Trainings for Qubit Conference®
Prague 2025

Offensive Emailing

The training will take place on May 26, 2025

In-person | Duration: 6 hours | Suitable for: Penetration Testers, Red Teamers | Maximum number of participants: 15

Email remains a critical vector in the modern cybersecurity landscape, serving as a primary channel for various threats, including malware distribution, phishing campaigns, and social engineering attacks. The Offensive Emailing training equips penetration testers and red team professionals with advanced skills to perform comprehensive email-based security assessments.

During this hands-on training, participants will explore:

  • Fundamentals of email and advanced protocols essential for security testing
  • Techniques for mapping and analyzing target infrastructure
  • Building email-sending infrastructure for optimal campaign execution
  • Designing and implementing realistic attack scenarios
  • Methodologies for measuring and analyzing campaign effectiveness

This practical training enables security professionals to simulate real-world email-based threats, helping organizations identify vulnerabilities in their email security and assess employee security awareness. Participants will gain practical skills to conduct thorough email security assessments and provide actionable recommendations to enhance organizational resilience.

Participants will gain expertise in designing and conducting sophisticated email security assessments.

They will learn techniques to bypass common email security controls, understand their limitations, and gain practical experience in building and maintaining sending infrastructure for security testing.

Participants will also learn to create realistic scenarios that test both technical defenses and human awareness.

Requirements for training participants:
  • Basic knowledge of Linux
  • Understanding of DNS

Trainer

Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

Mastering Threat Hunting

The training will take place on May 26, 2025

In-person | Duration: 6 hours | Maximum number of participants: 20.
Threat Hunting is the New Cat-and-Mouse Game! Threat hunting has always been about sorting through a flood of alerts, logs, the unknown, and the known. But what if we combine proactive and reactive methods, structured and unstructured threat searches, and criminal profiling all while having fun during training? Grab your keyboards, prepare an extra set of eyes, bring paper and pen, and hunt the unknown from the known from the ground to the cloud!

What We’ll Cover in the “Pure Hands-on” Training:

  • Fundamentals of Threat Hunting: Reactive vs. proactive approaches, what to pursue and ignore.
  • Frameworks for Threat Hunting: Structured and unstructured methods, hunting threats via blogs, scraping Paste Bin, and following rumors.
  • Criminal Profiling: MITRE vs. Any.run vs. the hunter’s instinct.
  • Staying Grounded: Preliminary threat hunting, Indicators of Compromise (IOC), and Indicators of Attacks (IOA).
  • You’ve Got the Gold Pack: Scouting for MOV in Pcaps.
  • Hunting in the Dark: Rootkits and office documents.
  • The Cloud is the New Gotham: MITRE for the Cloud, AWS, and the awesomeness of log collection.
  • Every Cloud Has a Silver Lining (and a Threat): Detecting attack patterns and identifying attempted attacks.
  • H(AI)! Did You Miss Me?: Leveraging AI for triaging alerts, pattern comparison, and model mojo. Can we create playbooks with AI?
Requirements for training participants:

Registered participants will receive details about the VM for download, including files and necessary software, 20 days before the training.

Trainer

Shyam Sundar R.

Shyam Sundar R.

Cyber Security Architect | GE Health Care | India

Hacking Gamification

The training will take place on May 26, 2025

In-person | Duration: 3 hours | Suitable for: IT security professionals, IT operations teams, incident response teams, system administrators, infrastructure and workstation management professionals, beginners in penetration testing, and anyone looking to transition into cybersecurity roles | Maximum number of participants: 20

Cybersecurity professionals must stay ahead of malicious attackers to protect their organizations from constantly evolving cyber threats. Hacking gamification is an innovative way to learn and understand hacking techniques, penetration testing, and incident response strategies. In this observation-based training, participants will gain valuable insights into hacker tactics, tools, and methodologies without needing hands-on involvement.

The training will guide you through ethical hacking. Joseph will demonstrate tools and techniques commonly used by hackers and provide a detailed walkthrough of two selected systems. He will explain each step of the process, from initial enumeration and exploitation to privilege escalation, while offering actionable recommendations for mitigating risks in real-world environments.

Participants will see live demonstrations of:

  • Techniques for enumerating systems and services on endpoints.
  • Strategies for exploiting vulnerabilities to discover and leverage weaknesses.
  • Methods for creating payloads and executing reverse shells.
  • Privilege escalation techniques to gain elevated access.

At the end of this session, participants will have a deeper understanding of:

  • Ethical hacking tools such as Metasploit, Nmap, BurpSuite, and Netcat
  • Common vulnerabilities and how attackers exploit them
  • Effective strategies for strengthening endpoint security and protecting against malicious threats
Note:

This training is observation-based. It focuses on demonstrating ethical hacking techniques. Participants will not engage in practical activities but will gain critical insights into effectively securing their environment.

Trainer

Joe Carson
Joseph Carson
Chief Security Researcher & Advisory CISO | Wiretrap | Estonia

Boris Mutina

Security analyst
Excello a Virusfree.cz | Česká republika

Shyam Sundar R.

Cyber Security Architect | GE Health Care | India

Joseph Carson

Chief Security Researcher & Advisory CISO | Wiretrap | Estónsko

Boris Mutina

Security analyst

Excello a Virusfree.cz | Czech Republic

Shyam Sundar R.

Cyber Security Architect | GE Health Care | India

Joseph Carson

Chief Security Scientist (CSS) Advisory CISO

Wiretrap | Estonia