9-19-2015 Introduction to printed circuit board design

          Introduction to printed circuit board design This will be a workshop on how to design your own printed circuit board. In this workshop we will design an ethernet network tap using eagleCAD. please bring your windows boxes/VM’s if you wish to work along with the presentation. Presenter: Seth Wahle Cyber […]

07-25-2015 Mini CTP/CTF

              In anticipation of Bsides Las Vegas, and DEFCON we will be having a mini Capture The Packet and Capture The Flag games on Saturday July 25th. Bring your computer and be ready to have some fun. Cyber Pizza Cafe 2PM 1200 S Federal Hwy Dania Beach, FL   […]

07-11-2015 Hackerville, REMnux

Hackerville We will be playing and discussing the Hackerville documentary.  REMnux         REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can examine malware, yet might be […]

06-20-2015 Docker, HackmiamiBT

Docker Docker is a tool that can package an application and its dependencies in a virtual container that can run on any machine. This helps enable flexibility and portability on where the application can run, whether on-premise, public cloud, private cloud, bare metal, etc. We will have a hands-on session on Docker, and take a […]

06-06-2015 Virtualization & Cloud Security Challenges

              Virtualization & Cloud Security Challenges Rod Soto will talk about attack vectors, security shortfalls, mitigation and defense techniques in most commonly used Virtualization technologies such as Hyper-V, Vsphere, Xen Server/XenApp. There will also be a discussion on security implications in current cloud environments and continuous move of organizations into […]

05-06-2015 Pentest 101

Penetration testing 101 This interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation. This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you can choose your own training […]