Trainings for Qubit Conference® Prague 2026
How to Secure AI-Generated Code Using Open-Source Tools
The training will take place on May 18, 2026
Participants will learn how to set up effective protective mechanisms, detect weaknesses in AI code, and build automated security pipelines that verify both human- and AI-generated code.
What will the training cover?
Artificial intelligence is no longer just a developer’s assistant – it has become the main driver of modern software development. Today, almost 24% of production code is written by AI, and in the United States, it is nearly one-third. This shift has accelerated development but has also opened entirely new categories of risks. As many as 69% of organizations have discovered vulnerabilities directly in AI-generated code, and one in five has experienced a critical security incident.
During the training, participants will go through the entire secure development cycle:
- from identifying the most common vulnerabilities in AI code,
- through evaluating security scanners and testing prompts,
- up to creating a complete security architecture that integrates SAST, SCA, secrets, and container scanning.
However, the training goes even further — it will show how attackers are using AI. Participants will explore concepts such as package hallucination, prompt injection, and AI-generated malware, and learn how to recognize and neutralize these threats.
By the end of the day, each participant will leave with a functional security pipeline that can automatically:
- detect dangerous AI outputs,
- enforce secure prompting practices,
- verify dependencies and containers,
- and generate clear risk reports.
- understanding how AI changes risk, responsibility, and code ownership,
- practical methods for implementing secure prompts and tracking AI authorship,
- possibilities for using AI to detect vulnerabilities and malicious packages,
- a procedure for building a unified AppSec + CloudSec architecture that shortens detection and response time.
How to analyze Android malware
The training will take place on May 19, 2026
This intensive one-day training is designed for security professionals who want to gain practical skills in Android malware analysis, from basic to advanced techniques. In a safe laboratory environment, participants will work with real malicious APK samples, learn static and dynamic analysis, and use tools such as APKTool, JADX, MobSF, Frida, Objection, Wireshark, and mitmproxy.
What will the training cover?
Smartphones are now the main battlefield of the cyber war. Attackers are increasingly focusing their activities on mobile devices, and Android has become their primary target. Malware families such as Joker, Anubis, Coper, Facestealer, and Shedun prove that mobile threats are no longer simple — they use multi-stage payloads, social engineering, and techniques capable of evading even modern security solutions.
During the training, participants will uncover the internal workings of malicious applications, learn to detect suspicious code, monitor network communication, and bypass protection mechanisms such as SSL pinning and root detection. They will gain the ability to extract Indicators of Compromise (IOCs), create simple YARA rules, and map findings according to the MITRE ATT&CK Mobile framework.
The final part of the training focuses on defense and response – participants will learn how to build effective incident response processes for mobile threats, use Google Play Protect, implement MDM policies, and recognize early warning signs of device compromise.
- real experience analyzing malicious Android applications in a safe environment,
- the ability to identify and analyze the behavior of modern malware families,
- practical skills using open-source tools for static and dynamic analysis,
- proficiency in generating and applying IOCs and creating YARA rules,
- understanding of defense techniques and response strategies for the mobile ecosystem.
- basic knowledge of Linux and command-line usage,
- familiarity with malware concepts is an advantage, but not required.
We are preparing training
The training will take place on May 19, 2026