: Rootkits and office documents.
  • The Cloud is the New Gotham: MITRE for the Cloud, AWS, and the awesomeness of log collection.
  • Every Cloud Has a Silver Lining (and a Threat): Detecting attack patterns and identifying attempted attacks.
  • H(AI)! Did You Miss Me?: Leveraging AI for triaging alerts, pattern comparison, and model mojo. Can we create playbooks with AI?
Requirements for training participants:

Registered participants will receive details about the VM for download, including files and necessary software, 20 days before the training.

Trainer

Shyam Sundar R.

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Hacking Gamification

The training will take place on May 26, 2025

In-person | Duration: 3 hours | Suitable for: IT security professionals, IT operations teams, incident response teams, system administrators, infrastructure and workstation management professionals, beginners in penetration testing, and anyone looking to transition into cybersecurity roles | Maximum number of participants: 20

Cybersecurity professionals must stay ahead of malicious attackers to protect their organizations from constantly evolving cyber threats. Hacking gamification is an innovative way to learn and understand hacking techniques, penetration testing, and incident response strategies. In this observation-based training, participants will gain valuable insights into hacker tactics, tools, and methodologies without needing hands-on involvement.

The training will guide you through ethical hacking. Joseph will demonstrate tools and techniques commonly used by hackers and provide a detailed walkthrough of two selected systems. He will explain each step of the process, from initial enumeration and exploitation to privilege escalation, while offering actionable recommendations for mitigating risks in real-world environments.

Participants will see live demonstrations of:

  • Techniques for enumerating systems and services on endpoints.
  • Strategies for exploiting vulnerabilities to discover and leverage weaknesses.
  • Methods for creating payloads and executing reverse shells.
  • Privilege escalation techniques to gain elevated access.

At the end of this session, participants will have a deeper understanding of:

  • Ethical hacking tools such as Metasploit, Nmap, BurpSuite, and Netcat
  • Common vulnerabilities and how attackers exploit them
  • Effective strategies for strengthening endpoint security and protecting against malicious threats
Note:

This training is observation-based. It focuses on demonstrating ethical hacking techniques. Participants will not engage in practical activities but will gain critical insights into effectively securing their environment.

Trainer

Joe Carson
Joseph Carson
Chief Security Researcher & Advisory CISO | Wiretrap | Estonia

LAZARUS DevSecOps Workshop

The workshop will take place on the May 28 2025, as part of the conference program in the technical track.

This is a hands-on, interactive session—passive participation is possible, but attendees will get the most out of it by testing the tools themselves. Duration: 90 minutes | The maximum number of active workshop participants for whom a testing station can be prepared is 30.
LAZARUS is a 3-year EU-funded project with a talented tech team aiming to simplify software development, particularly for SMEs, while ensuring secure applications for everyone.
Each tool will be available for testing, accompanied by an explanation of its current limitations and stages of development. It is necessary to bring your own laptop with a GitHub account (or local software projects for testing). During the workshop, participants will have access to LAZARUS tools in the cloud by scanning a QR code. After the testing is completed, there will be feedback and a group discussion.

Workshop Agenda:

1. Overview of the LAZARUS EU Project (30 min)

  • Opening remarks and workshop objectives.
  • Introduction to LAZARUS: A holistic platform focused on security and performance throughout the entire Software Development Life Cycle (SDLC).

Project Objectives:

  • Design of an intelligent framework for secure application development.
  • Implementation of automated self-healing mechanisms for compromised systems.
  • Development of innovative methods for vulnerability detection.
  • Integration of AI and machine learning to automate security checks in DevSecOps.
  • Current status and key milestones achieved.
  • FAQ

2. Interactive Demonstrations of LAZARUS Platform Services (55 minutes)

Detection of Secret Management Issues:

  • Capabilities of the tool and current development status.
  • Hands-on testing with a guided scenario.

Code Tainting and Static Code Analysis:

  • Features for identifying code quality issues and potential vulnerabilities.
    Interactive code analysis session.

SQL Injection Vulnerability Detection:

  • Demonstration of detection methods.

Fuzzing Techniques:

  • Overview of fuzz testing and anti-fuzzing capabilities.
  • Live fuzzing demonstration on sample code.
  • CVE Scanning and Container Vulnerability Assessment:
  • Tools for identifying known vulnerabilities in dependencies and container images.
  • Step-by-step scanning process walkthrough.

Network Attack and DDoS Detection:

  • Mechanisms for monitoring and mitigating network threats.
  • Simulated attack scenario.

The workshop will be led by

Adriana Freitas
Adriana Freitas

Director Responsible for Research Projects | APWG.EU | Spain

Panagiotis Markovits

Panagiotis Markovits

Senior Researcher / Software Engineer | SOLVUS TECH | Spain

Boris Mutina

Security analyst
Excello a Virusfree.cz | Česká republika

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Joseph Carson

Chief Security Researcher & Advisory CISO | Wiretrap | Estónsko

Adriana Freitas

Director Responsible for Research Projects | APWG.EU | Španielsko

Panagiotis Markovits

Senior Researcher / Software Engineer | SOLVUS TECH | Španielsko

Boris Mutina

Security analyst

Excello a Virusfree.cz | Czech Republic

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Joseph Carson

Chief Security Researcher & Advisory CISO | Wiretrap | Estonia

Adriana Freitas

Director Responsible for Research Projects | APWG.EU | Spain

Panagiotis Markovits

Senior Researcher / Software Engineer | SOLVUS TECH | Spain

Jean Gobin

Senior Technical Architect | Truesec AB | Sweden

Andrea Pezzotti

Global Head Cyber Security Operations | Sandoz | Czech Republic

Tiarne Hawkins

CEO & Co-Founder | Optica Labs | USA

Michal Susko

IT GRC and Security Team Leader | VOLKSWAGEN Financial Services Slovakia | Slovakia

Jozef Filko

Cyber security consultant | beluga | Slovakia

Tudor Damian

Cybersecurity & Cloud Advisor | D3 Cyber | Romania

Charles Tango

CISO | SYSCO | USA

Lukas Hatala

Regional CTO | DXC Technology | Slovakia

Pavel Minarik

VP, Product Security | Progress Software | Czech Republic